找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Neue Perspektiven des Strategischen Kompetenz-Managements; Christoph Burmann,Jörg Freiling,Michael Hülsmann Book 2006 Gabler Verlag | Spri

[复制链接]
楼主: finesse
发表于 2025-3-25 04:08:14 | 显示全部楼层
Andreas Größleriffers from the traditional influence maximization in two major ways: it has a content-rich target message for propagation and it treats each link in the network as communication on certain topics and emphasizes the topic relevance of such communication in propagating the target message. In realisti
发表于 2025-3-25 11:14:02 | 显示全部楼层
发表于 2025-3-25 15:22:38 | 显示全部楼层
发表于 2025-3-25 17:19:30 | 显示全部楼层
发表于 2025-3-25 23:53:48 | 显示全部楼层
发表于 2025-3-26 04:00:39 | 显示全部楼层
Nicolai Müllere of basic social network analysis techniquesThis book offers a balanced view between a basic introduction of Social Network Analysis (SNA) in its methods and application, and advanced topics of data mining techniques and the subsequent SNA analyses.  The book stands out as uniquely important contri
发表于 2025-3-26 06:31:38 | 显示全部楼层
Manuela Stoll,Utz Schäfferalyzing the relationships between offenders to fully understand criminalcollaboration patterns. Co-offending networks—networks of offenders who havecommitted crimes together—have long been recognized by law enforcement andintelligence agencies as a major factor in the design of crime prevention andi
发表于 2025-3-26 10:13:29 | 显示全部楼层
Hans H. Hinterhuber,Sandra Rothenbergeralyzing the relationships between offenders to fully understand criminalcollaboration patterns. Co-offending networks—networks of offenders who havecommitted crimes together—have long been recognized by law enforcement andintelligence agencies as a major factor in the design of crime prevention andi
发表于 2025-3-26 13:32:19 | 显示全部楼层
gories of hostile entities who abuse the platform by posting malicious content. In this chapter, we identify and characterize Facebook . that engage in spreading URLs pointing to malicious domains. We revisit the scope and definition of what is deemed as “malicious” in the modern day Internet, and i
发表于 2025-3-26 17:25:12 | 显示全部楼层
Michael Hülsmann,Christine Wyciskh influence. In this work, we consider the problem of modeling the spread of influence and the identification of influential entities in a complex network when nodal activation can happen via two different mechanisms. The first mechanism of activation stems from factors that are intrinsic to the nod
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-2 06:05
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表