Abstract is missing.
- A Survey of Interdependency Models for Critical Infrastructure NetworksJoydeep Banerjee, Arun Das, Arunabha Sen. 1-16 [doi]
- Using GRASP for the Cover by s-Defective Independent Sets ProblemAustin Buchanan, Nannan Chen, Xin Ma. 17-25 [doi]
- Local Search for Hop-Constrained Directed Steiner Tree Problem with Application to UAV-Based Multi-Target SurveillanceOleg Burdakov, Patrick Doherty, Jonas Kvarnström. 26-50 [doi]
- Variable Neighborhood Search for Edge-Ratio Network ClusteringSonia Cafieri, Pierre Hansen, Nenad Mladenovic. 51-64 [doi]
- On Data Clustering: Exact and Approximate SolutionsPaola Festa. 65-82 [doi]
- A Hybrid Metaheuristic for the Maximum k-Plex ProblemKrishna Reddy Gujjula, Krishnan Ayalur Seshadrinathan, Amirhossein Meisami. 83-92 [doi]
- Monotonic and Non-Monotonic Infections on NetworksAlexander Gutfraind. 93-103 [doi]
- Navigation Function Based Decentralized Control of A Multi-Agent System with Network Connectivity ConstraintsZhen Kan, John M. Shea, Warren E. Dixon. 104-119 [doi]
- Evaluation of the Reliability of Repairable s - t Networks by Fast Simulation MethodNickolay Kuznetsov. 120-140 [doi]
- Analysis and Design of Robust Network Clusters with Bounded DiameterFoad Mahdavi Pajouh, Alexander Veremyev, Vladimir Boginski. 141-160 [doi]
- Multiobjective Particle Swarm Optimization for a Multicast Routing ProblemYannis Marinakis, Athanasios Migdalas. 161-175 [doi]
- Robust Networked Control Systems with Communication ConstraintsSiddhartha S. Mehta, William MacKunis, Jess Willard Curtis. 176-191 [doi]
- Hop-Constrained Tree-Shaped NetworksMarta S. R. Monteiro, Dalila B. M. M. Fontes, Fernando A. C. C. Fontes. 192-208 [doi]
- Bilinear Markovian Processes of Search for Stationary and Moving ObjectsPanos M. Pardalos, Vitaliy A. Yatsenko, Michael B. Fenn, Arkadii A. Chikrii. 209-230 [doi]
- On Risk-Averse Weighted k-Club ProblemsMaciej Rysz, Foad Mahdavi Pajouh, Pavlo A. Krokhmal, Eduardo L. Pasiliao. 231-242 [doi]
- Distributed Computer Attack Detection System for Corporate NetworksVardan Sargsyan, Arman Sargsyan, Armen Ghazaryan. 243-250 [doi]
- Optimal Balanced Packing Using Phi-Function TechniqueYuriy Stoyan, Petro Stetsyuk, Tatiana Romanova. 251-271 [doi]
- Security in Wireless Networks: A TutorialSatish Vadlamani, Hugh Medal, Burak Eksioglu. 272-288 [doi]
- Approximation Algorithms for Detecting Critical NodesMario Ventresca, Dionne M. Aleman. 289-305 [doi]