Si Zhang,Hanghang Tong,Jiejun Xu et al.
Si Zhang et al.
Graphs naturally appear in numerous application domains, ranging from social analysis, bioinformatics to computer vision. The unique capability of graphs enables capturing the structural relations among data, and thus allows to harvest more...
Modeling the transmission dynamics of racism propagation with community resilience [0.03%]
社区恢复力在种族主义传播动态建模中的应用
Dejen Ketema Mamo
Dejen Ketema Mamo
Racism spreading can have a vital influence on people's lives, declining adherence, pretending political views, and recruiters' socio-economical crisis. Besides, Web 2.0 technologies have democratized the creation and propagation of racist ...
A model for the co-evolution of dynamic social networks and infectious disease dynamics [0.03%]
动态社会网络和传染病动力学协同演化的模型
Hendrik Nunner,Vincent Buskens,Mirjam Kretzschmar
Hendrik Nunner
Recent research shows an increasing interest in the interplay of social networks and infectious diseases. Many studies either neglect explicit changes in health behavior or consider networks to be static, despite empirical evidence that peo...
Influence spreading model used to analyse social networks and detect sub-communities [0.03%]
用于分析社交网络和检测子社区的影响传播模型
Vesa Kuikka
Vesa Kuikka
A dynamic influence spreading model is presented for computing network centrality and betweenness measures. Network topology, and possible directed connections and unequal weights of nodes and links, are essential features of the model. The...
Konstantin E Avrachenkov,Aleksei Y Kondratev,Vladimir V Mazalov et al.
Konstantin E Avrachenkov et al.
The paper is devoted to game-theoretic methods for community detection in networks. The traditional methods for detecting community structure are based on selecting dense subgraphs inside the network. Here we propose to use the methods of c...
Social learning for resilient data fusion against data falsification attacks [0.03%]
用于抵御数据伪造攻击的弹性数据融合的社会学习方法
Fernando Rosas,Kwang-Cheng Chen,Deniz Gündüz
Fernando Rosas
Background: Internet of Things (IoT) suffers from vulnerable sensor nodes, which are likely to endure data falsification attacks following physical or cyber capture. Moreover, centralized decision-making and data fusion t...
Philipp Lorenz-Spreen,Frederik Wolf,Jonas Braun et al.
Philipp Lorenz-Spreen et al.
Background: Hashtags are widely used for communication in online media. As a condensed version of information, they characterize topics and discussions. For their analysis, we apply methods from network science and propos...
Tsuyoshi Murata,Hokuto Koga
Tsuyoshi Murata
Background: The process of rumor spreading among people can be represented as information diffusion in social network. The scale of rumor spread changes greatly depending on starting nodes. If we can select nodes that con...
Adding ReputationRank to member promotion using skyline operator in social networks [0.03%]
基于天际线算子的社交网络中利用声誉值Rank进行会员推广的方法研究
Jiping Zheng,Siman Zhang
Jiping Zheng
Background: To identify potential stars in social networks, the idea of combining member promotion with skyline operator attracts people's attention. Some algorithms have been proposed to deal with this problem so far, su...
Assessing the role of participants in evolution of topic lifecycles on social networks [0.03%]
参与者的角色评估:社交网络中主题生命周期的演变分析
Kuntal Dey,Saroj Kaushik,Kritika Garg et al.
Kuntal Dey et al.
Background: Topic lifecycle analysis on social networks aims to analyze and track how topics are born from user-generated content, and how they evolve. Twitter researchers have no agreed-upon definition of topics; topics ...