On the characterization of the structural robustness of data center networks

K Bilal, M Manzano, SU Khan, E Calle… - … on Cloud Computing, 2013 - ieeexplore.ieee.org
Data centers being an architectural and functional block of cloud computing are integral to
the Information and Communication Technology (ICT) sector. Cloud computing is rigorously …

[HTML][HTML] Vulnerability analysis of water distribution networks to accidental pipe burst

R Wéber, T Huzsvár, C Hős - Water Research, 2020 - Elsevier
Even the best-maintained water distribution network (WDN) might suffer pipe bursts
occasionally, and the utility company must reconstruct the damaged sections of the system …

Density centrality: identifying influential nodes based on area density formula

A Ibnoulouafi, M El Haziti - Chaos, Solitons & Fractals, 2018 - Elsevier
Identifying central nodes in a network is crucial to accelerate or contain the spreading of
information such as diseases and rumors. The problem is formulated as follows, given a …

[LLIBRE][B] Life as its own designer: Darwin's Origin and western thought

A Markoš, F Grygar, L Hajnal, K Kleisner, Z Kratochvíl… - 2009 - books.google.com
It has been nearly 150 years since Darwin published On the Origin of Species, and his
theory of natural selection still ignites a forest of heated debate between scientific …

Enhancing network robustness via shielding

J Zhang, E Modiano, D Hay - IEEE/ACM Transactions on …, 2017 - ieeexplore.ieee.org
We consider shielding critical links to enhance the robustness of a network, in which
shielded links are resilient to failures. We first study the problem of increasing network …

On the connectivity of data center networks

M Manzano, K Bilal, E Calle… - IEEE Communications …, 2013 - ieeexplore.ieee.org
Data Center Networks (DCNs) constitute the communication backbone for the cloud
computing paradigm. Recently, network connectivity analysis in terms of reliability has …

Through the wormhole: Tracking invisible MPLS tunnels

Y Vanaubel, P Mérindol, JJ Pansiot… - Proceedings of the 2017 …, 2017 - dl.acm.org
For years, Internet topology research has been conducted through active measurement. For
instance, Caida builds router level topologies on top of IP level traces obtained with …

Failure of the simultaneous block diagonalization technique applied to complete and cluster synchronization of random networks

S Panahi, N Amaya, I Klickstein, G Novello… - Physical Review E, 2022 - APS
We discuss here the application of the simultaneous block diagonalization (SBD) of matrices
to the study of the stability of both complete and cluster synchronization in random (generic) …

Prebunking Design as a Defense Mechanism Against Misinformation Propagation on Social Networks

YE Bayiz, U Topcu - arxiv preprint arxiv:2311.14200, 2023 - arxiv.org
The growing reliance on social media for news consumption necessitates effective
countermeasures to mitigate the rapid spread of misinformation. Prebunking, a proactive …

Sensitivity metrics of complex network based on co-occurrence truth table: exemplified by a high-speed rail network

J Luo, T Fei, M Tian, Y Liu, M Bian - Journal of Geographical Systems, 2023 - Springer
As a mathematical scaffold for network science, graph theory abstracts complex systems into
complex networks. However, graphs ignore the multiplicity of combinatorial relationships in …