From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mitigation of Malicious Attacks on Networks, , , , и . CoRR, (2011)Statistical patterns of visual search for hidden objects, , , , и . SCIENTIFIC REPORTS, (2012)Mitigation of malicious attacks on networks, , , , и . PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 108 (10): 3838-3841 (2011)Onion-like network topology enhances robustness against malicious attacks, , , , и . JOURNAL OF STATISTICAL MECHANICS-THEORY AND EXPERIMENT, (2011)Finite-size effects for percolation on Apollonian networks, , , и . PHYSICAL REVIEW E, (2008)Overdamped dynamics of particles with repulsive power-law interactions, , , , и . PHYSICAL REVIEW E, (2018)Gender differences in scientific collaborations: Women are more egalitarian than men, , , , и . PLOS ONE, (2017)Reservoir mapping by global correlation analysis, , , и . INTERNATIONAL JOURNAL OF ROCK MECHANICS AND MINING SCIENCES, (2014)Collaboration networks from a large CV database: dynamics, topology and bonus impact., , , , и . CoRR, (2013)A Solution to the Challenge of Optimization on ``Golf-Course''-Like Fitness Landscapes, , , , , и . PLOS ONE, (2013)