Author of the publication

Tolerance of scale-free networks: from friendly to intentional attack strategies

, , , , and . Physica A: Statistical Mechanics and its Applications, 344 (3-4): 504--509 (Dec 15, 2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Protection of a High Performance Load Balancer Against SYN Attacks**This is an extended journal version of 2., , , and . IEEE Trans. Cloud Comput., 11 (3): 2897-2909 (July 2023)Optimal Path and Minimal Spanning Trees in Random Weighted Networks., , , , , , , , , and . Int. J. Bifurc. Chaos, 17 (7): 2215-2255 (2007)Online exploration outside a convex obstacle., , , and . Theor. Comput. Sci., (2022)Video-on-Demand Session Management., and . IEEE J. Sel. Areas Commun., 14 (6): 1151-1161 (1996)Bounding the bias of tree-like sampling in IP topologies., , and . Networks Heterog. Media, 3 (2): 323-332 (2008)On interval and circular-arc covering problems., and . Ann. Oper. Res., 275 (2): 281-295 (2019)Micro Base Station Aided Failover for Multicast Scheduling in Wireless Cellular Networks., , and . IEEE Trans. Wirel. Commun., 13 (9): 5251-5263 (2014)An efficient priority mechanism for token-ring networks., and . IEEE Trans. Commun., 42 (234): 1769-1777 (1994)Multiple logical token-rings in a single high-speed ring., and . IEEE Trans. Commun., 42 (234): 1712-1721 (1994)Robot Convergence via Center-of-Gravity Algorithms., and . SIROCCO, volume 3104 of Lecture Notes in Computer Science, page 79-88. Springer, (2004)