Network Resilience and the Length-Bounded Multicut Problem
暂无分享,去创建一个
[1] Euiwoong Lee. Improved Hardness for Cut, Interdiction, and Firefighter Problems , 2017, ICALP.
[2] Nam P. Nguyen,et al. A Graph-Theoretic QoS-Aware Vulnerability Assessment for Network Topologies , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[3] My T. Thai,et al. Pseudo-Separation for Assessment of Structural Vulnerability of a Network , 2017, SIGMETRICS.
[4] Jure Leskovec,et al. {SNAP Datasets}: {Stanford} Large Network Dataset Collection , 2014 .
[5] Arunabha Sen,et al. Region-based connectivity - a new paradigm for design of fault-tolerant networks , 2009, 2009 International Conference on High Performance Switching and Routing.
[6] Venkatesan Guruswami,et al. Inapproximability of Feedback Vertex Set for Bounded Length Cycles , 2014, Electron. Colloquium Comput. Complex..
[7] Gunnar Prytz,et al. QoS in switched Industrial Ethernet , 2009, 2009 IEEE Conference on Emerging Technologies & Factory Automation.
[8] Ahmad-Reza Sadeghi,et al. Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[9] Dániel Marx,et al. Parameterized Complexity and Approximation Algorithms , 2008, Comput. J..
[10] R. Kevin Wood,et al. Shortest‐path network interdiction , 2002, Networks.
[11] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[12] Petr A. Golovach,et al. Paths of bounded length and their cuts: Parameterized complexity and algorithms , 2009, Discret. Optim..
[13] Mihalis Yannakakis,et al. Approximate Max-Flow Min-(Multi)Cut Theorems and Their Applications , 1996, SIAM J. Comput..
[14] A. K. Mittal,et al. The k most vital arcs in the shortest path problem , 1990 .
[15] Alan T. Murray,et al. Comparative Approaches for Assessing Network Vulnerability , 2008 .
[16] Xiaoyan Hong,et al. Landmark routing in large wireless battlefield networks using UAVs , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[17] Vijitha Weerackody,et al. Free-Space Optical Communications for Next-generation Military Networks , 2006, IEEE Communications Magazine.
[18] Vijay V. Vazirani,et al. Approximation Algorithms , 2001, Springer Berlin Heidelberg.
[19] Anupam Gupta. Improved results for directed multicut , 2003, SODA '03.
[20] Laurence T. Yang,et al. An Incremental CFS Algorithm for Clustering Large Data in Industrial Internet of Things , 2017, IEEE Transactions on Industrial Informatics.
[21] Nils J. Nilsson,et al. A Formal Basis for the Heuristic Determination of Minimum Cost Paths , 1968, IEEE Trans. Syst. Sci. Cybern..
[22] Christos Faloutsos,et al. Graphs over time: densification laws, shrinking diameters and possible explanations , 2005, KDD '05.
[23] Noga Alon,et al. Improved approximation for directed cut problems , 2007, STOC '07.
[24] Pavel Dvorák,et al. Parameterized Complexity of Length-bounded Cuts and Multicuts , 2015, Algorithmica.
[25] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[26] Yuichi Yoshida,et al. A Generalization of Submodular Cover via the Diminishing Return Property on the Integer Lattice , 2015, NIPS.
[27] Thomas Brinkhoff,et al. Generating network-based moving objects , 2000, Proceedings. 12th International Conference on Scientific and Statistica Database Management.
[28] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[29] Thomas Erlebach,et al. Length-bounded cuts and flows , 2006, TALG.
[30] Dirk P. Kroese,et al. Estimating the Number of s-t Paths in a Graph , 2007, J. Graph Algorithms Appl..
[31] Panos M. Pardalos,et al. Greedy approximations for minimum submodular cover with submodular cost , 2010, Comput. Optim. Appl..
[32] Michael Sipser,et al. Introduction to the Theory of Computation , 1996, SIGA.
[33] Arunabha Sen,et al. Finding a Path Subject to Many Additive QoS Constraints , 2007, IEEE/ACM Transactions on Networking.
[34] Takahiro Hara,et al. A survey on communication and data management issues in mobile sensor networks , 2014, Wirel. Commun. Mob. Comput..
[35] Irene Casas,et al. Role of Spatial Data in the Protection of Critical Infrastructure and Homeland Defense , 2010, Applied Spatial Analysis and Policy.