


default search action
IEEE Transactions on Network Science and Engineering, Volume 6
Volume 6, Number 1, January - March 2019
- Dapeng Oliver Wu
:
Message from the Editor-in-Chief. 1 - Canming Jiang, Yi Shi
, Y. Thomas Hou
, Wenjing Lou, Sastry Kompella
, Scott F. Midkiff
:
A General Method to Determine Asymptotic Capacity Upper Bounds for Wireless Networks. 2-15 - Faryad Darabi Sahneh
, Aram Vajdi
, Joshua Melander, Caterina M. Scoglio
:
Contact Adaption During Epidemics: A Multilayer Network Formulation Approach. 16-30 - Pavlos Basaras
, George Iosifidis
, Dimitrios Katsaros
, Leandros Tassiulas:
Identifying Influential Spreaders in Complex Multilayer Networks: A Centrality Perspective. 31-45 - Swapnil Dhamal
, Rohith Dwarakanath Vallam
, Y. Narahari:
Modeling Spread of Preferences in Social Networks for Sampling-Based Preference Aggregation. 46-59 - Jin-Liang Wang
, Meng Xu
, Huai-Ning Wu
, Tingwen Huang
:
Passivity Analysis and Pinning Control of Multi-Weighted Complex Dynamical Networks. 60-73 - Lorenzo Zino
:
Time to Extinction for the SIS Epidemic Model: New Bounds on the Tail Probabilities. 74-81
Volume 6, Number 2, April - June 2019
- Brunella Spinelli, L. Elisa Celis, Patrick Thiran:
A General Framework for Sensor Placement in Source Localization. 86-102 - Jun Du, Chunxiao Jiang, Zhu Han, Haijun Zhang, Shahid Mumtaz
, Yong Ren:
Contract Mechanism and Performance Analysis for Data Transaction in Mobile Social Networks. 103-115 - Wilbert Samuel Rossi
, Paolo Frasca
:
On the Convergence of Message Passing Computation of Harmonic Influence in Social Networks. 116-129 - Arnob Ghosh, Saswati Sarkar:
Pricing for Profit in Internet of Things. 130-144 - Elchanan Mossel, Nathan Ross
:
Shotgun Assembly of Labeled Graphs. 145-157 - Wilbert Samuel Rossi
, Giacomo Como
, Fabio Fagnani:
Threshold Models of Cascades in Large-Scale Networks. 158-172
Volume 6, Number 3, July - September 2019
- Homayoun Hamedmoghadam
, Mahdi Jalili
, Parham Moradi
, Xinghuo Yu
:
A Global Optimization Approach Based on Opinion Formation in Complex Networks. 173-187 - Yoko Uwate
, Yoshifumi Nishio
:
Amplitude Death in Strongly Coupled Polygonal Oscillatory Networks with Sharing Branch. 188-197 - Choujun Zhan, Chi K. Tse
:
A Model for Growth of Markets of Products or Services Having Hierarchical Dependence. 198-209 - Yifu Zhang
, Jorge Cortés
:
Characterizing Tolerable Disturbances for Transient-State Safety in Power Networks. 210-224 - MohammadAmin Fazli
, Abbas Maazallahi, Jafar Habibi, Moslem Habibi
:
Controlling Best Response Dynamics for Network Games. 225-236 - Huaqing Li
, Qingguo Lü
, Tingwen Huang
:
Convergence Analysis of a Distributed Optimization Algorithm with a General Unbalanced Directed Communication Network. 237-248 - Maxime Gabella
:
Cultural Structures of Knowledge from Wikipedia Networks of First Links. 249-252 - Shahzad F. Bhatti
, Carolyn L. Beck
, Angelia Nedic
:
Data Clustering and Graph Partitioning via Simulated Mixing. 253-266 - Li-Chun Wang
, Shao-Hung Cheng
:
Data-Driven Resource Management for Ultra-Dense Small Cells: An Affinity Propagation Clustering Approach. 267-279 - Azwirman Gusrialdi
, Zhihua Qu
, Sandra Hirche
:
Distributed Link Removal Using Local Estimation of Network Topology. 280-292 - Yuichi Kawamoto
, Hiroaki Takagi
, Hiroki Nishiyama
, Nei Kato
:
Efficient Resource Allocation Utilizing Q-Learning in Multiple UA Communications. 293-302 - Mahmoud E. Ashour
, Jingyao Wang
, Necdet Serhat Aybat
, Constantino Lagoa
, Hao Che:
End-to-End Distributed Flow Control for Networks with Nonconcave Utilities. 303-313 - Zhen Li
, Yang Tang
, Tingwen Huang
, Jürgen Kurths:
Formation Control with Mismatched Orientation in Multi-Agent Systems. 314-325 - Akiko Manada
, Hiroyoshi Morita:
Graph Theoretical Analysis on Distributed Line Graphs for Peer-to-Peer Networks. 326-335 - Edward K. Kao
, Steven Thomas Smith
, Edoardo M. Airoldi
:
Hybrid Mixed-Membership Blockmodel for Inference on Realistic Network Interactions. 336-350 - Richard J. La
:
Influence of Clustering on Cascading Failures in Interdependent Systems. 351-363 - Dimitrios Katselis
, Carolyn L. Beck
, R. Srikant:
Mixing Times and Structural Inference for Bernoulli Autoregressive Processes. 364-378 - Xuehe Wang
, Lingjie Duan
, Junshan Zhang
:
Mobile Social Services with Network Externality: From Separate Pricing to Bundled Pricing. 379-390 - Yufan Huang
, Huaiyu Dai
:
Multiplex Conductance and Gossip Based Information Spreading in Multiplex Networks. 391-401 - Soheil Feizi
, Muriel Médard, Gerald T. Quon, Manolis Kellis, Ken Duffy
:
Network Infusion to Infer Information Sources in Networks. 402-417 - Vishal Krishna Singh
, Manish Kumar
, Shekhar Verma
:
Node Scheduling and Compressed Sampling for Event Reporting in WSNs. 418-431 - Stefano D'Aronco
, Pascal Frossard
:
Online Resource Inference in Network Utility Maximization Problems. 432-444 - Wei Li
, Fan Zhou
, Kaushik Roy Chowdhury
, Waleed Meleis:
QTCP: Adaptive Congestion Control with Reinforcement Learning. 445-458 - Saleh Soltan
, Mihalis Yannakakis
, Gil Zussman
:
REACT to Cyber Attacks on Power Grids. 459-473 - Jianan Zhang
, Edmund Yeh
, Eytan H. Modiano:
Robustness of Interdependent Random Geometric Networks. 474-487 - Li Chen
, Shuhao Liu, Baochun Li
, Bo Li:
Scheduling Jobs across Geo-Distributed Datacenters with Max-Min Fairness. 488-500 - Mohammed Gharib
, Homayoun Yousefi'zadeh
, Ali Movaghar
:
Secure Overlay Routing for Large Scale Networks. 501-511 - Yi Qi, Zhongzhi Zhang
:
Spectral Properties of Extended Sierpiński Graphs and Their Applications. 512-522 - Binghui Wang
, Jinyuan Jia, Le Zhang
, Neil Zhenqiang Gong:
Structure-Based Sybil Detection in Social Networks via Local Rule-Based Propagation. 523-537 - Michael Yatauro
:
The Edge Cover Probability Polynomial of a Graph and Optimal Network Construction. 538-547 - Chenxi Qiu
, Haiying Shen
, Lei Yu:
Towards Green Wireless Networking: Fading-Resistant Time Constraint Broadcasts Using Cooperative Communication. 548-561 - Tsunghan Wu
, Cheng-Shang Chang
, Wanjiun Liao
:
Tracking Network Evolution and Their Applications in Structural Network Analysis. 562-575 - Loukianos Spyrou
, Javier Escudero
:
Weighted Network Estimation by the Use of Topological Graph Metrics. 576-586 - Dong Liu
, Viktoria Fodor, Lars Kildehoj Rasmussen
:
Will Scale-Free Popularity Develop Scale-Free Geo-Social Networks? 587-598
Volume 6, Number 4, October - December 2019
- Qi Jia, Linke Guo
, Yuguang Fang
, Guirong Wang:
Efficient Privacy-Preserving Machine Learning in Hierarchical Distributed System. 599-612 - Giuliano Mega
, Alberto Montresor
, Gian Pietro Picco
:
Social Overlays Meet the Cloud: A Hybrid Architecture for Profile Dissemination in Decentralized Social Networks. 613-627 - Swapnil Dhamal
, Walid Ben-Ameur, Tijani Chahed, Eitan Altman
:
Optimal Investment Strategies for Competing Camps in a Social Network: A Broad Framework. 628-645 - Huaying Wu, Xiao-Yang Liu
, Luoyi Fu
, Xinbing Wang
:
Energy-Efficient and Robust Tensor-Encoder for Wireless Camera Networks in Internet of Things. 646-656 - Dwaipayan Mukherjee
, Daniel Zelazo
:
Robustness of Consensus over Weighted Digraphs. 657-670 - Maciej Rysz
, Siddhartha S. Mehta
:
A Two-Stage Stochastic Optimization Approach for Detecting Structurally Stable Clusters in Randomly Changing Graphs. 671-683 - Cheng-Hsun Chang, Cheng-Shang Chang, Chia-Tai Chang, Duan-Shin Lee, Ping-En Lu
:
Exponentially Twisted Sampling for Centrality Analysis and Community Detection in Attributed Networks. 684-697 - Xun Shao
, Hitoshi Asaeda
, Mianxiong Dong
, Ziji Ma
:
Cooperative Inter-Domain Cache Sharing for Information-Centric Networking via a Bargaining Game Approach. 698-710 - Nicolas Martin
, Paolo Frasca
, Carlos Canudas-de-Wit
:
Large-Scale Network Reduction Towards Scale-Free Structure. 711-723 - Binxuan Huang
, Kathleen M. Carley
:
Location Order Recovery in Trails with Low Temporal Resolution. 724-733 - Ding Ding
, Mauro Conti
, Renato Figueiredo
:
Wide-Scale Internet Disconnection: Impact and Recovery on Social-Based P2P Overlays. 734-747 - Bastian Prasse
, Piet Van Mieghem
:
Exact Network Reconstruction from Complete SIS Nodal State Infection Information Seems Infeasible. 748-759 - Huifen Hong
, Wenwu Yu
, Junjie Fu
, Xinghuo Yu
:
A Novel Class of Distributed Fixed-Time Consensus Protocols for Second-Order Nonlinear and Disturbed Multi-Agent Systems. 760-772 - Juan Sebastian Borrero
, Oleg A. Prokopyev
, Pavlo A. Krokhmal:
Optimization of Cascading Processes in Arbitrary Networks with Stochastic Interactions. 773-787 - Jian-Bo Wang
, Xiang Li
:
Uncovering Spatial Invasion on Metapopulation Networks with SIR Epidemics. 788-800 - Jianming Zhu
, Junlei Zhu
, Smita Ghosh
, Weili Wu, Jing Yuan
:
Social Influence Maximization in Hypergraph in Social Networks. 801-811 - Yangbo Song
, Mihaela van der Schaar:
Repeated Network Games with Dominant Actions and Individual Rationality. 812-823 - Yang Chen
, Huanyang Zheng
, Jie Wu
:
Consistency, Feasibility, and Optimality of Network Update in SDNs. 824-835 - Isaac S. Klickstein
, Francesco Sorrentino:
Generating Graphs with Symmetry. 836-843 - Shun-Yan Ren
, Rui Mao
, Jigang Wu
:
Passivity-Based Leader-Following Consensus Control for Nonlinear Multi-Agent Systems with Fixed and Switching Topologies. 844-856 - Gideon Blocq
, Ariel Orda
:
Coalitions in Routing Games: A Worst-Case Perspective. 857-870 - Bo Wu
, Haiying Shen
, Kang Chen
:
SPread: Exploiting Fractal Social Community for Efficient Multi-Copy Routing in Taxi VDTNs. 871-884 - Mohamed Hammouda, Rong Zheng
, Timothy N. Davidson
:
Learning-Theoretic Multi-Channel Spectrum Sensing and Access in Full-Duplex Cognitive Radio Networks with Unknown Primary User Activities. 885-897 - Yuanzhang Xiao
, Florian Dörfler
, Mihaela van der Schaar
:
Incentive Design in Peer Review: Rating and Repeated Endogenous Matching. 898-908 - Xin Liu
, Lei Ying:
On Achieving Zero Delay with Power-of-d-Choices Load Balancing. 909-916 - Aram Vajdi
, Caterina M. Scoglio
:
Identification of Missing Links Using Susceptible-Infected-Susceptible Spreading Traces. 917-927 - Xin Wang
, Jianping He
, Peng Cheng
, Jiming Chen
:
Differentially Private Maximum Consensus: Design, Analysis and Impossibility Result. 928-939 - Marwan Ghanem
, Clémence Magnien
, Fabien Tarissan
:
Centrality Metrics in Dynamic Networks: A Comparison Study. 940-951 - Jiapeng Zhang
, Luoyi Fu
, Shuhao Li, Yuhang Yao
, Xinbing Wang
:
Core Percolation in Interdependent Networks. 952-967 - Jin Wang
, Kejie Lu
, Jianping Wang
, Chuan Wu
, Naijie Gu:
Enhancing the Anonymity in Information Diffusion Based on Obfuscated Coded Data. 968-982 - Qiang Liu
, Piet Van Mieghem
:
Network Localization Is Unalterable by Infections in Bursts. 983-989

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.