Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
NSW
NSW 2013
Generate Citations
2013 IEEE 2nd Network Science Workshop (NSW)
April 29 2013 to May 1 2013
West Point, NY, USA
Table of Contents
Foreword
Freely available from IEEE.
pp. 1-1
Conference committee
Freely available from IEEE.
pp. 1-2
Table of contents
Freely available from IEEE.
pp. 1-3
Author index
Freely available from IEEE.
pp. 1-3
[Copyright notice]
Freely available from IEEE.
pp. 1-1
Price based routing for event driven prioritized traffic in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
S. Yousaf Shah
,
Boleslaw K. Szymanski
Asynchronous message-passing binary consensus over non-complete graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-15
by
Goitom Weldehawaryat
,
Stephen D. Wolthusen
Limits in modeling power grid topology
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-22
by
Brian Cloteaux
A scalable null model for directed graphs matching all degree distributions: In, out, and reciprocal
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-30
by
Nurcan Durak
,
Tamara G. Kolda
,
Ali Pinar
,
C. Seshadhri
Using rare event modeling & networking to build scenarios and forecast the future
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-36
by
Chris Arney
,
Kate Coronges
,
Hilary Fletcher
,
John Hagen
,
Kira Hutchinson
,
Allen Moss
,
Charles Thomas
A coauthorship network and preliminary results of binary agreement model simulations
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-41
by
Matthew Dippel
,
Chjan Lim
Network evolution in disaster management: A comparison of response systems evolving after the 2005 and 2008 gulf coast hurricanes
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-49
by
Louise K. Comfort
,
Namkyung Oh
,
Gunes Ertan
,
Thomas Haase
A meta-network approach for analysing the information system access vulnerabilities in organizations
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-57
by
W. Hasala Peiris
,
Helen Armstrong
Prominence in networks: A co-evolving process
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-65
by
Yang Yang
,
Nitesh V. Chawla
,
Xiaohui Lu
,
Sibel Adali
Exploiting routing information in Wireless Sensor Networks localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-73
by
Gabriele Oliva
,
Stefano Panzieri
,
Federica Pascucci
,
Roberto Setola
On the relation between tourism and trade: A network experiment
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-81
by
Jigar Brahmbhatt
,
Ronaldo Menezes
Social patterns: Community detection using behavior-generated network datasets
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-89
by
Alice Leung
,
William Dron
,
John P. Hancock
,
Matthew Aguirre
,
Jon Purnell
,
Jiawei Han
,
Chi Wang
,
Jaideep Srivastava
,
Amogh Mahapatra
,
Atanu Roy
,
Lisa Scott
Information-maximizing caching in Ad Hoc networks with named data networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-93
by
William Dron
,
Alice Leung
,
Md Uddin
,
Shiguang Wang
,
Tarek Abdelzaher
,
Ramesh Govindan
,
John Hancock
Bipartite Internet topology at the subnet-level
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-97
by
Mehmet Burak Akgun
,
Mehmet Hadi Gunes
United states congress relations according to liberal and conservative newspapers
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-101
by
Basim Mahmood
,
Ronaldo Menezes
Community-based identification of banking networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-105
by
Max Planck
,
Peter C. Anselmo
Smartphone viruses propagation on heterogeneous composite networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-109
by
Xuetao Wei
,
Nicholas C. Valler
,
Michalis Faloutsos
,
Iulian Neamtiu
,
B. Aditya Prakash
,
Christos Faloutsos
Improving music artist recommendations through analysis of influences
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-113
by
Matt Grimm
,
Bilal Gonen
Cyber-physical situation awareness and decision support
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-117
by
John James
,
Frank Mabry
,
Aaron St. Leger
,
Tom Cook
,
Kevin Huggins
Geospatial optimization problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 118-121
by
Paulo Shakarian
,
V. S. Subrahmanian
Challenges of social cognitive network science: network science collaborative technology alliance perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-125
by
Keryl Ann Cosenzo
,
Boleslaw Karol Szymanski
Naming game with greater stubbornness and unilateral zealots
Full-text access may be available. Sign in or learn about subscription options.
pp. 126-130
by
Yosef Treitman
,
Chjan Lim
,
Weituo Zhang
,
Andrew Thompson
Assessing protein resilience via a complex network approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-137
by
Gabriele Oliva
,
Luisa Di Paola
,
Alessandro Giuliani
,
Federica Pascucci
,
Roberto Setola
LabelRank: A stabilized label propagation algorithm for community detection in networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-143
by
Jierui Xie
,
Boleslaw K. Szymanski
Networks of nurses: A case study in informal networks of advice
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-151
by
Helen Armstrong
,
Desmond Klass
Weighted node degree centrality for hypergraphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-155
by
Komal Kapoor
,
Dhruv Sharma
,
Jaideep Srivastava
Lowering six degrees of Kevin Bacon by genetic algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-159
by
Brendan J. Babb
,
Bilal Gonen
Initial indicators of topic success in Twitter: Using topology entropy to predict the success of Twitter hashtags
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-163
by
Max Planck
,
Isis Lyman Pollard
,
Charles Brock
,
Alex George
Application of information diffusion in social networks: Verifying the use of web/blog topology entropy as an indicator for real world impact
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-167
by
Max Planck
,
Charles Brock
,
Dietrich Bachman
,
Jeffrey Fenchel
,
Isis Lyman Pollard
On the robustness of the Drosophila neural network
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-171
by
Hsiu-Ming Chang
,
Ann-Shyn Chiang
,
Walter Didimo
,
Ching-Yao Lin
,
Giuseppe Liotta
,
Fabrizio Montecchiani
Cooperative, dynamic Twitter parsing and visualization for dark network analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-176
by
Patrick M. Dudas
Showing 36 out of 36