{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:43:43Z","timestamp":1732038223559,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.23919\/isita.2018.8664381","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T23:49:11Z","timestamp":1552348151000},"page":"252-256","source":"Crossref","is-referenced-by-count":3,"title":["k-connectivity of Random Graphs and Random Geometric Graphs in Node Fault Model"],"prefix":"10.23919","author":[{"given":"Satoshi","family":"Takabe","sequence":"first","affiliation":[]},{"given":"Tadashi","family":"Wadayama","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/24.87131"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006574"},{"article-title":"Fault Tolerance of Random Graphs with respect to Connectivity: Phase Transition in Logarithmic Average Degree","year":"2017","author":"takabe","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2219","DOI":"10.1109\/WCNC.2005.1424861","article-title":"Asymptotic Critical Transmission Ranges for Connectivity in Wireless Ad Hoc Networks with Bernoulli Nodes","volume":"4","author":"wan","year":"2005","journal-title":"IEEE Wireless Comm and Networking Conf 2005"},{"key":"ref14","first-page":"290","volume":"6","author":"erd\u00f6s","year":"1959","journal-title":"On Random Graphs I"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0095-8956(81)80021-4"},{"key":"ref16","article-title":"Random Intersection Graphs","author":"singer-cohen","year":"1995","journal-title":"PhD thesis"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/978-3-642-18009-5_5","article-title":"Component Evolution in General Random Intersection Graphs","volume":"6516","author":"bradonji?","year":"2010","journal-title":"Lecture Notes in Computer Science"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7039959"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2009.03.042"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1098-2418(199909)15:2<145::AID-RSA2>3.0.CO;2-G"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814068"},{"key":"ref27","first-page":"47","volume":"118","author":"bollob\u00e1s","year":"1985","journal-title":"Random Graphs of Small Order"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2001.965963"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1089733.1089736"},{"key":"ref5","first-page":"197","article-title":"Random Key Predistribution Schemes for Sensor Networks","author":"chan","year":"2003","journal-title":"Proc IEEE Symp Security and Privacy"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0927-0507(05)80128-8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0016-0032(56)90559-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1368893"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620734"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.11.016"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2181331"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2307\/3214317"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/0109045"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2228894"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2046254"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.23919\/ISITA.2018.8664381"},{"journal-title":"Information Theory Coding Theorems for Discrete Memoryless Systems","year":"1982","author":"csisz\u00e1r","key":"ref25"}],"event":{"name":"2018 International Symposium on Information Theory and Its Applications (ISITA)","start":{"date-parts":[[2018,10,28]]},"location":"Singapore","end":{"date-parts":[[2018,10,31]]}},"container-title":["2018 International Symposium on Information Theory and Its Applications (ISITA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8660385\/8664205\/08664381.pdf?arnumber=8664381","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T05:19:21Z","timestamp":1552367961000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8664381\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.23919\/isita.2018.8664381","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}