The progress of mobile device technology unfolds a new spectrum of applications that challenges conventional infrastructure models. Most of these devices are perceived by their us...
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...
Word-of-mouth communication has been shown to play a key role in a variety of environments such as viral marketing and virus spreading. A family of algorithms, generally known as ...
Given a contact network that changes over time (say, day vs night connectivity), and the SIS (susceptible/infected/susceptible, flu like) virus propagation model, what can we say ...
B. Aditya Prakash, Hanghang Tong, Nicholas Valler,...
Many systems in sciences, engineering and nature can be modeled as networks. Examples are internet, metabolic networks and social networks. Network clustering algorithms aimed to ...
Nurcan Yuruk, Mutlu Mete, Xiaowei Xu, Thomas A. J....