Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigation of Malicious Attacks on Networks, , , , and . CoRR, (2011)Particles in fluids., , and . Comput. Phys. Commun., 177 (1-2): 158-161 (2007)Predicting oil recovery using percolation, , , , , , and . Physica A: Statistical and Theoretical Physics, 266 (1-4): 107--114 (Apr 15, 1999)Flow through time-evolving porous media: Swelling and erosion., , , and . J. Comput. Sci., (2021)Fast algorithm to identify cluster synchrony through fibration symmetries in large information-processing networks., , , , and . CoRR, (2021)Collaboration networks from a large CV database: dynamics, topology and bonus impact., , , , and . CoRR, (2013)Optimal box-covering algorithm for fractal dimension of complex networks, , , and . CoRR, (2012)Sand transport on Mars., , , , and . Comput. Phys. Commun., 180 (4): 609-611 (2009)Suspended accounts align with the Internet Research Agency misinformation campaign to influence the 2016 US election., , , , and . EPJ Data Sci., 13 (1): 29 (December 2024)Digital contact tracing and network theory to stop the spread of COVID-19 using big-data on human mobility geolocalization., , , , , , , , and . PLoS Comput. Biol., (2022)