Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigation of Malicious Attacks on Networks, , , , and . CoRR, (2011)Particles in fluids., , and . Comput. Phys. Commun., 177 (1-2): 158-161 (2007)Flow through time-evolving porous media: Swelling and erosion., , , and . J. Comput. Sci., (2021)Predicting oil recovery using percolation, , , , , , and . Physica A: Statistical and Theoretical Physics, 266 (1-4): 107--114 (Apr 15, 1999)Optimal box-covering algorithm for fractal dimension of complex networks, , , and . CoRR, (2012)Collaboration networks from a large CV database: dynamics, topology and bonus impact., , , , and . CoRR, (2013)Sand transport on Mars., , , , and . Comput. Phys. Commun., 180 (4): 609-611 (2009)Fast algorithm to identify cluster synchrony through fibration symmetries in large information-processing networks., , , , and . CoRR, (2021)Digital contact tracing and network theory to stop the spread of COVID-19 using big-data on human mobility geolocalization., , , , , , , , and . PLoS Comput. Biol., (2022)Enhanced Flow in Small-World Networks., , , and . CoRR, (2013)