Continuum percolation in the intrinsically secure communications graph.
Pedro C. PintoMoe Z. WinPublished in: ISITA (2010)
Keyphrases
- group communication
- graph structure
- structured data
- random walk
- graph theory
- directed graph
- graph mining
- graph model
- bipartite graph
- connected components
- graph partitioning
- graph representation
- graph theoretic
- dependency graph
- graph matching
- directed acyclic graph
- information security
- data sets
- security issues
- scale free
- graph construction
- graph search
- graph structures
- data encryption