نویسنده: Shabankhah، Mahmood ؛
Journal of Algorithms and Computation December 2016,Volume 48, Nuber 1 (8 صفحه - از 155 تا 162)
The analysis of vulnerability in networks generally involves some questions about how the underlying graph is connected. One is naturally interested in studying the types of disruption in the network that maybe caused by failures of certain links or nodes. In terms of a graph, the concept of connectedness is used in di erent forms to study many of the measures of vulnerability. When certain vertices or edges of a connected graph are deleted, one wants to know whether the remaining graph is still connected, and if so, what its vertex - or edge - connectivity is. If on the other hand, the graph is disconnected, the determination of the number of its components or their orders is useful. Our purpose here is to describe and analyze the current status of the vulnerability measures, identify its more interesting variants, and suggesta most suitable measure of vulnerability.کلیدواژه ها:
- دریافت فایل ارجاع :
- (پژوهیار, , , )
You should become a Sign in to be able to see articles.
If you fail to purchase subscription via PayPal or VISA Card, please send your mobile number to the Website Administrator via email@example.com.