default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 32 matches
- 2013
- Mehmet Burak Akgun, Mehmet Hadi Gunes:
Bipartite Internet topology at the subnet-level. NSW 2013: 94-97 - Helen Armstrong, Desmond Klass:
Networks of nurses: A case study in informal networks of advice. NSW 2013: 144-151 - Chris Arney, Kate Coronges, Hilary Fletcher, John Hagen, Kira Hutchinson, Allen Moss, Charles Thomas:
Using rare event modeling & networking to build scenarios and forecast the future. NSW 2013: 31-36 - Brendan J. Babb, Bilal Gonen:
Lowering six degrees of Kevin Bacon by genetic algorithm. NSW 2013: 156-159 - Jigar Brahmbhatt, Ronaldo Menezes:
On the relation between tourism and trade: A network experiment. NSW 2013: 74-81 - Hsiu-Ming Chang, Ann-Shyn Chiang, Walter Didimo, Ching-Yao Lin, Giuseppe Liotta, Fabrizio Montecchiani:
On the robustness of the Drosophila neural network. NSW 2013: 168-171 - Brian Cloteaux:
Limits in modeling power grid topology. NSW 2013: 16-22 - Louise K. Comfort, Günes Ertan, Namkyung Oh, Thomas Haase:
Network evolution in disaster management: A comparison of response systems evolving after the 2005 and 2008 gulf coast hurricanes. NSW 2013: 42-49 - Keryl Ann Cosenzo, Boleslaw K. Szymanski:
Challenges of social cognitive network science: network science collaborative technology alliance perspective. NSW 2013: 122-125 - Matthew Dippel, Chjan C. Lim:
A coauthorship network and preliminary results of binary agreement model simulations. NSW 2013: 37-41 - William Dron, Alice Leung, Md. Yusuf Sarwar Uddin, Shiguang Wang, Tarek F. Abdelzaher, Ramesh Govindan, John P. Hancock:
Information-maximizing caching in Ad Hoc networks with named data networking. NSW 2013: 90-93 - Patrick M. Dudas:
Cooperative, dynamic Twitter parsing and visualization for dark network analysis. NSW 2013: 172-176 - Nurcan Durak, Tamara G. Kolda, Ali Pinar, C. Seshadhri:
A scalable null model for directed graphs matching all degree distributions: In, out, and reciprocal. NSW 2013: 23-30 - Matt Grimm, Bilal Gonen:
Improving music artist recommendations through analysis of influences. NSW 2013: 110-113 - John R. James, Frank Mabry, Aaron St. Leger, Tom Cook, Kevin Huggins:
Cyber-physical situation awareness and decision support. NSW 2013: 114-117 - Komal Kapoor, Dhruv Sharma, Jaideep Srivastava:
Weighted node degree centrality for hypergraphs. NSW 2013: 152-155 - Alice Leung, William Dron, John P. Hancock, Matthew Aguirre, Jon Purnell, Jiawei Han, Chi Wang, Jaideep Srivastava, Amogh Mahapatra, Atanu Roy, Lisa Scott:
Social patterns: Community detection using behavior-generated network datasets. NSW 2013: 82-89 - Basim Mahmood, Ronaldo Menezes:
United states congress relations according to liberal and conservative newspapers. NSW 2013: 98-101 - Gabriele Oliva, Luisa Di Paola, Alessandro Giuliani, Federica Pascucci, Roberto Setola:
Assessing protein resilience via a complex network approach. NSW 2013: 131-137 - Gabriele Oliva, Stefano Panzieri, Federica Pascucci, Roberto Setola:
Exploiting routing information in Wireless Sensor Networks localization. NSW 2013: 66-73 - W. Hasala Peiris, Helen Armstrong:
A meta-network approach for analysing the information system access vulnerabilities in organizations. NSW 2013: 50-57 - Max Planck, Peter C. Anselmo:
Community-based identification of banking networks. NSW 2013: 102-105 - Max Planck, Charles Brock, Dietrich Bachman, Jeffrey Fenchel, Isis Lyman Pollard:
Application of information diffusion in social networks: Verifying the use of web/blog topology entropy as an indicator for real world impact. NSW 2013: 164-167 - Max Planck, Isis Lyman Pollard, Charles Brock, Alexander George:
Initial indicators of topic success in Twitter: Using topology entropy to predict the success of Twitter hashtags. NSW 2013: 160-163 - S. Yousaf Shah, Boleslaw K. Szymanski:
Price based routing for event driven prioritized traffic in wireless sensor networks. NSW 2013: 1-8 - Paulo Shakarian, V. S. Subrahmanian:
Geospatial optimization problems. NSW 2013: 118-121 - Yosef Treitman, Chjan C. Lim, Weituo Zhang, Andrew M. Thompson:
Naming game with greater stubbornness and unilateral zealots. NSW 2013: 126-130 - Xuetao Wei, Nicholas Valler, Michalis Faloutsos, Iulian Neamtiu, B. Aditya Prakash, Christos Faloutsos:
Smartphone viruses propagation on heterogeneous composite networks. NSW 2013: 106-109 - Goitom Weldehawaryat, Stephen D. Wolthusen:
Asynchronous message-passing binary consensus over non-complete graphs. NSW 2013: 9-15 - Jierui Xie, Boleslaw K. Szymanski:
LabelRank: A stabilized label propagation algorithm for community detection in networks. NSW 2013: 138-143
skipping 2 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-09 09:18 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint