Computer Science ›› 2013, Vol. 40 ›› Issue (7): 98-101.
Previous Articles Next Articles
LIU Hong,ZHOU Gen-gui,FU Pei-hua and MAO Guo-hong
[1] Kuhnert C,Helbing D.Scaling laws in urban supply networks[J].Physica A,2006,363(1):89-95 [2] Helbing D.Information and material flows in complex networks[J].Physica A,2006,363(1):xi-xvi [3] Albert R,Jeong H,Barabhsi A L.The Internet’s Achilles’Heel:Error and attack tolerance of complex networks[J].Namre (London) (S0028-0836),2000,6:378-382 [4] Barabasi A L,Albert R.Emergence of Scaling in Random Networks[J].Science,1999,286(5439):509-512 [5] Thadakamlla H P,Raghavan U N,Kumara S,et al.Survivability of multiagent-based supply networks:a topological perspective[J].Intelligent Systems and Their Application,2004,19(5):24-31 [6] Latora V,Marchiori M.Vulnerability and Protection of Infra-structure Networks[J].Physical Review E,2005,1(1):015103 [7] 刘小锋,陈国华.基于复杂网络的供应链鲁棒性分析[J].东南大学学报:自然科学版,2007,6:147-150 [8] 姜洪权,高建民,陈富民,等.基于网络特性的分布式复杂机电系统脆弱性分析[J].计算机集成制造系统,2009,15(4):791-796 [9] 闫妍,刘晓,庄新田.基于复杂网络理论的供应链级联效应检测方法[J].上海交通大学学报,2010,4(3):322-325 [10] Petrovic D,Roy R,Petrovic R.supply chain modeling using fuzzysets[J].International Journal of Production Economics,1999,59(1):443-453 [11] Freeman L.A set of Measures of centrality based upon betweenness[J].Sociometry,1977,40(1):35-41 [12] Latora V A,Marchiori M.Efficient Behavior of Small-WorldNetworks[J].Phys.Rev.Lett.,2001,87(19):198701 [13] Motter A E,Lai Ying-cheng.Cascade-based attacks on complex networks [J].Phys.Rev.E,2002,66(6) |
No related articles found! |
|