Identification of Key Nodes in Microblog Networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

Identification of Influential Nodes in Social Networks

Understanding and controlling spreading dynamics in networks presupposes the identification of those influential nodes that will trigger an efficient information diffusion. It has been shown that the best spreaders are the ones located in the core of the network – as produced by the k-core decomposition. In this paper we further refine the set of the most influential nodes, showing that the nod...

متن کامل

Vital nodes identification in complex networks

Real networks exhibit heterogeneous nature with nodes playing far different roles in structure and function. To identify vital nodes is thus very significant, allowing us to control the outbreak of epidemics, to conduct advertisements for e-commercial products, to predict popular scientific publications, and so on. The vital nodes identification attracts increasing attentions from both computer...

متن کامل

a novel key management scheme for heterogeneous sensor networks based on the position of nodes

wireless sensor networks (wsns) have many applications in the areas of commercial, military and environmental requirements. regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. a basic approach for preparing a secure wireless communication in wsns, is to propose an efficient cryptographic key management protocol be...

متن کامل

Identification of influential nodes in network of networks

Meizhu Li, Qi Zhang, Qi Liu, 3 and Yong Deng 4, 5, ∗ School of Computer and Information Science, Southwest University, Chongqing 400715, China Center for Quantitative Sciences, Vanderbilt University School of Medicine, Nashville, TN 37232, USA Department of Biomedical Informatics, Vanderbilt University School of Medicine, Nashville, TN 37232, USA School of Automation, Northwestern Polytechnical...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ETRI Journal

سال: 2016

ISSN: 1225-6463

DOI: 10.4218/etrij.16.0115.0732