Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Localization of the Personalized PageRank of Complex Networks, , and . CoRR, (2012)Efficient algorithms for estimating loss of information in a complex network: Applications to intentional risk analysis., , , and . Networks Heterog. Media, 10 (1): 195-208 (2015)Probabilistic analysis of efficiency and vulnerability in the Erdös-Rénji model., , , and . Int. J. Comput. Math., 85 (3&4): 411-419 (2008)Credit card fraud detection through parenclitic network analysis., , , and . CoRR, (2017)Emergence of network features from multiplexity, , , , , , and . CoRR, (2012)Emergence of network features from multiplexity, , , , , , and . Scientific Reports, (Feb 27, 2013)On eigenvector-like centralities for temporal networks: Discrete vs. continuous time scales., and . J. Comput. Appl. Math., (2018)Hyperstructures, a New Approach to Complex Systems., , and . Int. J. Bifurc. Chaos, 20 (3): 877-883 (2010)A Post-Processing Method for Interest Point Location in Images by Using Weighted Line-Graph Complex Networks., , and . Int. J. Bifurc. Chaos, (2012)Efficiency, Vulnerability and Cost: an Overview with Applications to Subway Networks Worldwide., , and . Int. J. Bifurc. Chaos, 17 (7): 2289-2301 (2007)