Author:
Moskowitz Ira S.,Hyden Paul,Russell Stephen
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Human-Computer Interaction,Media Technology,Communication,Information Systems
Reference44 articles.
1. Aditya Prakash B (2012) Understanding and managing propagation on large networks—theory, algorithms, and models, Ph.D. thesis. Computer Science Department, Carnegie Mellon University
2. Aditya Prakash B, Chakrabarti D, Faloutsos M, Valler N, Faloutsos C (2011) Threshold conditions for arbitrary cascade models on arbitrary networks. In: Proceedings of the 2011 IEEE 11th international conference on data mining, ICDM ’11. IEEE Computer Society, pp 537–546
3. Bakshy E, Rosenn I, Marlow C, Adamic L (2012) The role of social networks in information diffusion. In: Proceedings of the 21st international conference on World Wide Web. ACM, pp 519–528
4. Bonacich P (1987) Power and centrality: a family of measures. Am J Sociol 92(5):1170–1182
5. Borgatti SP (2005) Centrality and network flow. Soc Netw 27(1):55–71
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Multi-granularity Targeted Covert Collection Scheme for Internet Data;2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom);2020-12
2. A Metric to Compare Vulnerability of the Graphs of Different Sizes;Electronic Notes in Discrete Mathematics;2017-12