Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/im/im11.bht:"
@article{DBLP:journals/im/AugustineCEFGS15, author = {John Augustine and Ning Chen and Edith Elkind and Angelo Fanelli and Nick Gravin and Dmitry Shiryaev}, title = {Dynamics of Profit-Sharing Games}, journal = {Internet Math.}, volume = {11}, number = {1}, pages = {1--22}, year = {2015}, url = {https://doi.org/10.1080/15427951.2013.830164}, doi = {10.1080/15427951.2013.830164}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/AugustineCEFGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/BerryFNPSW15, author = {Jonathan W. Berry and Luke A. Fostvedt and Daniel J. Nordman and Cynthia A. Phillips and C. Seshadhri and Alyson G. Wilson}, title = {Why Do Simple Algorithms for Triangle Enumeration Work in the Real World?}, journal = {Internet Math.}, volume = {11}, number = {6}, pages = {555--571}, year = {2015}, url = {https://doi.org/10.1080/15427951.2015.1037030}, doi = {10.1080/15427951.2015.1037030}, timestamp = {Thu, 07 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/BerryFNPSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/BloznelisK15, author = {Mindaugas Bloznelis and Michal Karonski}, title = {Random Intersection Graph Process}, journal = {Internet Math.}, volume = {11}, number = {4-5}, pages = {385--402}, year = {2015}, url = {https://doi.org/10.1080/15427951.2014.982310}, doi = {10.1080/15427951.2014.982310}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/BloznelisK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/BonatoP15, author = {Anthony Bonato and Pawel Pralat}, title = {Special Issue on Algorithms and Models for the Web-graph}, journal = {Internet Math.}, volume = {11}, number = {4-5}, pages = {307}, year = {2015}, url = {https://doi.org/10.1080/15427951.2015.1069522}, doi = {10.1080/15427951.2015.1069522}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/BonatoP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/BrautbarDK15, author = {Michael Brautbar and Moez Draief and Sanjeev Khanna}, title = {On the Power of Planned Infections in Networks}, journal = {Internet Math.}, volume = {11}, number = {4-5}, pages = {319--332}, year = {2015}, url = {https://doi.org/10.1080/15427951.2014.982312}, doi = {10.1080/15427951.2014.982312}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/BrautbarDK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/CaiD15, author = {Xing Shi Cai and Luc Devroye}, title = {The Analysis of Kademlia for Random IDs}, journal = {Internet Math.}, volume = {11}, number = {6}, pages = {572--587}, year = {2015}, url = {https://doi.org/10.1080/15427951.2015.1051674}, doi = {10.1080/15427951.2015.1051674}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/CaiD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/ChungK15, author = {Fan Chung and Mark Kempton}, title = {A Local Clustering Algorithm for Connection Graphs}, journal = {Internet Math.}, volume = {11}, number = {4-5}, pages = {333--351}, year = {2015}, url = {https://doi.org/10.1080/15427951.2014.968295}, doi = {10.1080/15427951.2014.968295}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/ChungK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/ChungS15, author = {Fan Chung and Olivia Simpson}, title = {Solving Local Linear Systems with Boundary Conditions Using Heat Kernel Pagerank}, journal = {Internet Math.}, volume = {11}, number = {4-5}, pages = {449--471}, year = {2015}, url = {https://doi.org/10.1080/15427951.2015.1009522}, doi = {10.1080/15427951.2015.1009522}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/ChungS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/CooperF15, author = {Colin Cooper and Alan M. Frieze}, title = {Long Paths in Random Apollonian Networks}, journal = {Internet Math.}, volume = {11}, number = {4-5}, pages = {308--318}, year = {2015}, url = {https://doi.org/10.1080/15427951.2014.925524}, doi = {10.1080/15427951.2014.925524}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/CooperF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/DinhT15, author = {Thang N. Dinh and My T. Thai}, title = {Toward Optimal Community Detection: From Trees to General Weighted Networks}, journal = {Internet Math.}, volume = {11}, number = {3}, pages = {181--200}, year = {2015}, url = {https://doi.org/10.1080/15427951.2014.950875}, doi = {10.1080/15427951.2014.950875}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/DinhT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/GleichK15, author = {David F. Gleich and Kyle Kloster}, title = {Sublinear Column-wise Actions of the Matrix Exponential on Social Networks}, journal = {Internet Math.}, volume = {11}, number = {4-5}, pages = {352--384}, year = {2015}, url = {https://doi.org/10.1080/15427951.2014.971203}, doi = {10.1080/15427951.2014.971203}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/im/GleichK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/GoelSIG15, author = {Keshav Goel and Rishi Ranjan Singh and Sudarshan Iyengar and Sukrit Gupta}, title = {A Faster Algorithm to Update Betweenness Centrality After Node Alteration}, journal = {Internet Math.}, volume = {11}, number = {4-5}, pages = {403--420}, year = {2015}, url = {https://doi.org/10.1080/15427951.2014.982311}, doi = {10.1080/15427951.2014.982311}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/GoelSIG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/Grechnikov15, author = {Evgeny A. Grechnikov}, title = {The Degree Distribution and the Number of Edges Between Nodes of given Degrees in Directed Scale-Free Graphs}, journal = {Internet Math.}, volume = {11}, number = {6}, pages = {487--527}, year = {2015}, url = {https://doi.org/10.1080/15427951.2015.1012609}, doi = {10.1080/15427951.2015.1012609}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/Grechnikov15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/HoornL15, author = {Pim van der Hoorn and Nelly Litvak}, title = {Degree-Degree Dependencies in Directed Networks with Heavy-Tailed Degrees}, journal = {Internet Math.}, volume = {11}, number = {2}, pages = {155--179}, year = {2015}, url = {https://doi.org/10.1080/15427951.2014.927038}, doi = {10.1080/15427951.2014.927038}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/HoornL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/JanssenV15, author = {Jeannette C. M. Janssen and Celeste Vautour}, title = {Finding Safe Strategies for Competitive Diffusion on Trees}, journal = {Internet Math.}, volume = {11}, number = {3}, pages = {232--252}, year = {2015}, url = {https://doi.org/10.1080/15427951.2014.977407}, doi = {10.1080/15427951.2014.977407}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/JanssenV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/JohnsonD15, author = {Samuel D. Johnson and Raissa M. D'Souza}, title = {Inequality and Network Formation Games}, journal = {Internet Math.}, volume = {11}, number = {3}, pages = {253--276}, year = {2015}, url = {https://doi.org/10.1080/15427951.2014.979380}, doi = {10.1080/15427951.2014.979380}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/JohnsonD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/Kunegis15, author = {J{\'{e}}r{\^{o}}me Kunegis}, title = {Exploiting The Structure of Bipartite Graphs for Algebraic and Spectral Graph Theory Applications}, journal = {Internet Math.}, volume = {11}, number = {3}, pages = {201--321}, year = {2015}, url = {https://doi.org/10.1080/15427951.2014.958250}, doi = {10.1080/15427951.2014.958250}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/Kunegis15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/LaK15, author = {Richard J. La and Maya Kabkab}, title = {A New Random Graph Model with Self-Optimizing Nodes: Connectivity and Diameter}, journal = {Internet Math.}, volume = {11}, number = {6}, pages = {528--554}, year = {2015}, url = {https://doi.org/10.1080/15427951.2015.1022626}, doi = {10.1080/15427951.2015.1022626}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/LaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/LaszkaG15, author = {Aron Laszka and Assane Gueye}, title = {Network Topology Vulnerability/Cost Trade-Off: Model, Application, and Computational Complexity}, journal = {Internet Math.}, volume = {11}, number = {6}, pages = {588--626}, year = {2015}, url = {https://doi.org/10.1080/15427951.2015.1018019}, doi = {10.1080/15427951.2015.1018019}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/LaszkaG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/Li0WZ15, author = {Yanhua Li and Wei Chen and Yajun Wang and Zhi{-}Li Zhang}, title = {Voter Model on Signed Social Networks}, journal = {Internet Math.}, volume = {11}, number = {2}, pages = {93--133}, year = {2015}, url = {https://doi.org/10.1080/15427951.2013.862884}, doi = {10.1080/15427951.2013.862884}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/im/Li0WZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/LiT15, author = {Shi Li and Gabriel H. Tucci}, title = {Traffic Congestion in Expanders and (\emph{p}, {\(\delta\)})-Hyperbolic Spaces}, journal = {Internet Math.}, volume = {11}, number = {2}, pages = {134--142}, year = {2015}, url = {https://doi.org/10.1080/15427951.2014.884513}, doi = {10.1080/15427951.2014.884513}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/LiT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/MaftouhiHM15, author = {Abdelhakim El Maftouhi and Ararat Harutyunyan and Yannis Manoussakis}, title = {Weak Balance in Random Signed Graphs}, journal = {Internet Math.}, volume = {11}, number = {2}, pages = {143--154}, year = {2015}, url = {https://doi.org/10.1080/15427951.2014.912994}, doi = {10.1080/15427951.2014.912994}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/MaftouhiHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/MamageishviliMM15, author = {Akaki Mamageishvili and Mat{\'{u}}s Mihal{\'{a}}k and Dominik M{\"{u}}ller}, title = {Tree Nash Equilibria in the Network Creation Game}, journal = {Internet Math.}, volume = {11}, number = {4-5}, pages = {472--486}, year = {2015}, url = {https://doi.org/10.1080/15427951.2015.1016248}, doi = {10.1080/15427951.2015.1016248}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/MamageishviliMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/NarayanST15, author = {Onuttom Narayan and Iraj Saniee and Gabriel H. Tucci}, title = {Lack of Hyperbolicity in Asymptotic Erd{\"{o}}s-Renyi Sparse Random Graphs}, journal = {Internet Math.}, volume = {11}, number = {3}, pages = {277--288}, year = {2015}, url = {https://doi.org/10.1080/15427951.2014.1002640}, doi = {10.1080/15427951.2014.1002640}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/NarayanST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/PattabiramanPGL15, author = {Bharath Pattabiraman and Md. Mostofa Ali Patwary and Assefaw Hadish Gebremedhin and Wei{-}keng Liao and Alok N. Choudhary}, title = {Fast Algorithms for the Maximum Clique Problem on Massive Graphs with Applications to Overlapping Community Detection}, journal = {Internet Math.}, volume = {11}, number = {4-5}, pages = {421--448}, year = {2015}, url = {https://doi.org/10.1080/15427951.2014.986778}, doi = {10.1080/15427951.2014.986778}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/PattabiramanPGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/Thornblad15, author = {Erik Th{\"{o}}rnblad}, title = {Asymptotic Degree Distribution of a Duplication-Deletion Random Graph Model}, journal = {Internet Math.}, volume = {11}, number = {3}, pages = {289--305}, year = {2015}, url = {https://doi.org/10.1080/15427951.2015.1009523}, doi = {10.1080/15427951.2015.1009523}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/Thornblad15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/XuDX15, author = {Maochao Xu and Gaofeng Da and Shouhuai Xu}, title = {Cyber Epidemic Models with Dependences}, journal = {Internet Math.}, volume = {11}, number = {1}, pages = {62--92}, year = {2015}, url = {https://doi.org/10.1080/15427951.2014.902407}, doi = {10.1080/15427951.2014.902407}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/XuDX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/XuLL15, author = {Shouhuai Xu and Wenlian Lu and Hualun Li}, title = {A Stochastic Model of Active Cyber Defense Dynamics}, journal = {Internet Math.}, volume = {11}, number = {1}, pages = {23--61}, year = {2015}, url = {https://doi.org/10.1080/15427951.2013.830583}, doi = {10.1080/15427951.2013.830583}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/XuLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.