Default Cover Image

2013 IEEE 2nd Network Science Workshop (NSW)

April 29 2013 to May 1 2013

West Point, NY, USA

Table of Contents

ForewordFreely available from IEEE.pp. 1-1
Conference committeeFreely available from IEEE.pp. 1-2
Table of contentsFreely available from IEEE.pp. 1-3
Author indexFreely available from IEEE.pp. 1-3
[Copyright notice]Freely available from IEEE.pp. 1-1
Price based routing for event driven prioritized traffic in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Asynchronous message-passing binary consensus over non-complete graphsFull-text access may be available. Sign in or learn about subscription options.pp. 9-15
Limits in modeling power grid topologyFull-text access may be available. Sign in or learn about subscription options.pp. 16-22
A coauthorship network and preliminary results of binary agreement model simulationsFull-text access may be available. Sign in or learn about subscription options.pp. 37-41
A meta-network approach for analysing the information system access vulnerabilities in organizationsFull-text access may be available. Sign in or learn about subscription options.pp. 50-57
Prominence in networks: A co-evolving processFull-text access may be available. Sign in or learn about subscription options.pp. 58-65
Exploiting routing information in Wireless Sensor Networks localizationFull-text access may be available. Sign in or learn about subscription options.pp. 66-73
On the relation between tourism and trade: A network experimentFull-text access may be available. Sign in or learn about subscription options.pp. 74-81
Bipartite Internet topology at the subnet-levelFull-text access may be available. Sign in or learn about subscription options.pp. 94-97
United states congress relations according to liberal and conservative newspapersFull-text access may be available. Sign in or learn about subscription options.pp. 98-101
Community-based identification of banking networksFull-text access may be available. Sign in or learn about subscription options.pp. 102-105
Improving music artist recommendations through analysis of influencesFull-text access may be available. Sign in or learn about subscription options.pp. 110-113
Cyber-physical situation awareness and decision supportFull-text access may be available. Sign in or learn about subscription options.pp. 114-117
Geospatial optimization problemsFull-text access may be available. Sign in or learn about subscription options.pp. 118-121
Naming game with greater stubbornness and unilateral zealotsFull-text access may be available. Sign in or learn about subscription options.pp. 126-130
Assessing protein resilience via a complex network approachFull-text access may be available. Sign in or learn about subscription options.pp. 131-137
LabelRank: A stabilized label propagation algorithm for community detection in networksFull-text access may be available. Sign in or learn about subscription options.pp. 138-143
Networks of nurses: A case study in informal networks of adviceFull-text access may be available. Sign in or learn about subscription options.pp. 144-151
Weighted node degree centrality for hypergraphsFull-text access may be available. Sign in or learn about subscription options.pp. 152-155
Lowering six degrees of Kevin Bacon by genetic algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 156-159
On the robustness of the Drosophila neural networkFull-text access may be available. Sign in or learn about subscription options.pp. 168-171
Cooperative, dynamic Twitter parsing and visualization for dark network analysisFull-text access may be available. Sign in or learn about subscription options.pp. 172-176
Showing 36 out of 36