Poisson edge growth and preferential attachment networks
When modeling a directed social network, one choice is to use the traditional preferential
attachment model, which generates power-law tail distributions. In traditional directed …
attachment model, which generates power-law tail distributions. In traditional directed …
Enhancing traffic capacity of multilayer networks with two logical layers by link deletion
J Ma, Z Sun, Y Zhang - IET Control Theory & Applications, 2022 - Wiley Online Library
Improving the traffic capacity of multilayer networks has been the subject of extensive
interest and research. This paper proposes an effective strategy to improve traffic capacity of …
interest and research. This paper proposes an effective strategy to improve traffic capacity of …
From data inference to evidence fusion: A methodology for studying computer ethics at different levels
MC Piao, J Lin, M Song, CC Rui - Computer Applications in …, 2024 - Wiley Online Library
The rapid development and widespread use of computer technology in today's society have
brought significant benefits and convenience to individuals and organizations. The study …
brought significant benefits and convenience to individuals and organizations. The study …
Is the world small enough?—A view from currencies
YY Baydilli, I Türker - International Journal of Modern Physics B, 2019 - World Scientific
Exchange rates are important indicators of the economic power of countries, directly affected
by the international trading patterns and relations. Since almost every pair of countries in the …
by the international trading patterns and relations. Since almost every pair of countries in the …
[PDF][PDF] THE CREATION AND ANALYSIS OF THE COMPUTER NETWORK MODEL BASED ON ECOLOGY
LI Yanjing - scientificbulletin.upb.ro
Currently, the ecology was used in the network security by many researchers. But the
correspondence between the network and the ecology systems were studied by few …
correspondence between the network and the ecology systems were studied by few …
Computer Network Database Security Management Technology Optimization Path
J Xi - Cyber Security Intelligence and Analytics: Proceedings …, 2020 - Springer
Along with the progress of network technology, Internet age, the rapid expansion of
electronic devices, such as computers, computer bring a lot of convenience for People's …
electronic devices, such as computers, computer bring a lot of convenience for People's …