skip to main content
Skip header Section
The Combinatorics of Network ReliabilityJanuary 1987
Publisher:
  • Oxford University Press, Inc.
  • 198 Madison Ave. New York, NY
  • United States
ISBN:978-0-19-504920-6
Published:01 January 1987
Pages:
176
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Kahl N and Luttrell K (2023). On maximum graphs in Tutte polynomial posets, Discrete Applied Mathematics, 339:C, (78-88), Online publication date: 15-Nov-2023.
  2. Chappidi E and Singh A (2023). A hyper-heuristic based approach with naive Bayes classifier for the reliability p-median problem, Applied Intelligence, 53:22, (27269-27289), Online publication date: 1-Nov-2023.
  3. Brown J (2022). Maximal intervals of decrease and inflection points for node reliability, Discrete Applied Mathematics, 313:C, (40-44), Online publication date: 31-May-2022.
  4. Safaei F, Akbar R and Moudi M (2022). Efficient methods for computing the reliability polynomials of graphs and complex networks, The Journal of Supercomputing, 78:7, (9741-9781), Online publication date: 1-May-2022.
  5. Liu M, Qi X and Pan H (2022). Construction of network topology and geographical vulnerability for telecommunication network, Computer Networks: The International Journal of Computer and Telecommunications Networking, 205:C, Online publication date: 14-Mar-2022.
  6. Kahl N (2022). Extremal graphs for the Tutte polynomial, Journal of Combinatorial Theory Series B, 152:C, (121-152), Online publication date: 1-Jan-2022.
  7. Shakhov V and Migov D An Effective Method for Ensuring the Reliability of a Critical Infrastructure Monitoring Network Computational Science and Its Applications – ICCSA 2021, (526-535)
  8. Llagostera P, López N and Comas C (2021). Network reliability in hamiltonian graphs, Discrete Optimization, 41:C, Online publication date: 1-Aug-2021.
  9. Gupta A, Lee E and Li J The connectivity threshold for dense graphs Proceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, (89-105)
  10. Wang T, Shao F and Zhu K (2021). Structural health analysis on cyber physical system based on reliability, The Journal of Supercomputing, 77:1, (445-470), Online publication date: 1-Jan-2021.
  11. Mochalov V and Mochalova A Application of Expert Systems and Simulation Modeling to Calculate Connectivity Between the Nodes of the Graph Advances in Soft Computing, (470-480)
  12. ACM
    Peng P and Yoshida Y Average Sensitivity of Spectral Clustering Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (1132-1140)
  13. Lagos G and Romero P On the Reliability of Dynamical Stochastic Binary Systems Machine Learning, Optimization, and Data Science, (516-527)
  14. Chen S and Lin Y (2020). A permutation-and-backtrack approach for reliability evaluation in multistate information networks, Applied Mathematics and Computation, 373:C, Online publication date: 15-May-2020.
  15. Li H, Patterson S, Yi Y and Zhang Z (2020). Maximizing the Number of Spanning Trees in a Connected Graph, IEEE Transactions on Information Theory, 66:2, (1248-1260), Online publication date: 1-Feb-2020.
  16. ACM
    Altherwy Y, Elmallah E and McCann J Two-terminal connectivity in UWSN probabilistic graphs: A polynomial time algorithm Proceedings of the 17th Conference on Embedded Networked Sensor Systems, (444-445)
  17. Rela G, Robledo F and Romero P Uniformly Most-Reliable Graphs and Antiholes Machine Learning, Optimization, and Data Science, (434-444)
  18. Azad N and Hassini E (2019). A Benders Decomposition Method for Designing Reliable Supply Chain Networks Accounting for Multimitigation Strategies and Demand Losses, Transportation Science, 53:5, (1287-1312), Online publication date: 1-Sep-2019.
  19. Brown J and DeGagné C (2019). On the reliability roots of simplicial complexes and matroids, Discrete Mathematics, 342:8, (2356-2370), Online publication date: 1-Aug-2019.
  20. Hao Z, Yeh W, Wang J, Wang G and Sun B (2019). A Quick Inclusion-Exclusion technique, Information Sciences: an International Journal, 486:C, (20-30), Online publication date: 1-Jun-2019.
  21. Elbassioni K, Rauf I and Ray S (2019). A global parallel algorithm for enumerating minimal transversals of geometric hypergraphs, Theoretical Computer Science, 767:C, (26-33), Online publication date: 3-May-2019.
  22. (2019). AltaRica 3.0 in ten modelling patterns, International Journal of Critical Computer-Based Systems, 9:1-2, (133-165), Online publication date: 1-Jan-2019.
  23. He L, Cao Q, Shang F and Sarder M (2019). Measuring Component Importance for Network System Using Cellular Automata, Complexity, 2019, Online publication date: 1-Jan-2019.
  24. Brown J and Cox D (2018). Optimal Graphs for Independence and k-Independence Polynomials, Graphs and Combinatorics, 34:6, (1445-1457), Online publication date: 1-Nov-2018.
  25. Banfi J, Basilico N and Amigoni F (2018). Multirobot Reconnection on Graphs: Problem, Complexity, and Algorithms, IEEE Transactions on Robotics, 34:5, (1299-1314), Online publication date: 1-Oct-2018.
  26. ACM
    Petelin O and Betz V (2018). Wotan, ACM Transactions on Reconfigurable Technology and Systems, 11:2, (1-23), Online publication date: 30-Jun-2018.
  27. ACM
    Bezawada B, Kulkarni S, Ray I, Ray I and Li R Independent Key Distribution Protocols for Broadcast Authentication Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, (27-38)
  28. Wu C, Wang Y, Lu Z, Pardalos P, Xu D, Zhang Z and Du D (2018). Solving the degree-concentrated fault-tolerant spanning subgraph problem by DC programming, Mathematical Programming: Series A and B, 169:1, (255-275), Online publication date: 1-May-2018.
  29. Jin W, Yu P, Xiong A, Zhang Q, Jin D, Zhang G and Wang Y An approximate all-terminal reliability evaluation method for large-scale smart grid communication systems NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium, (1-5)
  30. Hu J, Wu X, Cheng R, Luo S and Fang Y (2017). On Minimal Steiner Maximum-Connected Subgraph Queries, IEEE Transactions on Knowledge and Data Engineering, 29:11, (2455-2469), Online publication date: 1-Nov-2017.
  31. Sun H, Cai X and Chen H (2017). Study on Parameter Evaluation System of Communication Network, Procedia Computer Science, 107:C, (584-589), Online publication date: 1-Apr-2017.
  32. Gatterbauer W and Suciu D (2017). Dissociation and propagation for approximate lifted inference with standard relational database management systems, The VLDB Journal — The International Journal on Very Large Data Bases, 26:1, (5-30), Online publication date: 1-Feb-2017.
  33. Kahl N (2016). On constructing rational spanning tree edge densities, Discrete Applied Mathematics, 213:C, (224-232), Online publication date: 20-Nov-2016.
  34. ACM
    Bergner M, LÜbbecke M and Witt J (2016). A Branch-Price-and-Cut Algorithm for Packing Cuts in Undirected Graphs, ACM Journal of Experimental Algorithmics, 21, (1-16), Online publication date: 4-Nov-2016.
  35. ACM
    Hu J, Wu X, Cheng R, Luo S and Fang Y Querying Minimal Steiner Maximum-Connected Subgraphs in Large Graphs Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, (1241-1250)
  36. Brown J and Mol L (2016). On the roots of the node reliability polynomial, Networks, 68:3, (238-246), Online publication date: 1-Oct-2016.
  37. Brown J and Cox D (2016). Inflection points of reliability polynomials are dense in [0,1], Networks, 67:4, (266-269), Online publication date: 1-Jul-2016.
  38. ACM
    Botev Z, L'Ecuyer P, Simard R and Tuffin B (2016). Static Network Reliability Estimation under the Marshall-Olkin Copula, ACM Transactions on Modeling and Computer Simulation, 26:2, (1-28), Online publication date: 28-Jan-2016.
  39. Burgos J and Amoza F (2016). Factorization of network reliability with perfect nodes I, Discrete Applied Mathematics, 198:C, (82-90), Online publication date: 10-Jan-2016.
  40. Burgos J (2016). Factorization of network reliability with perfect nodes II, Discrete Applied Mathematics, 198:C, (91-100), Online publication date: 10-Jan-2016.
  41. Jiang M, Xia G and Zhang Y Edge-Disjoint Packing of Stars and Cycles Proceedings of the 9th International Conference on Combinatorial Optimization and Applications - Volume 9486, (676-687)
  42. Silva J, Gomes T, Tipper D, Martins L and Kounev V (2015). An effective algorithm for computing all-terminal reliability bounds, Networks, 66:4, (282-295), Online publication date: 1-Dec-2015.
  43. ACM
    Vahabi H, Koutsopoulos I, Gullo F and Halkidi M DifRec Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, (1481-1490)
  44. Tian Y and Meng J (2015). Restricted Connectivity for Some Interconnection Networks, Graphs and Combinatorics, 31:5, (1727-1737), Online publication date: 1-Sep-2015.
  45. Büke B, Smith J and Thomas S (2015). On a Random Walk Survivability problem with arc failures and memory, Networks, 66:1, (67-86), Online publication date: 1-Aug-2015.
  46. Dinh T and Thai M (2015). Network under joint node and link attacks, IEEE/ACM Transactions on Networking, 23:3, (1001-1011), Online publication date: 1-Jun-2015.
  47. ACM
    Khapugin S and Rodionov A Modeling grouped failures in network reliability analysis Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, (1-5)
  48. ACM
    Shakhov V, Migov D and Rodionov A Operation strategy for energy harvesting wireless sensor networks Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, (1-5)
  49. ACM
    Nechunaeva K and Migov D Speeding up of genetic algorithm for network topology optimization with use of cumulative updating of network reliability Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, (1-4)
  50. Botev Z, Vaisman S, Rubinstein R and L'Ecuyer P Reliability of stochastic flow networks with continuous link capacities Proceedings of the 2014 Winter Simulation Conference, (543-552)
  51. Shah R, Hirsch C, Kroese D and Schmidt V Rare event probability estimation for connectivity of large random graphs Proceedings of the 2014 Winter Simulation Conference, (510-521)
  52. ACM
    Yuan Y, Wang G and Chen L Pattern Match Query in a Large Uncertain Graph Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, (519-528)
  53. Graves C and Milan D (2014). Reliability polynomials having arbitrarily many inflection points, Networks, 64:1, (1-5), Online publication date: 1-Aug-2014.
  54. ACM
    Lam H and Szeto K Search for the most reliable network of fixed connectivity using genetic algorithm Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation, (117-118)
  55. Migov D and Rodionov A Parallel Implementation of the Factoring Method for Network Reliability Calculation Proceedings of the 14th International Conference on Computational Science and Its Applications — ICCSA 2014 - Volume 8584, (654-664)
  56. Bergner M, Lübbecke M and Witt J A Branch-Price-and-Cut Algorithm for Packing Cuts in Undirected Graphs Proceedings of the 13th International Symposium on Experimental Algorithms - Volume 8504, (34-45)
  57. Brown J, Koç Y and Kooij R (2014). Inflection points for network reliability, Telecommunications Systems, 56:1, (79-84), Online publication date: 1-May-2014.
  58. Khanna S and Lucier B Influence maximization in undirected networks Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms, (1482-1496)
  59. ACM
    Das J and Wilton S (2013). Towards development of an analytical model relating FPGA architecture parameters to routability, ACM Transactions on Reconfigurable Technology and Systems, 6:2, (1-24), Online publication date: 1-Jul-2013.
  60. Cancela H, Robledo F, Rubino G and Sartor P (2013). Monte Carlo estimation of diameter-constrained network reliability conditioned by pathsets and cutsets, Computer Communications, 36:6, (611-620), Online publication date: 1-Mar-2013.
  61. ACM
    Migov D and Rodionov A Decomposing graph with 2-node cuts for diameter constrained network reliability calculation Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, (1-6)
  62. Botev Z, L'Ecuyer P, Rubino G, Simard R and Tuffin B (2013). Static Network Reliability Estimation via Generalized Splitting, INFORMS Journal on Computing, 25:1, (56-71), Online publication date: 1-Jan-2013.
  63. Niesink P, Poulin K and ŠAjna M (2013). Computing transitive closure of bipolar weighted digraphs, Discrete Applied Mathematics, 161:1-2, (217-243), Online publication date: 1-Jan-2013.
  64. Botev Z, L'Ecuyer P and Tuffin B Dependent failures in highly reliable static networks Proceedings of the Winter Simulation Conference, (1-12)
  65. Munch E, Shapiro M and Harer J (2012). Failure filtrations for fenced sensor networks, International Journal of Robotics Research, 31:9, (1044-1056), Online publication date: 1-Aug-2012.
  66. ACM
    Shen Y, Syu Y, Nguyen D and Thai M Maximizing circle of trust in online social networks Proceedings of the 23rd ACM conference on Hypertext and social media, (155-164)
  67. ACM
    Zhou R, Liu C, Yu J, Liang W, Chen B and Li J Finding maximal k-edge-connected subgraphs from a large graph Proceedings of the 15th International Conference on Extending Database Technology, (480-491)
  68. ACM
    Migov D and Rodionova O Calculating two-terminal reliability in a diameter constrained network with cutnodes Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, (1-6)
  69. ACM
    Anagnostopoulos A, Kumar R, Mahdian M, Upfal E and Vandin F Algorithms on evolving graphs Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, (149-160)
  70. Eronen L, Hintsanen P and Toivonen H Biomine Bisociative Knowledge Discovery, (364-378)
  71. Langohr L and Toivonen H Finding representative nodes in probabilistic graphs Bisociative Knowledge Discovery, (218-229)
  72. Kuipers F (2012). An overview of algorithms for network survivability, ISRN Communications and Networking, 2012, (24-24), Online publication date: 1-Jan-2012.
  73. L'Ecuyer P, Saggadi S and Tuffin B Graph reductions to speed up importance sampling-based static reliability estimation Proceedings of the Winter Simulation Conference, (429-438)
  74. ACM
    Jin R, Liu L and Aggarwal C Discovering highly reliable subgraphs in uncertain graphs Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, (992-1000)
  75. Lin Y and Yeh C (2011). Using minimal cuts to optimize network reliability for a stochastic computer network subject to assignment budget, Computers and Operations Research, 38:8, (1175-1187), Online publication date: 1-Aug-2011.
  76. Migov D (2011). Computing diameter constrained reliability of a network with junction points, Automation and Remote Control, 72:7, (1415-1419), Online publication date: 1-Jul-2011.
  77. Jin R, Liu L, Ding B and Wang H (2011). Distance-constraint reachability computation in uncertain graphs, Proceedings of the VLDB Endowment, 4:9, (551-562), Online publication date: 1-Jun-2011.
  78. Lonc Z and Truszczyński M (2011). On graph equivalences preserved under extensions, Discrete Mathematics, 311:12, (966-977), Online publication date: 1-Jun-2011.
  79. Herrmann J and Soh S Comparison of binary and multi-variate hybrid decision diagram algorithms for k-terminal reliability Proceedings of the Thirty-Fourth Australasian Computer Science Conference - Volume 113, (153-162)
  80. Ding W and Xue G A divide-and-conquer algorithm for computing a most reliable source on an unreliable ring-embedded tree Proceedings of the 4th international conference on Combinatorial optimization and applications - Volume Part II, (268-280)
  81. Cancela H, Rubino G, L'Ecuyer P and Tuffin B Combination of conditional Monte Carlo and approximate zero-variance importance sampling for network reliability estimation Proceedings of the Winter Simulation Conference, (1263-1274)
  82. Karenos K, Pendarakis D, Kalogeraki V, Yang H and Liu Z Overlay routing under geographically correlated failures in distributed event-based systems Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II, (764-784)
  83. Foley S, Adams W and O'Sullivan B Aggregating trust using triangular norms in the keynote trust management system Proceedings of the 6th international conference on Security and trust management, (100-115)
  84. Kasari M, Toivonen H and Hintsanen P Fast discovery of reliable k-terminal subgraphs Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part II, (168-177)
  85. Cheng P and Masuyama S (2010). A proof of unimodality on the numbers of connected spanning subgraphs in an n-vertex graph with at least ⌈(3-22)n2+n-7-2222⌉ edges, Discrete Applied Mathematics, 158:6, (608-619), Online publication date: 1-Mar-2010.
  86. Yeh W (2009). A simple universal generating function method to search for all minimal paths in networks, IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, 39:6, (1247-1254), Online publication date: 1-Nov-2009.
  87. Egeland G and Engelstad P (2009). The availability and reliability of wireless multi-hop networks with stochastic link failures, IEEE Journal on Selected Areas in Communications, 27:7, (1132-1146), Online publication date: 1-Sep-2009.
  88. Brown J and Cox D (2009). The closure of the set of roots of strongly connected reliability polynomials is the entire complex plane, Discrete Mathematics, 309:16, (5043-5047), Online publication date: 1-Aug-2009.
  89. Nikolopoulos S, Palios L and Papadopoulos C (2009). Maximizing the number of spanning trees in Kn -complements of asteroidal graphs, Discrete Mathematics, 309:10, (3049-3060), Online publication date: 1-May-2009.
  90. Egeland G and Engelstad P The economy of redundancy in wireless multi-hop networks Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (3023-3028)
  91. Nutov Z (2009). Listing minimal edge-covers of intersecting families with applications to connectivity problems, Discrete Applied Mathematics, 157:1, (112-117), Online publication date: 1-Jan-2009.
  92. Mutawa A, Alazemi H and Rayes A (2009). A novel steady-state genetic algorithm approach to the reliability optimization design problem of computer networks, International Journal of Network Management, 19:1, (39-55), Online publication date: 1-Jan-2009.
  93. Boros E, Borys K, Gurvich V and Rudolf G (2008). Generating 3-vertex connected spanning subgraphs, Discrete Mathematics, 308:24, (6285-6297), Online publication date: 1-Dec-2008.
  94. ACM
    Elmallah E, Gouda M and Kulkarni S (2008). Logarithmic keying, ACM Transactions on Autonomous and Adaptive Systems, 3:4, (1-18), Online publication date: 1-Nov-2008.
  95. Elbassioni K (2008). On the complexity of monotone dualization and generating minimal hypergraph transversals, Discrete Applied Mathematics, 156:11, (2109-2123), Online publication date: 1-Jun-2008.
  96. Khachiyan L, Boros E, Elbassioni K and Gurvich V (2008). Generating all minimal integral solutions to AND-OR systems of monotone inequalities, Discrete Applied Mathematics, 156:11, (2020-2034), Online publication date: 1-Jun-2008.
  97. Petingi L Combinatorial and computational properties of a diameter constrained network reliability model Proceedings of the WSEAS International Conference on Applied Computing Conference, (337-345)
  98. Eisenstat D, Feder J, Francos G, Gordon G and Redlich A (2008). Expected rank and randomness in rooted graphs, Discrete Applied Mathematics, 156:5, (746-756), Online publication date: 1-Mar-2008.
  99. ACM
    Manfredi V Robust routing in networks with time-varying links Proceedings of the 2007 ACM CoNEXT conference, (1-2)
  100. Konak A Combining network reductions and simulation to estimate network reliability Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come, (2301-2305)
  101. Boros E, Borys K, Elbassioni K, Gurvich V, Makino K and Rudolf G Generating minimal k-vertex connected spanning subgraphs Proceedings of the 13th annual international conference on Computing and Combinatorics, (222-231)
  102. Ghosh J, Ngo H, Seokhoon Yoon and Chunming Qiao On a Routing Problem Within Probabilistic Graphs and its Application to Intermittently Connected Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1721-1729)
  103. Meng-Lai Yin and Arellano R The Importance of Maintenance Planning - A Case Study Proceedings of the 2007 Annual Reliability and Maintainability Symposium, (482-487)
  104. Shrestha A, Liudong Xing and Hong Liu Modeling and Evaluating the Reliability of Wireless Sensor Networks Proceedings of the 2007 Annual Reliability and Maintainability Symposium, (186-191)
  105. Gouda M, Kulkarni S and Elmallah E Logarithmic keying of communication networks Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems, (314-323)
  106. Rothschild B and Shahriari S (2006). Cutsets and anti-chains in linear lattices, Journal of Combinatorial Theory Series A, 113:8, (1783-1790), Online publication date: 1-Nov-2006.
  107. Khachiyan L, Boros E, Elbassioni K and Gurvich V (2006). An efficient implementation of a quasi-polynomial algorithm for generating hypergraph transversals and its application in joint generation, Discrete Applied Mathematics, 154:16, (2350-2372), Online publication date: 1-Nov-2006.
  108. ACM
    Kohlas R, Jonczy J and Haenni R Towards a precise semantics for authenticity and trust Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, (1-9)
  109. Sevon P, Eronen L, Hintsanen P, Kulovesi K and Toivonen H Link discovery in graphs derived from biological databases Proceedings of the Third international conference on Data Integration in the Life Sciences, (35-49)
  110. Zhang Z and Meng J (2006). On optimally-λ(3) transitive graphs, Discrete Applied Mathematics, 154:6, (1011-1018), Online publication date: 15-Apr-2006.
  111. Zhang Z and Meng J (2006). On optimally-λ(3) transitive graphs, Discrete Applied Mathematics, 154:6, (1011-1018), Online publication date: 15-Apr-2006.
  112. Judson D, Bagchi S and Quint T (2005). On the inference of semi-coherent structures from data, Computers and Operations Research, 32:11, (2853-2874), Online publication date: 1-Nov-2005.
  113. Khachiyan L, Boros E, Elbassioni K and Gurvich V A New Algorithm for the Hypergraph Transversal Problem Proceedings of the 11th Annual International Conference on Computing and Combinatorics - Volume 3595, (767-776)
  114. Nariai S, Hui K and Kroese D Designing an optimal network using the cross-entropy method Proceedings of the 6th international conference on Intelligent Data Engineering and Automated Learning, (228-233)
  115. Golin M, Leung Y and Wang Y Counting spanning trees and other structures in non-constant-jump circulant graphs Proceedings of the 15th international conference on Algorithms and Computation, (508-521)
  116. Konak A, Smith A and Kulturel-Konak S New event-driven sampling techniques for network reliability estimation Proceedings of the 36th conference on Winter simulation, (224-231)
  117. Nikolopoulos S, Nomikos C and Rondogiannis P (2004). A limit characterization for the number of spanning trees of graphs, Information Processing Letters, 90:6, (307-313), Online publication date: 30-Jun-2004.
  118. Golin M and Leung Y Unhooking circulant graphs Proceedings of the 30th international conference on Graph-Theoretic Concepts in Computer Science, (296-307)
  119. Das O and Woodside C (2004). Analyzing the effectiveness of fault-management architectures in layered distributed systems, Performance Evaluation, 56:1-4, (93-120), Online publication date: 1-Mar-2004.
  120. ACM
    Das O and Woodside C Computing the performability of layered distributed systems with a management architecture Proceedings of the 4th international workshop on Software and performance, (174-185)
  121. ACM
    Das O and Woodside C (2004). Computing the performability of layered distributed systems with a management architecture, ACM SIGSOFT Software Engineering Notes, 29:1, (174-185), Online publication date: 1-Jan-2004.
  122. Izadi B and özgüner F (2004). An Augmented k-ary Tree Multiprocessor with Real-Time Fault-Tolerant Capability, The Journal of Supercomputing, 27:1, (5-17), Online publication date: 1-Jan-2004.
  123. Campbell S, Kumar M and Olariu S (2004). The hierarchical cliques interconnection network, Journal of Parallel and Distributed Computing, 64:1, (16-28), Online publication date: 1-Jan-2004.
  124. Altiparmak F, Dengiz B and Smith A (2003). Optimal Design of Reliable Computer Networks, Journal of Heuristics, 9:6, (471-487), Online publication date: 1-Dec-2003.
  125. Makino K, Ono H and Ibaraki T (2003). Interior and exterior functions of positive Boolean functions, Discrete Applied Mathematics, 130:3, (417-436), Online publication date: 23-Aug-2003.
  126. Bailey A, Gordon G, Patton M and Scancella J (2003). Expected value expansions in rooted graphs, Discrete Applied Mathematics, 128:2-3, (555-571), Online publication date: 1-Jun-2003.
  127. ACM
    Papadimitratos P, Haas Z and Sirer E Path set selection in mobile ad hoc networks Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, (1-11)
  128. Ath Y, Ebneshahrashoob M, Gao T and Sobel M (2002). Accessibility and Reliability for Connected Bipartite Graphs, Methodology and Computing in Applied Probability, 4:2, (153-161), Online publication date: 1-Jun-2002.
  129. Chernyak A (1999). Reliability covering problems for hypergraphs, Cybernetics and Systems Analysis, 35:1, (100-111), Online publication date: 1-Jan-1999.
  130. ACM
    Kyandoghere K (1998). Survivability performance analysis of rerouting strategies in an ATM/VP DCS survivable mesh network, ACM SIGCOMM Computer Communication Review, 28:5, (22-49), Online publication date: 1-Oct-1998.
  131. McKay B, Myrvold W and Nadon J Fast backtracking principles applied to find new cages Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms, (188-191)
  132. Karger D and Tai R Implementing a fully polynomial time approximation scheme for all terminal network reliability Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms, (334-343)
  133. (1996). The Delta-Wye Approximation Procedure for Two-Terminal Reliability, Operations Research, 44:5, (745-757), Online publication date: 1-Oct-1996.
  134. Varvarigos E and Banerjee A (1996). Routing Schemes for Multiple Random Broadcasts in Arbitrary Network Topologies, IEEE Transactions on Parallel and Distributed Systems, 7:8, (886-895), Online publication date: 1-Aug-1996.
  135. Izadi B and Özgüner F Optimal Subcube Fault Tolerance in a Circuit-Switched Hypercube Proceedings of the 10th International Parallel Processing Symposium, (655-659)
  136. Cancela H and Khadiri M A Simulation Algorithm for Source Terminal Communication Network Reliability Proceedings of the 29th Annual Simulation Symposium (SS '96)
  137. Öhring S and Das S (1996). Folded Petersen Cube Networks, IEEE Transactions on Parallel and Distributed Systems, 7:2, (151-168), Online publication date: 1-Feb-1996.
  138. Wilson D and Propp J How to get an exact sample from a generic Markov chain and sample a random spanning tree from a directed graph, both within the cover time Proceedings of the seventh annual ACM-SIAM symposium on Discrete algorithms, (448-457)
  139. ACM
    Karger D A randomized fully polynomial time approximation scheme for the all terminal network reliability problem Proceedings of the twenty-seventh annual ACM symposium on Theory of computing, (11-17)
  140. ACM
    de Rougemont M The reliability of queries (extended abstract) Proceedings of the fourteenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems, (286-291)
  141. ACM
    Greenberg A and Srikant R Computational techniques for accurate performance evaluation of multirate, multihop communication networks Proceedings of the 1995 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, (253-260)
  142. ACM
    Greenberg A and Srikant R (1995). Computational techniques for accurate performance evaluation of multirate, multihop communication networks, ACM SIGMETRICS Performance Evaluation Review, 23:1, (253-260), Online publication date: 1-May-1995.
  143. Stephens A, Yesha Y and Humenik K (1994). Optimal Allocation for Partially Replicated Database Systems on Ring Networks, IEEE Transactions on Knowledge and Data Engineering, 6:6, (975-982), Online publication date: 1-Dec-1994.
  144. Balakrishnan M and Reibman A (1994). Reliability Models for Fault-Tolerant Private Network Applications, IEEE Transactions on Computers, 43:9, (1039-1053), Online publication date: 1-Sep-1994.
  145. ACM
    Karger D and Motwani R Derandomization through approximation Proceedings of the twenty-sixth annual ACM symposium on Theory of Computing, (497-506)
  146. Karger D Global min-cuts in RNC, and other ramifications of a simple min-cut algorithm Proceedings of the fourth annual ACM-SIAM symposium on Discrete algorithms, (21-30)
  147. Colbourn C (1992). A note on boundingk-terminal reliability, Algorithmica, 7:1-6, (303-307), Online publication date: 1-Jun-1992.
  148. ACM
    Johnson D and Raab L A tight upper bound on the benefits of replication and consistency control protocols Proceedings of the tenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems, (75-81)
  149. Soh S and Rai S (1991). CAREL, IEEE Transactions on Parallel and Distributed Systems, 2:2, (199-213), Online publication date: 1-Apr-1991.
  150. Colbourn C (1988). Edge-packing of graphs and network reliability, Discrete Mathematics, 72:1, (49-61), Online publication date: 1-Dec-1988.
Contributors
  • Arizona State University

Recommendations