派博傳思國際中心

標(biāo)題: Titlebook: Computational Social Networks; 5th International Co Hien T. Nguyen,Vaclav Snasel Conference proceedings 2016 Springer International Publish [打印本頁]

作者: CILIA    時間: 2025-3-21 19:04
書目名稱Computational Social Networks影響因子(影響力)




書目名稱Computational Social Networks影響因子(影響力)學(xué)科排名




書目名稱Computational Social Networks網(wǎng)絡(luò)公開度




書目名稱Computational Social Networks網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computational Social Networks被引頻次




書目名稱Computational Social Networks被引頻次學(xué)科排名




書目名稱Computational Social Networks年度引用




書目名稱Computational Social Networks年度引用學(xué)科排名




書目名稱Computational Social Networks讀者反饋




書目名稱Computational Social Networks讀者反饋學(xué)科排名





作者: 威脅你    時間: 2025-3-21 20:17
Time-Critical Viral Marketing Strategy with the Competition on Online Social Networks,oximated with the rate . and its objective function was sub modular. Furthermore, we recommended an efficient algorithms to solve the problem. The experiments were handled via the real social networks datasets and the results showed that our algorithm generated better outcome than several other heur
作者: Nonporous    時間: 2025-3-22 01:06
Analysis of Viral Advertisement Re-Posting Activity in Social Media,gether with all the immediate friends of the reposting users. In addition to that, approximately 150000 non-advertisement messages with their reposts were collected, amounting to approximately 6.5?M of reposts in total. This paper presents the results of the analysis based on these data. We then dis
作者: Hay-Fever    時間: 2025-3-22 05:39
Trust Evaluation Based Friend Recommendation in Proximity Based Mobile Social Network,the type of social spot where trust evaluation is being performed and then calculates these parameters in order to compute the final trust value. We utilize semi-trusted servers to authenticate users as well as to perform revocation of malicious users. In case of an attack on servers, real identitie
作者: 令人作嘔    時間: 2025-3-22 09:55

作者: xanthelasma    時間: 2025-3-22 15:41
A Hybrid Trust Management Framework for Vehicular Social Networks,-based social trust and social networks-based trust, to target different sets of applications. Third, we discuss the contemporary research challenges in VSN. Our proposed scheme is a stepping stone towards the secure and trustworthy realization of this technology.
作者: xanthelasma    時間: 2025-3-22 17:47

作者: Kaleidoscope    時間: 2025-3-23 00:32

作者: FLIC    時間: 2025-3-23 02:42

作者: 兇猛    時間: 2025-3-23 08:18

作者: 闡明    時間: 2025-3-23 11:33

作者: Nuance    時間: 2025-3-23 14:56

作者: 飛行員    時間: 2025-3-23 18:02

作者: LUCY    時間: 2025-3-24 01:24
Sustainable Oil and Gas Using Blockchain reciprocity. Reciprocity is defined as the ratio of the number of reciprocal edges to the total number of edges in the network, and has been well studied in the literature. However, little attention is given to understand the connectivity or network form by the reciprocal edges themselves (reciproc
作者: 過于光澤    時間: 2025-3-24 03:00
Blockchain and Sustainable Energytion on large networks is to use random walks. We can then defer to the extensive theory of Markov chains to do error analysis of these estimators. In this work we compare two existing techniques, Metropolis-Hastings MCMC and Respondent-Driven Sampling, that use random walks to do function estimatio
作者: 記憶法    時間: 2025-3-24 09:12
https://doi.org/10.1007/978-3-031-30697-6d be established between the groups to give members appropriate access to resource and information. Viewing a social group as a network, we investigate such integration from a computational perspective. In particular, we assume that the networks have equipotent nodes, which refers to the situation w
作者: yohimbine    時間: 2025-3-24 11:24
Measuring Operations Performance spread most broadly to the rest of the network individuals. The determination of the information influence degree of individual plays an important role in online social networking. Once there is a list of individuals who have high influence, the marketers can access these individuals and seek them
作者: 連鎖,連串    時間: 2025-3-24 15:21

作者: 行乞    時間: 2025-3-24 19:42

作者: 不朽中國    時間: 2025-3-25 00:19

作者: 賞錢    時間: 2025-3-25 04:52

作者: 發(fā)牢騷    時間: 2025-3-25 09:45

作者: calorie    時間: 2025-3-25 12:55

作者: Folklore    時間: 2025-3-25 18:16
Sustainable Operations in India benefit of OSNs is known to be the provision of free and easy access to a wide range of information, largely unconstrained by geographical barriers and free of charge. This paper specifically addresses the potential use of OSNs as a support tool for financial decision making. The key objectives of
作者: accrete    時間: 2025-3-25 23:58
Felipe Luis Palombini,Mariana Kuhl Cidades. It is shown that this new measure admits analytical definition for some classes of networks such as bipartite graphs, with computation for larger networks. This measure is applied for detecting community structure within networks. The results of numerical experiments for some examples of networks
作者: ILEUM    時間: 2025-3-26 02:27
https://doi.org/10.1007/978-3-319-93812-7 proximity in order to make social relationships between them. The users’ mobile devices directly communicate with each other with the help of Bluetooth/Wi-Fi interfaces. The possible presence of a malicious user in the near proximity poses significant threats to the privacy of legitimate users. The
作者: exhilaration    時間: 2025-3-26 07:32

作者: Negligible    時間: 2025-3-26 11:12

作者: IRS    時間: 2025-3-26 12:49
Sean Higgins,Mieke T. A. Lopes Cardozos that are increasingly embraced by millions of mobile users. Despite the well understood benefits, such services also raise unique security and privacy issues that are currently not very well investigated. In this paper, we focus on the trending ridesharing recommendation service in geosocial netwo
作者: 聯(lián)合    時間: 2025-3-26 19:11

作者: pus840    時間: 2025-3-26 21:40
https://doi.org/10.1007/978-3-319-24397-9oc NETwork (VANET) and Online Social Networks (OSN). The application domain of VSN inherits the features of its parental VANET and OSN, providing value-added services and applications to its consumers, i.e. passengers and drivers. However, the immature infrastructure of VSN is vulnerable to security
作者: 內(nèi)疚    時間: 2025-3-27 01:19

作者: 柔軟    時間: 2025-3-27 08:13
978-3-319-42344-9Springer International Publishing Switzerland 2016
作者: 表被動    時間: 2025-3-27 11:43
Computational Social Networks978-3-319-42345-6Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 擁護(hù)    時間: 2025-3-27 13:54

作者: 畫布    時間: 2025-3-27 21:09
Complex Network Approach for Power Grids Vulnerability and Large Area Blackout,tributed and cause a large area blackout. The development of complex network theory provides a new approach for power system study especially on vulnerability and large blackout prevention. By mapping the power grid to a graph, analyze the degree and link properties, and utilizing the small-world power grid to study the behavior of blackout.
作者: conceal    時間: 2025-3-28 01:56

作者: 斷言    時間: 2025-3-28 04:29
Shortest Paths on Evolving Graphs,es. The goal is to maintain a shortest path between a given pair of nodes. We propose a heuristic algorithm that takes into account time-dependent edge reliability and reduces the problem to find an edge-weighted shortest path. Our algorithm leads to higher precision and recall than those of the exi
作者: biosphere    時間: 2025-3-28 09:54
Analysis of a Reciprocal Network Using Google+: Structural Properties and Evolution, reciprocity. Reciprocity is defined as the ratio of the number of reciprocal edges to the total number of edges in the network, and has been well studied in the literature. However, little attention is given to understand the connectivity or network form by the reciprocal edges themselves (reciproc
作者: Aggrandize    時間: 2025-3-28 13:59

作者: sperse    時間: 2025-3-28 18:30
Integrating Networks of Equipotent Nodes,d be established between the groups to give members appropriate access to resource and information. Viewing a social group as a network, we investigate such integration from a computational perspective. In particular, we assume that the networks have equipotent nodes, which refers to the situation w
作者: 雪白    時間: 2025-3-28 21:59
Identify Influential Spreaders in Online Social Networks Based on Social Meta Path and PageRank, spread most broadly to the rest of the network individuals. The determination of the information influence degree of individual plays an important role in online social networking. Once there is a list of individuals who have high influence, the marketers can access these individuals and seek them
作者: 脾氣暴躁的人    時間: 2025-3-29 00:20

作者: RACE    時間: 2025-3-29 03:12

作者: 攝取    時間: 2025-3-29 09:31
Rumor Propagation Detection System in Social Network Services,SNS allows a fast propagation and it is used as a tool to send information. But its negative sides need to be considered. In this paper, we analyzed actual data of malicious accounts and extracted features. Based on this results, we detect the suspected accounts that spread rumors. Firstly, we crawl
作者: 減弱不好    時間: 2025-3-29 14:46
Detecting Overlapping Community in Social Networks Based on Fuzzy Membership Degree,unities. Most previous methods of overlapping community detection ignore the belonging levels when one node belongs to several communities. The membership-degree is used to embody the belonging level. In this paper, an novel method calling . is put forward. Firstly, we propagate the membership-degre
作者: ALB    時間: 2025-3-29 17:20

作者: opportune    時間: 2025-3-29 23:17

作者: modifier    時間: 2025-3-30 00:31
Structure and Sequence of Decision Making in Financial Online Social Networks, benefit of OSNs is known to be the provision of free and easy access to a wide range of information, largely unconstrained by geographical barriers and free of charge. This paper specifically addresses the potential use of OSNs as a support tool for financial decision making. The key objectives of
作者: 不斷的變動    時間: 2025-3-30 04:27

作者: Colonoscopy    時間: 2025-3-30 09:28

作者: Entropion    時間: 2025-3-30 16:19
Integrating with Social Network to Enhance Recommender System Based-on Dempster-Shafer Theory,, user preferences and community preferences extracted from the social network are modeled as mass functions, and Dempster’s rule of combination is selected for fusing the preferences. Especially, with the community preferences, both the sparsity and cold-start problems are completely eliminated. So
作者: 惡心    時間: 2025-3-30 17:51

作者: FID    時間: 2025-3-30 22:33

作者: Chronic    時間: 2025-3-31 01:41
Complex Network Approach for Power Grids Vulnerability and Large Area Blackout,tributed and cause a large area blackout. The development of complex network theory provides a new approach for power system study especially on vulnerability and large blackout prevention. By mapping the power grid to a graph, analyze the degree and link properties, and utilizing the small-world po
作者: STING    時間: 2025-3-31 06:13

作者: 熟練    時間: 2025-3-31 11:50
0302-9743 o Chi Minh City, Vietnam, in August 2016. ..The 30 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers cover topics on common principles, algorithms and tools that govern social network structures/topologies, functionalities, social interactions, securi
作者: brassy    時間: 2025-3-31 14:15

作者: 植物群    時間: 2025-3-31 19:21

作者: 減少    時間: 2025-3-31 23:24
Felipe Luis Palombini,Mariana Kuhl Cidadeetworks. This measure is applied for detecting community structure within networks. The results of numerical experiments for some examples of networks, in particular, . (a Web portal of mathematical publications) are presented, and a comparison with . is given.
作者: 貪婪的人    時間: 2025-4-1 02:02

作者: corpus-callosum    時間: 2025-4-1 09:58

作者: Ankylo-    時間: 2025-4-1 10:23

作者: 感染    時間: 2025-4-1 15:56





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
长岭县| 鹿泉市| 东方市| 遂昌县| 偃师市| 集安市| 阳城县| 昭平县| 宝清县| 河西区| 宁陵县| 高雄市| 六安市| 和林格尔县| 杭州市| 封开县| 广宗县| 都匀市| 长岛县| 渝中区| 石嘴山市| 封丘县| 沙雅县| 广州市| 聂荣县| 环江| 龙山县| 临泽县| 鸡泽县| 安阳市| 齐齐哈尔市| 会东县| 张家界市| 宣城市| 永仁县| 六枝特区| 德令哈市| 沙湾县| 前郭尔| 斗六市| 霸州市|