Abstract. Despite the recent emergence of many large-scale networks in different application domains, an important measure that captures a participant’s diversity in the network ...
Lu Liu, Feida Zhu, Chen Chen, Xifeng Yan, Jiawei H...
In this paper, we develop an analytical framework to measure the vulnerability of superpeer networks against attack. Two different kinds of attacks namely deterministic and degre...
Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy ...
This paper describes a method allowing the automatic multi-texturing and simulation of surface imperfections based on a cellular network. In this representation, networks of conne...
Scholars, advertisers and political activists see massive online social networks as a representation of social interactions that can be used to study the propagation of ideas, soc...
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...