Muutke küpsiste eelistusi

Examining Robustness and Vulnerability of Networked Systems [Kõva köide]

Edited by , Edited by , Edited by
Teised raamatud teemal:
Teised raamatud teemal:
Modern critical infrastructure is characterized by complex, heterogeneous and dynamically evolving networks. But these can be vulnerable to component failure, and this is a problem which must be addressed by realistic mathematical models. This book presents papers from the NATO Advanced Research Workshop (ARW), Examining Robustness and Vulnerability of Critical Infrastructure Networks, held in Kiev, Ukraine, in June 2013. Contributions were from workshop participants as well as invited experts in the field, and cover topics including: mathematical models; probability-based risk measures; algorithms for the design and detection of robust structures; identification of critical network components and case studies. This book will be of interest to researchers, practitioners and graduate students in the fields of mathematics, computer science and engineering.
Preface v
A Survey of Interdependency Models for Critical Infrastructure Networks
1(16)
Joydeep Banerjee
Arun Das
Arunabha Sen
Using GRASP for the Cover by s-Defective Independent Sets Problem
17(9)
Austin Buchanan
Nannan Chen
Xin Ma
Local Search for Hop-Constrained Directed Steiner Tree Problem with Application to UAV-Based Multi-Target Surveillance
26(25)
Oleg Burdakov
Patrick Doherty
Jonas Kvarnstrom
Variable Neighborhood Search for Edge-Ratio Network Clustering
51(14)
Sonia Cafieri
Pierre Hansen
Nenad Mladenovic
On Data Clustering: Exact and Approximate Solutions
65(18)
Paola Festa
A Hybrid Metaheuristic for the Maximum k-Plex Problem
83(10)
Krishna Reddy Gujjula
Krishnan Ayalur Seshadrinathan
Amirhossein Meisami
Monotonic and Non-Monotonic Infections on Networks
93(11)
Alexander Gutfraind
Navigation Function Based Decentralized Control of A Multi-Agent System with Network Connectivity Constraints
104(16)
Zhen Kan
John M. Shea
Warren E. Dixon
Evaluation of the Reliability of Repairable S -- T Networks by Fast Simulation Method
120(21)
Nickolay Kuznetsov
Analysis and Design of Robust Network Clusters with Bounded Diameter
141(20)
Foad Mahdavi Pajouh
Alexander Veremyev
Vladimir Boginski
Multiobjective Particle Swarm Optimization for a Multicast Routing Problem
161(15)
Yannis Marinakis
Athanasios Migdalas
Robust Networked Control Systems with Communication Constraints
176(16)
Siddhartha S. Mehta
William Mackunis
Jess W. Curtis
Hop-Constrained Tree-Shaped Networks
192(17)
Marta S.R. Monteiro
Dalila B.M.M. Fontes
Fernando A.C.C. Fontes
Bilinear Markovian Processes of Search for Stationary and Moving Objects
209(22)
Panos M. Pardalos
Vitally A. Yatsenko
Michael B. Fenn
Arkadii A. Chikrii
On Risk-Averse Weighted A-Club Problems
231(12)
Maciej Rysz
Foad Mahdavi Pajouh
Pavlo Krokhmal
Eduardo Pasiliao
Distributed Computer Attack Detection System for Corporate Networks
243(8)
Vardan Sargsyan
Arman Sargsyan
Armen Ghazaryan
Optimal Balanced Packing Using Phi-Function Technique
251(21)
Yuriy Stoyan
Petro Stetsyuk
Tatiana Romanova
Security in Wireless Networks: A Tutorial
272(17)
Satish Vadlamani
Hugh Medal
Burak Eksioglu
Approximation Algorithms for Detecting Critical Nodes
289(18)
Mario Ventresca
Dionne Aleman
Subject Index 307(2)
Author Index 309