Computer Science ›› 2015, Vol. 42 ›› Issue (4): 85-88.doi: 10.11896/j.issn.1002-137X.2015.04.016
Previous Articles Next Articles
MAO Kai
[1] 谢希仁.计算机网络(第五版)[M].北京:电子工业出版社,2009 [2] 钟秋海.现代控制理论[M].北京:高等教育出版社,2004 [3] 汪小帆,李翔,陈关荣.网络科学导论[M].北京:高等教育出版社,2012 [4] Ugander J,Karrer B,Backstorm L,et al.The anatomy of the Facebook social graph [J].2011,arXiv:1111.4503v1 [5] Hu H,WAang X.Evolution of a large online social network[J].Phys.Lett.A,2009,373(12/13):1105-1110 [6] Callway D S,Newman M E J,Strogate S H,et al.Network robustness and fragility:Percolation on random graphs [J].Phys.Rev.Lett.,2000,85(25):5468-5471 [7] Cohen R,Erez K,Ben-Avraham D,et al.Breakdown of the internet under intentional attack [J].Phys.Rev.Lett.,2001,86(16):3682-3685 [8] Newman M.Networks [M].Cambridge:Cambridge University Press,2010 [9] 王林,戴冠中.复杂网络的Scale-free性、Scale-free现象及其控制[M].北京:科学出版社,2009 |
No related articles found! |
|