Christian M. Schneider

Learn More
Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a(More)
Natural and technological interdependent systems have been shown to be highly vulnerable due to cascading failures and an abrupt collapse of global connectivity under initial failure. Mitigating the risk by partial disconnection endangers their functionality. Here we propose a systematic strategy of selecting a minimum number of autonomous nodes that(More)
The way diseases spread through schools, epidemics through countries, and viruses through the internet is crucial in determining their risk. Although each of these threats has its own characteristics, its underlying network determines the spreading. To restrain the spreading, a widely used approach is the fragmentation of these networks through(More)
Postural alignment is not an inherent trait. Proper alignment is acquired through training postural muscle groups. This training is based on scientific principles associated with improving the physiological parameters of muscle mechanics. The purpose of this report is to describe and demonstrate the application of exercise physiology training principles to(More)
We develop a method to generate robust networks against malicious attacks, as well as to substantially improve the robustness of a given network by swapping edges and keeping the degree distribution fixed. The method, based on persistence of the size of the largest cluster during attacks, was applied to several types of networks with broad degree(More)
Human mobility is a key component of large-scale spatial-transmission models of infectious diseases. Correctly modeling and quantifying human mobility is critical for improving epidemic control, but may be hindered by data incompleteness or unavailability. Here we explore the opportunity of using proxies for individual mobility to describe commuting flows(More)
Studies using massive, passively collected data from communication technologies have revealed many ubiquitous aspects of social networks, helping us understand and model social media, information diffusion and organizational dynamics. More recently, these data have come tagged with geographical information, enabling studies of human mobility patterns and(More)
  • Citation Hasan, Christian M Samiul, Satish V Schneider, Marta C Ukkusuri, González, Spatiotemporal +4 others
  • 2012
The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Abstract. The modeling of human mobility is adopting new directions due to the increasing availability of big data sources from human activity. These sources enclose digital information about daily visited locations of a large number of(More)
We report here an improved protocol for the preparation of full-length cDNA libraries that improves the previously reported method (Carninci, P., Kvam, K., Kitamura, A. et al. 1996, Genomics, 137, 327-336), that allows long cDNAs to be cloned more efficiently. One potential disadvantage of the original biotinylated CAP trapper protocol is the exposure of(More)
Lasers are recognized for coherent light emission, the onset of which is reflected in a change in the photon statistics. For many years, attempts have been made to directly measure correlations in the individual photon emission events of semiconductor lasers. Previously, the temporal decay of these correlations below or at the lasing threshold was(More)