Слоэн Н. Дж. А., Мак-Вильямс Ф. Дж. Теория кодов, исправляющих ошибки. М.: Радио и связь, 1979.
Спенсер Дж., Алон Н. Вероятностный метод. М.: Бином. Лаборатория знаний, 2007.
Keevash Peter. The existence of designs // arXiv preprint arXiv.H01.3665, 2014.
Renyi A. and Erdos P. On random graphs // Publicationes Mathematicae, 6(290–297):5, 1959.
Erdos Paul and Renyi Alfred. On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci, 5:17–61, 1960.
Albert Reka, Jeong Hawoong and Barabasi Albert-Laszlo. Error and attack tolerance of complex networks // Nature, 406(6794):378–382, 2000.
Doyle J. C., Alderson D. L., Li L., Low S., Roughan M., Shalunov S., Tanaka R. and Willinger W. The «robust yet fragile» nature of the Internet. PNAS, 102(41): 14497–14502, 2005.
Mahadevan P., Krioukov D., Fall K. and Vahdat A. Systematic topology analysis and generation using degree correlations // ACM SIGCOMM Computer Communication Review, 36(4):135–146, 2006.
Eager Derek L., Lazowska Edward D. and Zahorjan John. Adaptive load sharing in homogeneous distributed systems. Software Engineering, IEEE Transactions on, (5): 662–675, 1986.
Введенская Н. Д. Система обслуживания с выбором наименьшей из двух очередей – асимптотический подход / Н. Д. Введенская, Р. Л. Добрушин, Ф. И. Карпелевич // Проблемы передачи информации. – 1996. – № 32 (1). – С. 20–34.
Richa Andrea W., Mitzenmacher M. and Sitaraman R. The power of two random choices: A survey of techniques and results // Combinatorial Optimization, 9:255–304, 2001.
Richa Andrea W., Mitzenmacher M. and Sitaraman R. The power of two random choices: A survey of techniques and results // Combinatorial Optimization, 9:255–304, 2001.
Adrian David, Bhargavan Karthikeyan, Durumeric Zakir, Gaudry Pierrick, Green Matthew, et al. Imperfect forward secrecy: How diffie-hellman fails in practice // Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, p. 5–17. ACM, 2015.
Adrian David, Bhargavan Karthikeyan, Durumeric Zakir, Gaudry Pierrick, Green Matthew, et al. Imperfect forward secrecy: How diffie-hellman fails in practice // Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, p. 5–17. ACM, 2015.
Heule Stefan, Nunkesser Marc and Hall Alexander. Hyperloglog in practice: Algorithmic engineering of a state of the art cardinality estimation algorithm // Proceedings of the 16th International Conference on Extending Database Technology, pp. 683–692. ACM, 2013.
Sketch of the day: Hyperloglog – cornerstone of a big data infrastructure. http://research.neustar.biz/2012/10/25/sketch-of-the-day-hyperloglog-cornerstone-of-a-big-data-infrastructure/. Accessed: 2015-11-22.
Flajolet Philippe, Fusy Eric, Olivier G. and Meunier Frederic. Hyperloglog: The analysis of a near-optimal cardinality estimation algorithm // Philippe Jacquet, editor, Analysis of Algorithms 2007 (AofA07), volume AH of Discrete Mathematics and Theoretical Computer Science Proceedings, p. 127–146, 2007.
Sketch of the day: Hyperloglog – cornerstone of a big data infrastructure. http://research.neustar.biz/2012/10/25/sketch-of-the-day-hyperloglog-cornerstone-of-a-big-data-infrastructure/. Accessed: 2015-11-22.
Heule Stefan, Nunkesser Marc and Hall Alexander. Hyperloglog in practice: Algorithmic engineering of a state of the art cardinality estimation algorithm // Proceedings of the 16th International Conference on Extending Database Technology, pp. 683–692. ACM, 2013.
Backstrom Lars, Boldi Paolo, Rosa Marco, Ugander Johan and Vigna Sebastiano. Four degrees of separation // Proceedings of the 4th Annual ACM Web Science Conference, p. 33–42. ACM, 2012.
Sketch of the day: Hyperloglog – cornerstone of a big data infrastructure. http://research.neustar.biz/2012/10/25/sketch-of-the-day-hyperloglog-cornerstone-of-a-big-data-infrastructure/. Accessed: 2015-11-22.
Backstrom Lars, Boldi Paolo, Rosa Marco, Ugander Johan and Vigna Sebastiano. Four degrees of separation // Proceedings of the 4th Annual ACM Web Science Conference, p. 33–42. ACM, 2012.
Heule Stefan, Nunkesser Marc and Hall Alexander. Hyperloglog in practice: Algorithmic engineering of a state of the art cardinality estimation algorithm // Proceedings of the 16th International Conference on Extending Database Technology, pp. 683–692. ACM, 2013.
Sketch of the day: Hyperloglog – cornerstone of a big data infrastructure. http://research.neustar.biz/2012/10/25/sketch-of-the-day-hyperloglog-cornerstone-of-a-big-data-infrastructure/. Accessed: 2015-11-22.
Vickrey William. Counterspeculation, auctions, and competitive sealed tenders // The Journal of finance, 16(l):8–37, 1961.
Easley David and Kleinberg Jon. Networks, crowds, and markets: Reasoning about a highly connected world. Cambridge University Press, 2010.
Stokes Donald E. Pasteur’s quadrant: Basic science and technological innovation. Brookings Institution Press, 2011.
Райгородский A. M. Модели случайных графов. 2-е изд. М.: МЦНМО, 2016.
Введенская Н. Д. Система обслуживания с выбором наименьшей из двух очередей – асимптотический подход / Н. Д. Введенская, Р. Л. Добрушин, Ф. И. Карпелевич // Проблемы передачи информации. – 1996. – № 32 (1). – С. 20–34.
Виноградов И. М. Основы теории чисел. М. – Ижевск: НИЦ «Регулярная и хаотическая динамика, 2003.
Flajolet Philippe, Fusy Eric, Olivier G. and Meunier Frederic. Hyperloglog: The analysis of a near-optimal cardinality estimation algorithm // Philippe Jacquet, editor, Analysis of Algorithms 2007 (AofA07), volume AH of Discrete Mathematics and Theoretical Computer Science Proceedings, p. 127–146, 2007.
Конец ознакомительного отрывка
Купить книгу