Analysis of critical damage in the communication network. I: Model and computational experiment
From MaRDI portal
Publication:1995357
Recommendations
- Analysis of critical damage in the communication network. III: Analysis of internode flows
- Models and methods for solving the problem of network vulnerability
- Analysis of critical damage in the communication network. II: Guaranteed functional performance estimates
- Analysis of critical damage in the communication network. IV: Multicriteria estimations of cluster vulnerability
- An approach to the analysis of possible structural damages in multicommodity network systems
Cites work
- scientific article; zbMATH DE number 3441964 (Why is no real title available?)
- An approach to the analysis of possible structural damages in multicommodity network systems
- Analysis of cluster damages in network systems
- Fuel and energy system control at large-scale damages. IV: A priori estimates of structural and functional vulnerability
- Introduction to algorithms.
- Selected topics in critical element detection
- Solving the bi-objective maximum-flow network-interdiction problem
- The bi-objective critical node detection problem
- The critical node detection problem in networks: a survey
Cited in
(8)- An approach to the analysis of possible structural damages in multicommodity network systems
- Analysis of cluster damages in network systems
- Analysis of critical damage in the communication network. IV: Multicriteria estimations of cluster vulnerability
- Analysis of critical damage in the communication network. III: Analysis of internode flows
- Analysis of critical damage in the communication network. II: Guaranteed functional performance estimates
- Fuel and energy system control at large-scale damages. IV: A priori estimates of structural and functional vulnerability
- On the performance of damaged linear networks
- A computational approach to determine damage in infrastructure networks from outage reports
This page was built for publication: Analysis of critical damage in the communication network. I: Model and computational experiment
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1995357)