Worst-Case Scenarios for Greedy, Centrality-Based Network Protection Strategies.
Michael ZarghamVictor M. PreciadoPublished in: CoRR (2014)
Keyphrases
- worst case
- greedy algorithm
- network structure
- centrality measures
- average case
- wireless sensor networks
- upper bound
- social network analysis
- social networks
- community structure
- lower bound
- peer to peer
- complex networks
- network traffic
- terrorist networks
- privacy protection
- dynamic programming
- real world
- information security
- computer networks
- search algorithm
- ad hoc networks
- communication networks
- objective function
- network topologies
- neural network
- data sets