Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3999466

zbMath0729.90033MaRDI QIDQ3999466

Douglas R. Shier

Publication date: 17 September 1992


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (41)

Sixty years of network reliabilityA cutting plane algorithm for computing \(k\)-edge survivability of a networkMonomial ideals and the Scarf complex for coherent systems in reliability theory.Renormalization of two—terminal reliabilityFast computation of bounds for two-terminal network reliabilityA DIVIDE-AND-CONQUER ALGORITHM FOR FINDING A MOST RELIABLE SOURCE ON A RING-EMBEDDED TREE NETWORK WITH UNRELIABLE EDGESUnnamed ItemAlgebraic methods applied to shortest path and maximum flow problems in stochastic networksOn reliability of graphs with node failuresA survey of efficient reliability computation using disjoint products approachConsecutive cuts and paths, and bounds on k‐terminal reliabilityNetwork connectivity entropy and its application on network connectivity reliabilityNetwork reliability: Heading out on the highwayFactorization of network reliability with perfect nodes. I: Introduction and statementsFactorization of network reliability with perfect nodes. II: Connectivity matrixMeasuring component importance for network system using cellular automataListing the bonds of a graph in \(\widetilde{O} (n)\)-delayStrategies for protecting supply chain networks against facility and transportation disruptions: an improved Benders decomposition approachA quick inclusion-exclusion techniqueAvailability allocation of networked systems using Markov model and heuristics algorithmExpected rank in antimatroidsPolynomial‐time algorithms for solving a class of critical node problems on trees and series‐parallel graphsNetwork location of a reliable center using the most reliable route policyA novel node-based sequential implicit enumeration method for finding all \(d\)-MPs in a multistate flow networkA note on Zeilberger's abstract lace expansionUnnamed ItemOn the inference of semi-coherent structures from dataThe graph bottleneck identityAn improved algorithm for finding all upper boundary points in a stochastic-flow networkExpected value expansions in rooted graphsA linear time algorithm for computing the most reliable source on a series--parallel graph with unreliable edgesStructured construction and simulation of nondeterministic stochastic activity networksUnnamed ItemA Note on the Recognition of Nested GraphsUniformly optimal graphs in some classes of graphs with node failuresAn Edge-Turbulence Algorithm for the 2-MRS Problem on Trees with Unreliable EdgesAlgorithms to calculate the distribution of the longest path length of a stochastic activity network with continuous activity durationsImproved Bonferroni inequalities via union-closed set systemsAccurate and Interval Estimates of the Probability of Network Service Availability for Communication NetworksNested GraphsOn algorithms for enumerating BC-subtrees of unicyclic and edge-disjoint bicyclic graphs




This page was built for publication: