標(biāo)題: Titlebook: Computational Social Networks; 5th International Co Hien T. Nguyen,Vaclav Snasel Conference proceedings 2016 Springer International Publish [打印本頁] 作者: CILIA 時間: 2025-3-21 19:04
書目名稱Computational Social Networks影響因子(影響力)
書目名稱Computational Social Networks影響因子(影響力)學(xué)科排名
書目名稱Computational Social Networks網(wǎng)絡(luò)公開度
書目名稱Computational Social Networks網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computational Social Networks被引頻次
書目名稱Computational Social Networks被引頻次學(xué)科排名
書目名稱Computational Social Networks年度引用
書目名稱Computational Social Networks年度引用學(xué)科排名
書目名稱Computational Social Networks讀者反饋
書目名稱Computational Social Networks讀者反饋學(xué)科排名
作者: 威脅你 時間: 2025-3-21 20:17
Time-Critical Viral Marketing Strategy with the Competition on Online Social Networks,oximated with the rate . and its objective function was sub modular. Furthermore, we recommended an efficient algorithms to solve the problem. The experiments were handled via the real social networks datasets and the results showed that our algorithm generated better outcome than several other heur作者: Nonporous 時間: 2025-3-22 01:06
Analysis of Viral Advertisement Re-Posting Activity in Social Media,gether with all the immediate friends of the reposting users. In addition to that, approximately 150000 non-advertisement messages with their reposts were collected, amounting to approximately 6.5?M of reposts in total. This paper presents the results of the analysis based on these data. We then dis作者: Hay-Fever 時間: 2025-3-22 05:39
Trust Evaluation Based Friend Recommendation in Proximity Based Mobile Social Network,the type of social spot where trust evaluation is being performed and then calculates these parameters in order to compute the final trust value. We utilize semi-trusted servers to authenticate users as well as to perform revocation of malicious users. In case of an attack on servers, real identitie作者: 令人作嘔 時間: 2025-3-22 09:55 作者: xanthelasma 時間: 2025-3-22 15:41
A Hybrid Trust Management Framework for Vehicular Social Networks,-based social trust and social networks-based trust, to target different sets of applications. Third, we discuss the contemporary research challenges in VSN. Our proposed scheme is a stepping stone towards the secure and trustworthy realization of this technology.作者: xanthelasma 時間: 2025-3-22 17:47 作者: Kaleidoscope 時間: 2025-3-23 00:32 作者: FLIC 時間: 2025-3-23 02:42 作者: 兇猛 時間: 2025-3-23 08:18 作者: 闡明 時間: 2025-3-23 11:33 作者: Nuance 時間: 2025-3-23 14:56 作者: 飛行員 時間: 2025-3-23 18:02 作者: LUCY 時間: 2025-3-24 01:24
Sustainable Oil and Gas Using Blockchain reciprocity. Reciprocity is defined as the ratio of the number of reciprocal edges to the total number of edges in the network, and has been well studied in the literature. However, little attention is given to understand the connectivity or network form by the reciprocal edges themselves (reciproc作者: 過于光澤 時間: 2025-3-24 03:00
Blockchain and Sustainable Energytion on large networks is to use random walks. We can then defer to the extensive theory of Markov chains to do error analysis of these estimators. In this work we compare two existing techniques, Metropolis-Hastings MCMC and Respondent-Driven Sampling, that use random walks to do function estimatio作者: 記憶法 時間: 2025-3-24 09:12
https://doi.org/10.1007/978-3-031-30697-6d be established between the groups to give members appropriate access to resource and information. Viewing a social group as a network, we investigate such integration from a computational perspective. In particular, we assume that the networks have equipotent nodes, which refers to the situation w作者: yohimbine 時間: 2025-3-24 11:24
Measuring Operations Performance spread most broadly to the rest of the network individuals. The determination of the information influence degree of individual plays an important role in online social networking. Once there is a list of individuals who have high influence, the marketers can access these individuals and seek them 作者: 連鎖,連串 時間: 2025-3-24 15:21 作者: 行乞 時間: 2025-3-24 19:42 作者: 不朽中國 時間: 2025-3-25 00:19 作者: 賞錢 時間: 2025-3-25 04:52 作者: 發(fā)牢騷 時間: 2025-3-25 09:45 作者: calorie 時間: 2025-3-25 12:55 作者: Folklore 時間: 2025-3-25 18:16
Sustainable Operations in India benefit of OSNs is known to be the provision of free and easy access to a wide range of information, largely unconstrained by geographical barriers and free of charge. This paper specifically addresses the potential use of OSNs as a support tool for financial decision making. The key objectives of 作者: accrete 時間: 2025-3-25 23:58
Felipe Luis Palombini,Mariana Kuhl Cidades. It is shown that this new measure admits analytical definition for some classes of networks such as bipartite graphs, with computation for larger networks. This measure is applied for detecting community structure within networks. The results of numerical experiments for some examples of networks作者: ILEUM 時間: 2025-3-26 02:27
https://doi.org/10.1007/978-3-319-93812-7 proximity in order to make social relationships between them. The users’ mobile devices directly communicate with each other with the help of Bluetooth/Wi-Fi interfaces. The possible presence of a malicious user in the near proximity poses significant threats to the privacy of legitimate users. The作者: exhilaration 時間: 2025-3-26 07:32 作者: Negligible 時間: 2025-3-26 11:12 作者: IRS 時間: 2025-3-26 12:49
Sean Higgins,Mieke T. A. Lopes Cardozos that are increasingly embraced by millions of mobile users. Despite the well understood benefits, such services also raise unique security and privacy issues that are currently not very well investigated. In this paper, we focus on the trending ridesharing recommendation service in geosocial netwo作者: 聯(lián)合 時間: 2025-3-26 19:11 作者: pus840 時間: 2025-3-26 21:40
https://doi.org/10.1007/978-3-319-24397-9oc NETwork (VANET) and Online Social Networks (OSN). The application domain of VSN inherits the features of its parental VANET and OSN, providing value-added services and applications to its consumers, i.e. passengers and drivers. However, the immature infrastructure of VSN is vulnerable to security作者: 內(nèi)疚 時間: 2025-3-27 01:19 作者: 柔軟 時間: 2025-3-27 08:13
978-3-319-42344-9Springer International Publishing Switzerland 2016作者: 表被動 時間: 2025-3-27 11:43
Computational Social Networks978-3-319-42345-6Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 擁護(hù) 時間: 2025-3-27 13:54 作者: 畫布 時間: 2025-3-27 21:09
Complex Network Approach for Power Grids Vulnerability and Large Area Blackout,tributed and cause a large area blackout. The development of complex network theory provides a new approach for power system study especially on vulnerability and large blackout prevention. By mapping the power grid to a graph, analyze the degree and link properties, and utilizing the small-world power grid to study the behavior of blackout.作者: conceal 時間: 2025-3-28 01:56 作者: 斷言 時間: 2025-3-28 04:29
Shortest Paths on Evolving Graphs,es. The goal is to maintain a shortest path between a given pair of nodes. We propose a heuristic algorithm that takes into account time-dependent edge reliability and reduces the problem to find an edge-weighted shortest path. Our algorithm leads to higher precision and recall than those of the exi作者: biosphere 時間: 2025-3-28 09:54
Analysis of a Reciprocal Network Using Google+: Structural Properties and Evolution, reciprocity. Reciprocity is defined as the ratio of the number of reciprocal edges to the total number of edges in the network, and has been well studied in the literature. However, little attention is given to understand the connectivity or network form by the reciprocal edges themselves (reciproc作者: Aggrandize 時間: 2025-3-28 13:59 作者: sperse 時間: 2025-3-28 18:30
Integrating Networks of Equipotent Nodes,d be established between the groups to give members appropriate access to resource and information. Viewing a social group as a network, we investigate such integration from a computational perspective. In particular, we assume that the networks have equipotent nodes, which refers to the situation w作者: 雪白 時間: 2025-3-28 21:59
Identify Influential Spreaders in Online Social Networks Based on Social Meta Path and PageRank, spread most broadly to the rest of the network individuals. The determination of the information influence degree of individual plays an important role in online social networking. Once there is a list of individuals who have high influence, the marketers can access these individuals and seek them 作者: 脾氣暴躁的人 時間: 2025-3-29 00:20 作者: RACE 時間: 2025-3-29 03:12 作者: 攝取 時間: 2025-3-29 09:31
Rumor Propagation Detection System in Social Network Services,SNS allows a fast propagation and it is used as a tool to send information. But its negative sides need to be considered. In this paper, we analyzed actual data of malicious accounts and extracted features. Based on this results, we detect the suspected accounts that spread rumors. Firstly, we crawl作者: 減弱不好 時間: 2025-3-29 14:46
Detecting Overlapping Community in Social Networks Based on Fuzzy Membership Degree,unities. Most previous methods of overlapping community detection ignore the belonging levels when one node belongs to several communities. The membership-degree is used to embody the belonging level. In this paper, an novel method calling . is put forward. Firstly, we propagate the membership-degre作者: ALB 時間: 2025-3-29 17:20 作者: opportune 時間: 2025-3-29 23:17 作者: modifier 時間: 2025-3-30 00:31
Structure and Sequence of Decision Making in Financial Online Social Networks, benefit of OSNs is known to be the provision of free and easy access to a wide range of information, largely unconstrained by geographical barriers and free of charge. This paper specifically addresses the potential use of OSNs as a support tool for financial decision making. The key objectives of 作者: 不斷的變動 時間: 2025-3-30 04:27 作者: Colonoscopy 時間: 2025-3-30 09:28 作者: Entropion 時間: 2025-3-30 16:19
Integrating with Social Network to Enhance Recommender System Based-on Dempster-Shafer Theory,, user preferences and community preferences extracted from the social network are modeled as mass functions, and Dempster’s rule of combination is selected for fusing the preferences. Especially, with the community preferences, both the sparsity and cold-start problems are completely eliminated. So作者: 惡心 時間: 2025-3-30 17:51 作者: FID 時間: 2025-3-30 22:33 作者: Chronic 時間: 2025-3-31 01:41
Complex Network Approach for Power Grids Vulnerability and Large Area Blackout,tributed and cause a large area blackout. The development of complex network theory provides a new approach for power system study especially on vulnerability and large blackout prevention. By mapping the power grid to a graph, analyze the degree and link properties, and utilizing the small-world po作者: STING 時間: 2025-3-31 06:13 作者: 熟練 時間: 2025-3-31 11:50
0302-9743 o Chi Minh City, Vietnam, in August 2016. ..The 30 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers cover topics on common principles, algorithms and tools that govern social network structures/topologies, functionalities, social interactions, securi作者: brassy 時間: 2025-3-31 14:15 作者: 植物群 時間: 2025-3-31 19:21 作者: 減少 時間: 2025-3-31 23:24
Felipe Luis Palombini,Mariana Kuhl Cidadeetworks. This measure is applied for detecting community structure within networks. The results of numerical experiments for some examples of networks, in particular, . (a Web portal of mathematical publications) are presented, and a comparison with . is given.作者: 貪婪的人 時間: 2025-4-1 02:02 作者: corpus-callosum 時間: 2025-4-1 09:58 作者: Ankylo- 時間: 2025-4-1 10:23 作者: 感染 時間: 2025-4-1 15:56