<--- Back to Details
First PageDocument Content
Mathematics / Operations research / Network analysis / Algebraic graph theory / Centrality / Social network / Assortativity / Complex network / Degree distribution / Graph theory / Network theory / Networks
Date: 2013-08-19 15:26:16
Mathematics
Operations research
Network analysis
Algebraic graph theory
Centrality
Social network
Assortativity
Complex network
Degree distribution
Graph theory
Network theory
Networks

Connections A Computationally Efficient Approximation of Beta Centrality

Add to Reading List

Source URL: www.insna.org

Download Document from Source Website

File Size: 891,17 KB

Share Document on Facebook

Similar Documents

Computing / Information and communications technology / Computer networking / Data transmission / Network performance / Internet architecture / Teletraffic / Telecommunications engineering / Packet loss / Packet forwarding / Transmission Control Protocol / Traffic flow

TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer Chen Chen Daniele E. Asoni

DocID: 1xVHd - View Document

Computing / Information and communications technology / Data transmission / Computer networking / Network performance / Routing / Internet architecture / Teletraffic / Packet loss / Packet forwarding / Transmission Control Protocol / Traffic flow

arXiv:1802.08415v1 [cs.CR] 23 FebTARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer Chen Chen

DocID: 1xVuF - View Document

Computing / Data transmission / Network architecture / Computer networking / Network protocols / Emerging technologies / Internet architecture / OpenFlow / Software-defined networking / Traffic flow / NetFlow / Denial-of-service attack

iTAP: In-network Traffic Analysis Prevention using Software-Defined Networks https://itap.ethz.ch Roland Meier

DocID: 1xUBt - View Document

Computing / Data transmission / Network architecture / Computer networking / Network protocols / Emerging technologies / Internet architecture / OpenFlow / Software-defined networking / Traffic flow / NetFlow / Denial-of-service attack

iTAP: In-network Traffic Analysis Prevention using Software-Defined Networks https://itap.ethz.ch Roland Meier

DocID: 1xTNw - View Document

Leveraging Internet Background Radiation for Opportunistic Network Analysis Karyn Benson∗† , Alberto Dainotti† , kc claffy† , Alex C. Snoeren∗ , Michael Kallitsis‡ ∗ Computer Science and Engineering, UC Sa

DocID: 1xTnc - View Document