Poisson edge growth and preferential attachment networks

T Wang, S Resnick - Methodology and Computing in Applied Probability, 2023 - Springer
When modeling a directed social network, one choice is to use the traditional preferential
attachment model, which generates power-law tail distributions. In traditional directed …

Enhancing traffic capacity of multilayer networks with two logical layers by link deletion

J Ma, Z Sun, Y Zhang - IET Control Theory & Applications, 2022 - Wiley Online Library
Improving the traffic capacity of multilayer networks has been the subject of extensive
interest and research. This paper proposes an effective strategy to improve traffic capacity of …

From data inference to evidence fusion: A methodology for studying computer ethics at different levels

MC Piao, J Lin, M Song, CC Rui - Computer Applications in …, 2024 - Wiley Online Library
The rapid development and widespread use of computer technology in today's society have
brought significant benefits and convenience to individuals and organizations. The study …

Is the world small enough?—A view from currencies

YY Baydilli, I Türker - International Journal of Modern Physics B, 2019 - World Scientific
Exchange rates are important indicators of the economic power of countries, directly affected
by the international trading patterns and relations. Since almost every pair of countries in the …

[PDF][PDF] THE CREATION AND ANALYSIS OF THE COMPUTER NETWORK MODEL BASED ON ECOLOGY

LI Yanjing - scientificbulletin.upb.ro
Currently, the ecology was used in the network security by many researchers. But the
correspondence between the network and the ecology systems were studied by few …

Computer Network Database Security Management Technology Optimization Path

J Xi - Cyber Security Intelligence and Analytics: Proceedings …, 2020 - Springer
Along with the progress of network technology, Internet age, the rapid expansion of
electronic devices, such as computers, computer bring a lot of convenience for People's …