[HTML][HTML] Supercomputers and quantum computing on the axis of cyber security
Cybersecurity has become a very critical area to address for governments, industry and the
academic community. Cyber attacks are on the rise so is research to address the challenges …
academic community. Cyber attacks are on the rise so is research to address the challenges …
Recent progress in routing protocols of mobile opportunistic networks: A clear taxonomy, analysis and evaluation
Mobile opportunistic networks provide an efficient solution to implement the intensive
perception and ubiquitous interconnection in Internet of Things. Routing selection is one of …
perception and ubiquitous interconnection in Internet of Things. Routing selection is one of …
Uncovering the features of global antimony resource trade network
G Zhao, W Li, Y Geng, R Bleischwitz - Resources Policy, 2023 - Elsevier
Antimony is a scarce strategic metal and plays an extremely important role in the modern
societies. Due to the increasing demands for various antimony-containing products, it is …
societies. Due to the increasing demands for various antimony-containing products, it is …
Measuring knowledge diffusion efficiency in R&D networks
S Jiafu, Y Yu, Y Tao - Knowledge Management Research & …, 2018 - Taylor & Francis
This paper investigates the issue of measuring knowledge diffusion efficiency in R&D
network based on the weighted network method. For the reality of R&D networks, we …
network based on the weighted network method. For the reality of R&D networks, we …
LED: A fast overlapping communities detection algorithm based on structural clustering
Community detection in social networks is a fundamental task of complex network analysis.
Community is usually regarded as a functional unit. Networks in real world more or less …
Community is usually regarded as a functional unit. Networks in real world more or less …
Path merging based betweenness centrality algorithm in delay tolerant networks
Delay Tolerant Network (DTN) is a widely used network in computer network and wireless
network, there are no permanent end-to-end connections between source and destination …
network, there are no permanent end-to-end connections between source and destination …
ReFIoV: A novel reputation framework for information-centric vehicular applications
In this paper, a novel reputation framework for information-centric vehicular applications
leveraging on machine learning and the artificial immune system (AIS), also known as …
leveraging on machine learning and the artificial immune system (AIS), also known as …
Approximating network centrality measures using node embedding and machine learning
MRF Mendonça, AMS Barreto… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Extracting information from real-world large networks is a key challenge nowadays. For
instance, computing a node centrality may become unfeasible depending on the intended …
instance, computing a node centrality may become unfeasible depending on the intended …
Member selection for the collaborative new product innovation teams integrating individual and collaborative attributions
As the first stage of the formation of a collaborative new product innovation (CNPI) team,
member selection is crucial for the effective operation of the CNPI team and the achievement …
member selection is crucial for the effective operation of the CNPI team and the achievement …
A time-ordered aggregation model-based centrality metric for mobile social networks
How to measure the centrality of nodes is a significant problem in mobile social networks
(MSNs). Current studies in MSNs mainly focus on measuring the centrality of nodes in a …
(MSNs). Current studies in MSNs mainly focus on measuring the centrality of nodes in a …