Sciweavers

ISAAC   2005 International Symposium on Algorithms and Computation
Wall of Fame | Most Viewed ISAAC-2005 Paper
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
13 years 9 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source153
2Download preprint from source145
3Download preprint from source138
4Download preprint from source135
5Download preprint from source131
6Download preprint from source129
7Download preprint from source127
8Download preprint from source127
9Download preprint from source127
10Download preprint from source123
11Download preprint from source122
12Download preprint from source120
13Download preprint from source120
14Download preprint from source118
15Download preprint from source117
16Download preprint from source116
17Download preprint from source113
18Download preprint from source113
19Download preprint from source112
20Download preprint from source111
21Download preprint from source111
22Download preprint from source111
23Download preprint from source110
24Download preprint from source110
25Download preprint from source109
26Download preprint from source109
27Download preprint from source109
28Download preprint from source107
29Download preprint from source106
30Download preprint from source106
31Download preprint from source105
32Download preprint from source104
33Download preprint from source102
34Download preprint from source100
35Download preprint from source100
36Download preprint from source100
37Download preprint from source98
38Download preprint from source98
39Download preprint from source97
40Download preprint from source93
41Download preprint from source91
42Download preprint from source90
43Download preprint from source89
44Download preprint from source88
45Download preprint from source88
46Download preprint from source86
47Download preprint from source85
48Download preprint from source81
49Download preprint from source78
50Download preprint from source78
51Download preprint from source76
52Download preprint from source72