Author of the publication

PROBABILISTIC DIFFUSION IN RANDOM NETWORK GRAPHS

. International Journal on Foundations of Computer Science & Technology (IJFCST), 5 (5): 7 (September 2015)
DOI: 10.5121/ijfcst.2015.5501

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CINET 2.0: A CyberInfrastructure for Network Science., , , , , , , , , and 16 other author(s). eScience, page 324-331. IEEE Computer Society, (2014)On the Sufficiency of Using Degree Sequence of the Vertices to Generate Random Networks Corresponding to Real-World Networks.. Polibits, (2016)DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTION OF COMPLEX NETWORKS. International Journal on Foundations of Computer Science & Technology (IJFCST), 5 (3): 12 (2015 2015)PROBABILISTIC DIFFUSION IN RANDOM NETWORK GRAPHS. International Journal on Foundations of Computer Science & Technology (IJFCST), 5 (5): 7 (September 2015)Guest Editorial., and . Int. J. Comput. Sci. Appl., (2009)A Binary Search Algorithm to Determine the Minimum Transmission Range for Minimum Connected Dominating Set of a Threshold Size in Ad Hoc Networks.. Int. J. Wirel. Networks Broadband Technol., 9 (2): 1-16 (2020)Graph Theory Algorithms for Mobile Ad hoc Networksh.. Informatica (Slovenia), 36 (2): 185-200 (2012)A Review of the Energy Efficient amd Secure Multicast Routing Protocols for Mobile Ad Hoc Networks, and . International journal on applications of graph theory in wireless ad hoc networks and sensor networks, 2 (2): 1-15 (June 2010)Assortativity Analysis of Real-World Network Graphs based on Centrality Metrics.. Computer and Information Science, 9 (3): 7-25 (2016)An Energy-Efficient Tracking Algorithm to Trace a Radioactive Mobile Target in a Wireless Sensor Network., , and . Computer and Information Science, 8 (2): 15-23 (2015)