Books

  1. M. T. Thai, Group Testing Theory in Network Security, Springer Publisher, 2011, ISBN: 1461401275
  2. M. T. Thai and P. Pardalos (eds), Handbook of Optimization in Complex Networks: Theory and Applications , Springer Publisher, 2011, ISBN: 978-1461407539
  3. M. T. Thai and P. Pardalos (eds), Handbook of Optimization in Complex Networks: Communication and Social Networks, Springer Publisher, 2011, ISBN: 978-1461408567
  4. Y. Li, M. T. Thai, and W. Wu (eds), Wireless Sensor Networks and Applications, Springer Publisher, March 2007, ISBN: 0387495916

Book Chapters

  1. H. Zhang, S. Mishra, M. T. Thai, Recent Advances in Information Diffusion and Influence Maximization in Complex Social Networs, Opportunistic Mobile Social Networks, (J. Wu and Y. Wang eds), CRC Press, Taylor & Francis Group, to appear, 2014
  2. Y. Shen, D. T. Nguyen, and M. T. Thai, Hardness Complexity of Optimal Substructure Problems on Power-Law Graphs, Handbook of Optimization in Complex Networks: Theory and Applications, (M. T. Thai and P. Pardalos eds), Springer Publisher, 2011
  3. T. N. Dinh, D. T. Nguyen, M. T. Thai, A Unified Approach for Domination Problems on Different Network Topologies, Handbook of Combinatorial Optimization, (P. Pardalos, D.-Z. Du, and R. Graham eds), Springer Publisher
  4. M. T. Thai, T. N. Dinh, and Y. Shen, Hardness and Approximation of Network Vulnerability, Handbook of Combinatorial Optimization, (P. Pardalos, D.-Z. Du, and R. Graham eds), Springer Publisher
  5. N. P. Nguyen,  Y. Xuan, and M. T. Thai,  On Detection of Community Structure in Dynamic Social Networks, Handbook of  Optimization in Complex Networks: Theory and Applications, (M. T. Thai and P. Pardalos eds), Springer Publisher, 2011
  6. T. N. Dinh, I. Shin, N. K. Thai, M. T. Thai, and T. Znati, A General Approach for Modules Identification in Evolving Networks, Dynamics of Information Systems: Theory and Applications, (M. Hirsh, P. Pardalos, and R. Murphey eds), Springer Publisher, 2010. ISBN: 978-1-4419-5688-0
  7. R. Tiwari and M. T. Thai, On Enhancing Fault Tolerance of Virtual Backbone in Wireless Sensor Networks with Unidirectional Links, Sensors: Theory, Algorithm, and Applications, (V. Boginski and P. Pardalos eds), Springer Publisher, 2010

Journal Articles

  1. T. N. Dinh and M. T. Thai, Network under Joint Node and Link Attacks: Vulnerability Assessment Methods and Analysis, IEEE Transactions on Networing (ToN), accepted with revision, 2013
  2. M. Hemmati, J.C. Smith, and M. T. Thai, A Cutting-plane Algorithm for Solving a Weighted Influence Interdiction Problem, Computaional Optimization and Applications, to appear, 2013
  3. Y. Shen and M. T. Thai, The Robustness of Power-Law Networks: Its Assessment and Optimization, IEEE Transactions on Reliability, accepted with revision, 2013
  4. Y. Shen, M. T. Thai, and H. Nguyen, Staying Safe and Visible via Message Sharing in Online Social Networks, Journal of Combinatorial Optimization (JOCO), to appear, 2013.
  5. T. N. Dinh and M. T. Thai, Community Detection in Scale-free Networks: Approximation Algorithms for Maximizing Modularity , IEEE Journal on Selected Areas in Communications: Special Issue on Network Science (JSAC), 2013
  6. T. N. Dinh, H. Zhang, D. T. Nguyen, and M. T. Thai, Cost-effective Viral Marketing for Time-critical Campaigns in Large-scale Social Networks, IEEE/ ACM Transactions on Networking (ToN), to appear, 2013
  7. D. T. Nguyen - Y. Shen, and M. T. Thai, Detecting Critical Nodes in Interdependent Power Networks for Vulnerability Assessment, IEEE Transactions on Smart Grid (ToSG), special Issues on "Smart Grid Communication Systems: Reliability, Dependability & Performance", 2012.
  8. T. N. Dinh, Y. Shen, D. T. Nguyen, and M. T. Thai, On the Approximability of Positive Influence Dominating Set in Social Networks, Journal of Combinatorial Optimization (JOCO),  2012  [ PDF ]
  9. Y. Shen, N. P. Nguyen, Y. Xuan, and M. T. Thai, On the Discovery of Critical Nodes and Links for Assessing Network Vulnerability, IEEE Transactions on Networking (ToN), 2012, (to appear)
  10. Y. Xuan, Y. Shen, and N. P. Nguyen, Efficient Multi-Link Failure Localization in All-Optical Networks, IEEE Transactions on Communications (TCOM), 2012, accepted with revision
  11. D. T. Nguyen, N. P. Nguyen, M. T. Thai, and S. Hela, Optimal and Distributed Algorithms for Coverage Hole Healing in Hybrid Sensor Networks, International Journal of Sensor Networks (IJSNet), to appear
  12. Y. Shen, D. T. Nguyen, Y. Xuan, and M. T. Thai, New Techniques for Approximating Optimal Substructure Problems in Power-Law Graphs, Theoretical Computer Science (TCS),  2012 [ PDF ]
  13. R. Tiwari,  T. N. Dinh, M. T. Thai, On Centralized and Localized approximation algorithms for Interference-Aware Broadcast Scheduling, IEEE Transactions on Mobile Computing (TMC), 2011, to appear
  14. T. N. Dinh, Y. Xuan, M. T. Thai, P. Pardalos, and T. Znati, On New Approaches of Assessing Network Vulnerability: Hardness and Approximation, IEEE/ACM Transactions on Networking (ToN), 2012 [ PDF ]
  15. Y. Xuan, Y. Shen, N. P. Nguyen and M. T. Thai. A Trigger Identification Service for Defending Reactive Jammers in WSN, IEEE Transactions on Mobile Computing(TMC), 2012
  16. Y. Xuan, I. Shin, M. T. Thai, and T. Znati, Detecting Application Denial-of-Service Attacks: A Group Testing Based Approach, IEEE Transactions on Parallel and Distributed Systems, 2010, DOI: http://doi.ieeecomputersociety.org/10.1109/TPDS.2009.147
  17. I. Shin, Y. Shen, and M. T. Thai, On Approximation of Dominating Tree in Wireless Sensor Networks, Optimization Letter, 2010. DOI: 10.1007/s11590-010-0175-0
  18. I. Shin, Y. Shen, Y. Xuan, M. T. Thai, and T. Znati A Novel Approach Against Reactive Jamming Attacks, Ad Hoc & Sensor Wireless Network, to appear.
  19. N. Zhang, I. Shin, F. Zou, W. Wu, and M. T. Thai, Construction of Virtual Backbone with Multiple Factors Constraints in Wireless Ad-hoc Network, Ad hoc & Sensor Wireless Networks, vol. 10, pp. 27-59, 2010.
  20. G. Thakur, R. Tiwari, M. T. Thai, S-S. Chen, and A. Dress, Detection of Local Community Structures in Complex Dynamics Networks with Random Walks, IET Systems Biology, vol. 3, Issue 4, July 2009.
  21. C. Wang, M. T. Thai, Y. Li, F. Wang, and W. Wu, Optimization Scheme for Sensor Coverage Scheduling with Bandwidth Constraints, Optimization Letters, vol. 3, no. 1, pp. 63-75, 2009.
  22. M. T. Thai and T. Znati, On the Complexity and Approximation of Non-unique Probe Selection Using d-Disjunct Matrix, Journal of Combinatorial Optimization, special issues on Data Mining in Biomedicine, vol. 17, no. 1, pp 45-53, 2009.
  23. P. Deng, M. T. Thai, Q. Ma, and W. Wu, Efficient Non-Unique Probes Selection Algorithms for DNA Microarray, BMC Genomics, vol. 9, suppl. 1, 2008.
  24. M. T. Thai, R. Tiwari, and D.-Z. Du, On Construction of Virtual Backbone in Wireless Ad Hoc Networks with Unidirectional Links, IEEE Transactions on Mobile Computing (TMC), vol. 7, no. 8, pp. 1-12, 2008.
  25. M. T. Thai, N. Zhang, R. Tiwari, and X. Xu, On Approximation Algorithms of k-Connected m-Dominating Sets in Disk Graphs, Theoretical Computer Science, vol. 385, no. 1-3, pp. 49-59, 2007.
  26. M. T. Thai, D. MacCallum, P. Deng, and W. Wu, Decoding Algorithms in Pooling Designs with Inhibitors and Fault Tolerance, International Journal of Bioinformatics Research and Applications (IJBRA), vol. 3, no. 2, pp. 145-152, 2007.
  27. M. T. Thai, F. Wang, D. Liu, S. Zhu, and D.-Z. Du, Connected Dominating Sets in Wireless Networks with Different Transmission Ranges, IEEE Transactions on Mobile Computing (TMC), vol. 6, no. 7, July, 2007.
  28. F. Wang, M. T. Thai, Y. Li, X. Cheng, and D.-Z. Du, Fault Tolerant Topology Control for All-to-One and One-to-All Communication in Wireless Networks, IEEE Transaction on Mobile Computing (TMC), vol. 7, no. 3, pp. 322-331, 2007.
  29. F. Wang, M. T. Thai, and D.-Z. Du, 2-Connected Virtual Backbone in Wireless Networks, IEEE Transactions on Wireless Communications, vol. 8, no. 4, pp. 297-302, 2009.
  30. Y. Li, M. T. Thai, F. Wang, and D.-Z. Du, On the Construction of a Strongly Connected Broadcast Arborescence with Bounded Transmission Delay, IEEE Transactions on Mobile Computing (TMC), vol. 5,  no. 10, pp. 1460-1470, 2006.
  31. M. T. Thai, F. Wang, H. Du, and X. Jia, Coverage Problems in Wireless Sensor Networks: Designs and Analysis, International Journal of Sensor Networks, special issue on Coverage Problems in Sensor Networks, vol. 3, no. 3, pp. 191-200, 2008.
  32. F. Wang, K. Xu, M. T. Thai, D.-Z. Du, Fault Tolerant Topology Control for One-To-All Communications in Symmetric Wireless Networks, International Journal of Sensor Networks, special issue on Theoretical and Algorithmic Aspects in Sensor Networks, vol. 2, no. 3/4, pp. 163-168, 2007.
  33. M. T. Thai, Z. Cai, and D.-Z. Du, Genetic Networks: Processing Data, Regulatory Network Modeling, and their Analysis, special issue of J. Optimization Methods and Software on Optimization and Data Mining Techniques in Biomedicine, vol. 22, no. 1, pp. 169-185, Feb, 2007.
  34. H. Gao, F.K. Hwang, M. T. Thai, W. Wu, and T. Znati, Construction of d(H)-Disjunt Matrix for Group Testing in Hypergraphs, J. of Combinatorial Optimization, vol. 12, no. 3, pp. 297-301, 2006.
  35. M. T. Thai and D.-Z. Du, Connected Dominating Sets in Disk Graphs with Bidirectional Links, IEEE Communications Letters, vol. 10, no. 3, pp. 138-140, March 2006.
  36. Y. Li, M. T. Thai, F. Wang, C.-W. Yi, P. Wan, and D.-Z. Du, On Greedy Construction of Connected Dominating Sets in Wireless Networks, special issue of Wireless Communications and Mobile Computing (WCMC), vol. 5, no. 88, pp. 927-932, 2005.
  37. Y. Li, M. T. Thai, Z. Liu, and W. Wu, Protein-Protein Interaction and Group Testing in Bipartite Graphs, International Journal of Bioinformatics Research and Applications (IJBRA), vol. 1, no. 4, pp. 414-419, 2005.
  38. L. Guo, W. Wu, F. Wang, and M. T. Thai, Approximation for Minimum Multicast Route in Optical Network with Nonsplitting Nodes, Journal of Combinatorial Optimizationvol. 10, no. 4, pp. 414-419 December 2005.
  39. M. T. Thai, Y. Li, and D.-Z. Du, A Combination of Wireless Multicast Advantage and Hitch-hiking, IEEE Communications Letters, vol. 9, no. 12, pp. 1037-1039, December 2005.
  40. H. Du, X. Jia, F. Wang, M. T. Thai, Y. Li, A Note on Optical Network with Nonsplitting Nodes, Journal of Combinatorial Optimization, vol. 10, no. 2, pp. 199-202, 2005
  41. J. Li, Y. Li, M. T. Thai, and J. Li, Data Caching and Query Processing in MANETs, International Journal of Pervasive Computing and Communications (JPCC), vol. 1, no. 3, pp. 169-178, September 2005.

Conference Papers

  1. Subhankar Mishra, Thang Dinh, M. T. Thai, and Incheol Shin, Optimal Inspection Points for Malicious Attack Detection in Smart Grids, in Proceedings of the The 20th International Computing and Combinatorics Conference (COCOON), 2014
  2. D. T. Nguyen, H. Zhang, S. Das, M. T. Thai, and T. N. Dinh, Least Cost Influence in Multiplex Social Networks: Model Representation and Analysis, in Proceedings of the IEEE Int Conference on Data Mining (ICDM), 2013
  3. Y. Shen and M. T. Thai, Vulnerability Assessment under Cascading Failures, in Proceedings of the IEEE Global Communication Conference (GLOBECOM), 2013
  4. Dung T. Nguyen, Soham Das, and My T. Thai, Influence Maximization in Multiple Online Social Networks, in Proceedings of the IEEE Global Communication Conference, (GLOBECOM), 2013.
  5. Nam P Nguyen, Md Abdul Alim and My T. Thai, Assessing complex network vulnerability: A community structure point of view, in Proceedings of the The IEEE/ACM Int. Conf. on Advances in Social Networks Analysis and Mining (ASONAM) 2013.
  6. H. Zhang, T. N. Dinh, and M. T. Thai, Maximizing the Spread of Positive Influence in Online Social Networks , in Proceedings of the 33rd International Conference on Distributed Computing Systems (ICDCS), 2013.
  7. Y. Shen, D. T. Nguyen, and M. T. Thai, Adaptive Approximation Algorithms for Hole Healing in Hybrid Wireless Sensor Networks, in Proceedings of the 32nd Int Conference on Computer Communications (INFOCOM), 2013
  8. T. N. Dinh, N. P. Nguyen, and M. T. Thai, An Adaptive Approximation Algorithm for Community Detection in Dynamic Scale-free Networks, in Proceedings of the 32nd Int Conference on Computer Communications (INFOCOM) Mini-Conference, 2013
  9. T. N. Dinh-Y. Shen, and M. T. Thai, The Walls Have Ears: Optimize Sharing for Visibility and Privacy in Online Social Networks, in Proceedings of ACM Int' Conference on Information and Knowledge Management (CIKM), 2012 [ PDF ]
  10. Y. Shen, T. N. Dinh, H. Zhang, and M. T. Thai, Interest-Matching Information Propagation in Multiple Online Social Networks, in Proceedings of ACM Int' Conference on Information and Knowledge Management (CIKM), 2012
  11. N. P. Nguyen and M. T. Thai, Finding Overlapped Communities in Online Social Networks with Nonnegative Matrix Factorization, in Proceedings of the IEEE Military Communications Conference (MILCOM), 2012
  12. D. T. Nguyen, N. P. Nguyen, and M. T. Thai, Sources of Misinformation in Online Social Networks: Who to Suspect?, in Proceedings of the IEEE Military Communications Conference (MILCOM), 2012
  13. Y. Shen, T. N. Dinh, and M. T. Thai, Adaptive Algorithms for Detecting Critical Links and Nodes in Dynamic Networks, in Proceedings of the IEEE Military Communications Conference (MILCOM), 2012
  14. T. N. Dinh, Y. Shen, and M. T. Thai, An Efficient Spectral Bound for Link Vulnerability Assessment in Large-scale Networks, in Proceedings of the IEEE Military Communications Conference (MILCOM), 2012
  15. T. N. Dinh, D. T. Nguyen, and M. T. Thai, Cheap, Easy, and Massively Effective Viral Marketing in Social Networks: Truth or Fiction?, in Proceedings of ACM Conference on Hypertext and Social Media (Hypertext), 2012 [ PDF ]
  16. Y. Shen, Y-S. Syu, D. T. Nguyen, and M. T. Thai, Maximizing Circle of Trust in Online Social Networks, in Proceedings of ACM Conference on Hypertext and Social Media (Hypertext), 2012. [ PDF ]
  17. N. P. Nguyen, G. Yan, M. T. Thai, and S. Eidenbenz, Containment of Viral Spread in Online Social Networks, in Proceedings of the 4th ACM Web Science (Websci), 2012 [ PDF ]
  18. Y. Xu, S. Helal, M. T. Thai, and M. Schmalz, Optimizing Push/Pull Envelops for Energy-Efficient Cloud-Sensor Systems, in Proceedings of ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM), 2011
  19. D. T. Nguyen, N. P. Nguyen, M. T. Thai, A. Helal,  An optimal algorithm for coverage hole healing in hybrid sensor networks, in 7th International Wireless Communications and Mobile Computing Conference, IWCMC, 2011
  20. Y. Xu, S. Helal, M. T. Thai, and M. Schmalz, Optimizing Push/Pull Envelops for Energy-Efficient Cloud-Sensor Systems, in Proceedings of ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM), 2011
  21. N. P. Nguyen, T. N Dinh, D. T. Nguyen, and M. T. Thai, Overlapping Community Structures and their Detection on Social Networks, in Proceedings of IEEE International Conference on Social Computing (SocialCom), 2011
  22. T. N. Dinh and M. T. Thai, Finding Community Structures with Performance Guarantees in Complex Networks, in Proceedings of IEEE International Conference on Social Computing (SocialCom), 2011
  23. T. N. Dinh and M. T. Thai, Precise Structural Vulnerability Assessment via Mathematical Programming, in Proceedings of the IEEE Military Communications Conference (MILCOM), 2011
  24. Y. Shen, Y. Xuan, and M. T. Thai, On Local Approximation of Minimum-Latency Broadcast Scheduling in 3D MANETs, in Proceedings of the IEEE Military Communications Conference (MILCOM), 2011
  25. N. P. Nguyen, T. N. Dinh, S. Tokala  and M. T. Thai,  Overlapping communities in dynamic networks: Their detection and How they can help Mobile applications. in Proceedings of the 17th Annual International Conference on Mobile Computing and Networking (MOBICOM), 2011. [ PDF ]
  26. Y. Shen, N. P. Nguyen, and M. T. Thai, Exploiting the Robustness on Power-Law Networks, in Proceedings of  the 17th Annual International Computing and Combinatorics Conference (COCOON), 2011.
  27. N. P. Nguyen, T. N. Dinh, Y. Xuan and M. T. Thai, Adaptive Algorithms for Detecting Community Structure in Dynamic Social Networks. IEEE International Conference on Computer Communications(INFOCOM), 2011.
  28. Y. Shen, D. T. Nguyen, and M. T. Thai, On the Hardness and Inapproximability of Optimization Problems on Power Law Graphs, in Proceedings of the Int Conference on Combinatorial Optimization and Applications (COCOA), 2010
  29. N. P. Nguyen, Y. Xuan, and M. T. Thai, A Novel Method for Worm Containment on Dynamic Social Networks, in Proceedings of the Military Communications Conference (MILCOM), 2010
  30. R. Tiwari, M. T. Thai, and S. Helal, Localized Energy Efficient Detection and Tracking of Dynamic Phenomena, in Proceedings of the IEEE Global Communication Conference, (GLOBECOM), 2010
  31. Y. Xuan, Y. Shen, and M. T. Thai, A Graph-theoretic QoS-aware Vulnerability Assessment for Network Topologies, in Proceedings of the IEEE Global Communication Conference (GLOBECOM), 2010
  32. F. Ay-T. N. Dinh, M. T. Thai, and T. Kahveci, Finding Dynamic Modules of Biological Regulatory Networks, in Proceedings of the IEEE Conference on Bioinformatics and Bioengineeing (BIBE), 2010.
  33. T. N. Dinh, Y. Xuan, M. T. Thai, EK Park, and T. Znati, On Approximation of New Optimization Methods for Assessing Network Vulnerability, in Proceedings of the IEEE Communications Society (INFOCOM), 2010
  34. Y. Xuan, Y. Shen, I. Shin, and M. T. Thai, On Trigger Detection Against Reactive Jamming Attacks: A Clique-Independent Set Based Approach, in Proceedings of the 28th IEEE International Performance Computing and Communications Conference (IPCCC), 2009
  35. T. N. Dinh, Y. Xuan, and M. T. Thai, Towards Social-aware Routing in Dynamic Communication Networks, in Proceedings of the 28th IEEE International Performance Computing and Communications Conference (IPCCC), 2009.
  36. R. Tiwari, T. N. Dinh, and M. T. Thai, On Approximation Algorithms for Interfence-Aware Broadcast Scheduling in 2D and 3D Wireless Sensor Networks, in Proceedings of Int. Conf. on Wireless Algorithms, Systems and Applications (WASA), 2009.
  37. I. Shin, Y. Shen, Y. Xuan, M. T. Thai, and T. Znati, Reactive Jamming Attacks in Multi-Radio Wireless Sensor Networks: An Efficient Mitigating Measure by Identifying Trigger Nodes, in Proceedings of ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing (FOWANC), in conjunction with MobiHoc, 2009.
  38. N. Zhang, I. Shin, B. Li, C. Boyaci, R. Tiwari and M. T. Thai, New Approximation for Minimum-weight Routing Backbone in Wireless Sensor Network, in Proceedings of Int. Conf. on Wireless Algorithms, Systems and Applications (WASA) 2008.
  39. M. T. Thai, Y. Xuan, I. Shin, and T. Znati, On Detection of Malicious Users Using Group Testing Techniques, in Proceedings of Int. Conf. on Distributed Computing Systems (ICDCS), 2008.
  40. R. Mahiourian, F. Chen, R. Tiwari, M. T. Thai, H. Zhai, and Y. Feng, An Approximation Algorithm for Conflict-Aware Broadcast Scheduling in Wireless Ad Hoc Networks, in Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2008.
  41. N. Zhang, I. Shin, F. Zou, W. Wu, and M. T. Thai, Trade-Off Scheme for Fault Tolerant Connected Dominating Sets on Size and Diameter, in Proceedings of ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing (FOWANC), in conjunction with MobiHoc, 2008.
  42. M. T. Thai, P. Deng, W. Wu, and T. Znati, Approximation Algorithms of Non-unique Probes Selection for Biological Target Identification, in Proceedings of Conference on Data Mining, Systems Analysis and Optimization in Biomedicine, 2007.
  43. Y. Wu, F. Wang, M. T. Thai, and Y. Li, Constructing k-Connected m-Dominating Sets in Wireless Sensor Networks, in Proceedings of Military Communications Conference (MILCOM 2007), October, 2007.
  44. C. Wang, M. T. Thai, Y. Li, F. Wang, and W. Wu, Minimum Coverage Breach and Maximum Network Lifetime in Wireless Sensor Networks, in Proceedings of Global Telecommunications Conference (GLOBECOM), 2007.
  45. P. Deng, M. T. Thai, and W. Wu, A Non-Unique Probes Selection Algorithm Using d-Disjunt Matrix, in Proceedings of Int. Conf. on Bioinformatics and Computational Biology (BIOCOMP), 2007.
  46. R. Tiwari, T. Mishra, Y. Li, and M. T. Thai, k-Strongly Connected m-Dominating and Absorbing Set in Wireless Ad Hoc Networks with Unidirectional Links, International Conference on Wireless Algorithms, Systems, and Applications(WASA 2007) August, 2007.
  47. M. Park, C. Wang, J. Willson, M. T. Thai, W. Wu, and A. Farago, A Dominating and Absorbent Set in Wireless Ad-hoc Networks with Different Transmission Range, in Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2007.
  48. M. T. Thai, Y. Li, F. Wang, and D.-Z. Du, O(log n)-Localized Algorithms on the Coverage Problem in Heterogeneous Sensor Networks, in Proceedings of the 26th IEEE International Performance Computing and Communications Conference (IPCCC 2007), April, 2007.
  49. D.-Z. Du, M. T. Thai, Y. Li, D. Liu, and S. Zhu, Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links, in Proceedings of APWEB, LNCS, 2006.