Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigation of Malicious Attacks on Networks, , , , and . CoRR, (2011)Predicting oil recovery using percolation, , , , , , and . Physica A: Statistical and Theoretical Physics, 266 (1-4): 107--114 (Apr 15, 1999)Particles in fluids., , and . Comput. Phys. Commun., 177 (1-2): 158-161 (2007)Reservoir mapping by global correlation analysis, , , and . INTERNATIONAL JOURNAL OF ROCK MECHANICS AND MINING SCIENCES, (2014)Origins of power-law degree distribution in the heterogeneity of human activity in social networks, , , , , , and . SCIENTIFIC REPORTS, (2013)Statistical patterns of visual search for hidden objects, , , , and . SCIENTIFIC REPORTS, (2012)Transverse Instability of Dunes, , and . PHYSICAL REVIEW LETTERS, (2011)Tricritical Point in Explosive Percolation, , , and . PHYSICAL REVIEW LETTERS, (2011)Onion-like network topology enhances robustness against malicious attacks, , , , and . JOURNAL OF STATISTICAL MECHANICS-THEORY AND EXPERIMENT, (2011)Particle capture into the lung made simple?, , , , , and . JOURNAL OF APPLIED PHYSIOLOGY, 110 (6): 1664-1673 (2011)