Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigation of Malicious Attacks on Networks, , , , and . CoRR, (2011)Reservoir mapping by global correlation analysis, , , and . INTERNATIONAL JOURNAL OF ROCK MECHANICS AND MINING SCIENCES, (2014)Statistical patterns of visual search for hidden objects, , , , and . SCIENTIFIC REPORTS, (2012)Mitigation of malicious attacks on networks, , , , and . PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 108 (10): 3838-3841 (2011)Gender differences in scientific collaborations: Women are more egalitarian than men, , , , and . PLOS ONE, (2017)Onion-like network topology enhances robustness against malicious attacks, , , , and . JOURNAL OF STATISTICAL MECHANICS-THEORY AND EXPERIMENT, (2011)Finite-size effects for percolation on Apollonian networks, , , and . PHYSICAL REVIEW E, (2008)Overdamped dynamics of particles with repulsive power-law interactions, , , , and . PHYSICAL REVIEW E, (2018)Competitive cluster growth in complex networks, , , and . PHYSICAL REVIEW E, (2006)Transport on exploding percolation clusters, , , and . PHYSICAL REVIEW E, (2011)