2018
DOI: 10.1109/jstsp.2018.2844813
|View full text |Cite
|
Sign up to set email alerts
|

Averting Cascading Failures in Networked Infrastructures: Poset-Constrained Graph Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 20 publications
(23 citation statements)
references
References 36 publications
0
23
0
Order By: Relevance
“…u is a tree, we can apply the result of Theorem 3 in [6] to complete the rest of the proof. Corollary 2.…”
Section: Combining Two Results Above We Havementioning
confidence: 99%
See 2 more Smart Citations
“…u is a tree, we can apply the result of Theorem 3 in [6] to complete the rest of the proof. Corollary 2.…”
Section: Combining Two Results Above We Havementioning
confidence: 99%
“…The authors in [5] then proved that the distance center of the rumor subgraph was shown to be a good approximation to the rumor source. In particular, the distance center is exactly the maximum-likelihood estimator of the rumor source when the rumor subgraph is a degree regular tree [6]. Thus, we focus on utilizing MEGA to find the distance-based rumor source estimator.…”
Section: Preliminaries Of Network Centrality Computationmentioning
confidence: 99%
See 1 more Smart Citation
“…The work in [16] considered the Susceptible-Infected-Recovered spreading model and proposed a sample-path-based approach to finding the source estimator. Other similar problem variants include the work in [17] on obfuscating the source instead of identifying it, the work in [18] on protecting the network in advance to minimize the impact of cascading failure, and the work in [19] consider a dynamic network model where edges may vary over time.…”
Section: Introductionmentioning
confidence: 99%
“…In order to spread D2D-based SNS as a future Internet application, it is indispensable to avoid the cascading failure. Therefore, several methods have already been proposed [18], [19]. However, these methods are not so effective in D2D-based SNS because the complete information on network topology is needed.…”
Section: Introductionmentioning
confidence: 99%