{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:50Z","timestamp":1750306130200,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,19]],"date-time":"2017-07-19T00:00:00Z","timestamp":1500422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,19]]},"DOI":"10.1145\/3102304.3109819","type":"proceedings-article","created":{"date-parts":[[2017,9,8]],"date-time":"2017-09-08T19:50:15Z","timestamp":1504900215000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Agent-based Modeling and Simulation of Virus on a Scale-Free Network"],"prefix":"10.1145","author":[{"given":"Muhammad","family":"Yasir","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Engineering and Technology, Lahore, Faisalabad Campus"}]},{"given":"Muhammad Asif","family":"Habib","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Textile University, Faisalabad, Pakistan"}]},{"given":"Muhammad","family":"Shahid","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Textile University, Faisalabad, Pakistan"}]},{"given":"Mudassar","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Textile University, Faisalabad, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2017,7,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0503-60"},{"key":"e_1_3_2_1_2_1","volume-title":"International Journal of Computer Trends and Technology (IJCTT), 4(9):3207--3213","author":"Mahmood Atif","year":"2013","unstructured":"Atif Mahmood , M Faisal Saleem , Ahsan Latif , and Muddasar Ahmad . Key features and optimum performance of network simulators: A brief study . International Journal of Computer Trends and Technology (IJCTT), 4(9):3207--3213 , 2013 . Atif Mahmood, M Faisal Saleem, Ahsan Latif, and Muddasar Ahmad. Key features and optimum performance of network simulators: A brief study. International Journal of Computer Trends and Technology (IJCTT), 4(9):3207--3213, 2013."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.24297\/ijct.v9i1.4155"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/e17063552"},{"issue":"2","key":"e_1_3_2_1_5_1","first-page":"245","article-title":"Content-based image retrieval by exploring bandletized regions through support vector machines","volume":"32","author":"Ashraf Rehan","year":"2016","unstructured":"Rehan Ashraf , Khalid Bashir Bajwa , and Toqeer Mahmood . Content-based image retrieval by exploring bandletized regions through support vector machines . J. Inf. Sci. Eng. , 32 ( 2 ): 245 -- 269 , 2016 . Rehan Ashraf, Khalid Bashir Bajwa, and Toqeer Mahmood. Content-based image retrieval by exploring bandletized regions through support vector machines. J. Inf. Sci. Eng., 32(2):245--269, 2016.","journal-title":"J. Inf. Sci. Eng."},{"key":"e_1_3_2_1_6_1","first-page":"136","article-title":"A novel approach for the gender classification through trained neural networks","volume":"4","author":"Ashraf R","year":"2014","unstructured":"R Ashraf , T Mahmood , A Irtaza , and KB Bajwa . A novel approach for the gender classification through trained neural networks . J. Basic Appl. Sci. Res , 4 : 136 -- 144 , 2014 . R Ashraf, T Mahmood, A Irtaza, and KB Bajwa. A novel approach for the gender classification through trained neural networks. J. Basic Appl. Sci. Res, 4:136--144, 2014.","journal-title":"J. Basic Appl. Sci. Res"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11576-006-0058-2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.055103"},{"key":"e_1_3_2_1_10_1","volume-title":"Epidemic spreading in scale-free networks. Physical review letters, 86(14):3200","author":"Pastor-Satorras Romualdo","year":"2001","unstructured":"Romualdo Pastor-Satorras and Alessandro Vespignani . Epidemic spreading in scale-free networks. Physical review letters, 86(14):3200 , 2001 . Romualdo Pastor-Satorras and Alessandro Vespignani. Epidemic spreading in scale-free networks. Physical review letters, 86(14):3200, 2001."},{"issue":"2","key":"e_1_3_2_1_11_1","article-title":"Experimental evaluation of tcp congestion contorl mechanisms in short and long distance networks","volume":"71","author":"Ahmad Mudassar","year":"2015","unstructured":"Mudassar Ahmad , Md Asri Ngadi , and Mohd Murtadha Mohamad . Experimental evaluation of tcp congestion contorl mechanisms in short and long distance networks . Journal of Theoretical and Applied Information Technology , 71 ( 2 ), 2015 . Mudassar Ahmad, Md Asri Ngadi, and Mohd Murtadha Mohamad. Experimental evaluation of tcp congestion contorl mechanisms in short and long distance networks. Journal of Theoretical and Applied Information Technology, 71(2), 2015.","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"e_1_3_2_1_12_1","first-page":"14","volume-title":"Simulation Conference, 2005 Proceedings of the Winter","author":"Macal Charles M","unstructured":"Charles M Macal and Michael J North . Tutorial on agent-based modeling and simulation . In Simulation Conference, 2005 Proceedings of the Winter , pages 14 -pp. IEEE, 2005. Charles M Macal and Michael J North. Tutorial on agent-based modeling and simulation. In Simulation Conference, 2005 Proceedings of the Winter, pages 14-pp. IEEE, 2005."},{"issue":"2","key":"e_1_3_2_1_13_1","first-page":"146","article-title":"Congestion control in multi channel 802.11 b and 802.11 g wireless networks","volume":"15","author":"Ahmad Mudassar","year":"2012","unstructured":"Mudassar Ahmad , Junaid Ahsenali Chaudhry , and Md Asri Ngadi . Congestion control in multi channel 802.11 b and 802.11 g wireless networks . SCIENCE AND TECHNOLOGY , 15 ( 2 ): 146 -- 154 , 2012 . Mudassar Ahmad, Junaid Ahsenali Chaudhry, and Md Asri Ngadi. Congestion control in multi channel 802.11 b and 802.11 g wireless networks. SCIENCE AND TECHNOLOGY, 15(2):146--154, 2012.","journal-title":"SCIENCE AND TECHNOLOGY"},{"key":"e_1_3_2_1_14_1","first-page":"49","volume-title":"Netlogo: Center for connected learning and computer-based modeling","author":"Wilensky Uri","year":"1999","unstructured":"Uri Wilensky and I Evanston . Netlogo: Center for connected learning and computer-based modeling . Northwestern University , Evanston, IL , pages 49 -- 52 , 1999 . Uri Wilensky and I Evanston. Netlogo: Center for connected learning and computer-based modeling. Northwestern University, Evanston, IL, pages 49--52, 1999."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1927.0118"},{"key":"e_1_3_2_1_16_1","volume-title":"Netlogo virus on a network model","author":"Stonedahl F","year":"2008","unstructured":"F Stonedahl and Uri Wilensky . Netlogo virus on a network model . Center for Connected Learning and Computer-Based Modeling , Northwestern University , Evanston, IL, 2008 . F Stonedahl and Uri Wilensky. Netlogo virus on a network model. Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL, 2008."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJCCE.2014.V3.336"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721744"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2918-5"}],"event":{"name":"ICFNDS '17: International Conference on Future Networks and Distributed Systems","sponsor":["LABSTICC Labsticc"],"location":"Cambridge United Kingdom","acronym":"ICFNDS '17"},"container-title":["Proceedings of the International Conference on Future Networks and Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3102304.3109819","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3102304.3109819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:06Z","timestamp":1750217826000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3102304.3109819"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,19]]},"references-count":18,"alternative-id":["10.1145\/3102304.3109819","10.1145\/3102304"],"URL":"https:\/\/doi.org\/10.1145\/3102304.3109819","relation":{},"subject":[],"published":{"date-parts":[[2017,7,19]]},"assertion":[{"value":"2017-07-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}