[1] Kiss C.,Bichler M.Identification of Influencers-Measuring Influence in Customer Networks[J].Decision Support Systems,2008,46(1):233-253
[2] Wang X.Y.,Zhou A.Y.,Linkage Analysis for the World Wide Web and Its Application:A Survey[J].Journal of Software,2003,14(10):1768-1780
[3] John S.,Social Network Analysis:A Handbook[M].2nd Ed.Newberry Park,CA:Sage,2000
[4] Carrington J.P.,John S.,Wasserman S.,Models and Methods in Social Network Analysis[M].New York:Cambridge University Press,2005
[5] 罗家德.社会网络分析讲义[M].北京:社会科学文献出版社,2005
[6] 刘军.整体网分析讲义-UCINET软件实用指南[M].上海:上海人民出版社,2009
[7] Luciano F.C.,Francisco A.R.,Gonzalo T.,Villas Boas P.R.,Complex Networks:Characterization of Complex Networks:A Survey of Measurements[J].Advances in Physics,2007,56(1):167-242
[8] Kiss C.,Schulz A.,Bichler M.,Evaluating Centrality Measures in Large Call Graphs[C].Proceedings ofIEEE Joint Conference on E-Commerce Technology and Enterprise Computing,E-Commerce and E-Services,2006 in San Francisco,USA,2006
[9] Murray A.B.,An Improved Index of Centrality[J].Behavioral Science,1965,10(2):161-163
[10] Lin N.,Foundations of Social Research.New York:McGraw-Hill.Josep Torrellas[J].Architectures for Extreme-Scale Computing.Computer,2009,42(11):28-35
[11] Dasgupta K.,Singh R.,Viswanathan B.,Social Ties and Their Relevance to Churn in Mobile Telecom Networks[C].In EDBT'08:Proceedings of the 11th International Conference on Extending Database Technology,New York,2008
[12] Lausen C.Z.,Spreading Activation Models for Trust Propagation[C].In EEE'04:Proc of the IEEE International Conference on e-Technology,e-Commerce and e-Service.Taipei,IEEE,2004
[13] Albert R.,Jeong H.,Barabasi L.,Error and Attack Tolerance of Complex Networks[J].Nature,2000,(406):378-382
[14] 邓小龙,李欲晓.面向应急管理的大图重要节点中介度高效近似计算方法[J].系统工程理论与实践,2015,10(35):2531-2544 |