#### Filter Results:

#### Publication Year

1994

2015

#### Publication Type

#### Co-author

#### Key Phrase

#### Publication Venue

Learn More

Two important recent trends in military and civilian communications have been the increasing tendency to base operations around an internal network, and the increasing threats to communications infrastructure. This combination of factors makes it important to study the robustness of network topologies. We use graph-theoretic concepts of connectivity to do… (More)

In this paper, we introduce a new measure of symmetry which we call the symmetry ratio of a network, defined to be the ratio of the number of distinct eigenval-ues of the network to D + 1, where D is the diameter. The symmetry ratio has utility in partially predicting the robustness of a network in the face of attack. We prove a number of results placing… (More)

Social Network Analysis is an approach to analysing organisations focusing on relationships as the most important aspect. In this paper we discuss visualisation techniques for Social Network Analysis, including spring-embedding and simulated annealing techniques. We introduce a visualisation technique based on Kohonen neural networks, and also introduce… (More)

In this paper we present an improved l o gic for analysing authentication properties of cryptographic protocols, based on the SVO l o gic of Syverson and van Oorschot. Such logics are useful in electronic commerce , among other areas. We have constructed this logic in order to simplify automation, and we describe an implementation using the Isabelle… (More)

We examine the robustness of critical infrastructure networks in the face of terrorist attack, using a simulation experiment that incorporates link capacity; and an extension of data farming which we call network farming. Our results show that symmetrical designed networks generally outperform randomly generated networks, although ring-like structures are… (More)

In this paper, we show how lazy functional programming techniques can be used within the Java programming language. We provide Java implementations of classic examples of lazy lists, such as the Sieve of Eratosthenes, the Eight Queens Problem, and natural-language parsing. We discuss how well these implementations succeed, compared to their original… (More)

In this paper we introduce a category-theoretic formalisation of social network analysis. This generalises traditional graph-theoretic formalisations and facilitates a formal approach to statements and beliefs about social networks. We describe a formal semantics for belief in social networks, and we illustrate our formalisation by a case study drawn from… (More)

In this paper, the author explores epistemological aspects of simulation with a particular focus on using simulations to provide recommendations to managers and other decision-makers. The author presents formal definitions of knowledge (as justified true belief) and of simulation. The author shows that a simple model, the Kuramoto model of… (More)