


default search action
Examining Robustness and Vulnerability of Networked Systems 2014
- Sergiy Butenko, Eduardo L. Pasiliao, Volodymyr Shylo:
Examining Robustness and Vulnerability of Networked Systems. NATO Science for Peace and Security Series, D: Information and Communication Security 37, IOS Press 2014, ISBN 978-1-61499-390-2 - Joydeep Banerjee, Arun Das, Arunabha Sen:
A Survey of Interdependency Models for Critical Infrastructure Networks. 1-16 - Austin Buchanan, Nannan Chen, Xin Ma
:
Using GRASP for the Cover by s-Defective Independent Sets Problem. 17-25 - Oleg Burdakov, Patrick Doherty, Jonas Kvarnström:
Local Search for Hop-Constrained Directed Steiner Tree Problem with Application to UAV-Based Multi-Target Surveillance. 26-50 - Sonia Cafieri, Pierre Hansen, Nenad Mladenovic:
Variable Neighborhood Search for Edge-Ratio Network Clustering. 51-64 - Paola Festa:
On Data Clustering: Exact and Approximate Solutions. 65-82 - Krishna Reddy Gujjula, Krishnan Ayalur Seshadrinathan, Amirhossein Meisami:
A Hybrid Metaheuristic for the Maximum k-Plex Problem. 83-92 - Alexander Gutfraind:
Monotonic and Non-Monotonic Infections on Networks. 93-103 - Zhen Kan, John M. Shea, Warren E. Dixon:
Navigation Function Based Decentralized Control of A Multi-Agent System with Network Connectivity Constraints. 104-119 - Nickolay A. Kuznetsov:
Evaluation of the Reliability of Repairable s - t Networks by Fast Simulation Method. 120-140 - Foad Mahdavi Pajouh, Alexander Veremyev, Vladimir Boginski:
Analysis and Design of Robust Network Clusters with Bounded Diameter. 141-160 - Yannis Marinakis, Athanasios Migdalas:
Multiobjective Particle Swarm Optimization for a Multicast Routing Problem. 161-175 - Siddhartha S. Mehta, William MacKunis, Jess Willard Curtis:
Robust Networked Control Systems with Communication Constraints. 176-191 - Marta S. R. Monteiro, Dalila B. M. M. Fontes
, Fernando A. C. C. Fontes
:
Hop-Constrained Tree-Shaped Networks. 192-208 - Panos M. Pardalos, Vitaliy A. Yatsenko, Michael B. Fenn, Arkadii A. Chikrii:
Bilinear Markovian Processes of Search for Stationary and Moving Objects. 209-230 - Maciej Rysz, Foad Mahdavi Pajouh, Pavlo A. Krokhmal, Eduardo L. Pasiliao:
On Risk-Averse Weighted k-Club Problems. 231-242 - Vardan Sargsyan, Arman Sargsyan, Armen Ghazaryan:
Distributed Computer Attack Detection System for Corporate Networks. 243-250 - Yuriy Stoyan, Petro Stetsyuk, Tatiana E. Romanova:
Optimal Balanced Packing Using Phi-Function Technique. 251-271 - Satish Vadlamani, Hugh R. Medal, Burak Eksioglu:
Security in Wireless Networks: A Tutorial. 272-288 - Mario Ventresca, Dionne M. Aleman:
Approximation Algorithms for Detecting Critical Nodes. 289-305

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.