Computer Science ›› 2023, Vol. 50 ›› Issue (7): 368-375.doi: 10.11896/jsjkx.220900113
• Interdiscipline & Frontier • Previous Articles Next Articles
CUI Yunsong1, WU Ye2,3, XU Xiaoke1
CLC Number:
[1]LAMMERS J,DUBOIS D,RUCKER D D,et al.Power gets the job:Priming power improves interview outcomes[J].Journal of Experimental Social Psychology,2013,49(4):776-779. [2]DUBOIS D,RUCKER D D,GALINSKY A D.Dynamics ofCommunicator and Audience Power:The Persuasiveness of Competence versus Warmth[J].Journal of Consumer Research,2016,43(1):68-85. [3]YUAN M,LIU N.Power and persuasion:The value of message-audience matching and fluency[J/OL].https://doi.org/10.1007/s12144-022-02915-4. [4]WEI X,ZHAO J,LIU S,et al.Identifying influential spreaders in complex networks for disease spread and control[J].Scientific Reports,2022,12(1):1-11. [5]WORCHEL S,ANDREOLI V,EASON J.Is the Medium theMessage? A Study of the Effects of Media,Communicator,and Message Characteristics on Attitude Change1[J].Journal of Applied Social Psychology,1975,5(2):157-172. [6]NEWMAN M E J.Properties of highly clustered networks[J].Physical Review E,2003,68(2):026121. [7]NEWMAN M.Random graphs with clustering[J].Physical Review Letters,2009,103(5):058701. [8]GLEESON J P,MELNIK S,HACKETT A.How clustering affects the bond percolation threshold in complex networks[J].Physical Review E,2010,81(6):066114. [9]CENTOLA D.The Spread of Behavior in an Online Social Network Experiment[J].Science,329(5996):1194-1197. [10]XING X Y.Research on the evolution of online social network structure and its influence on information dissemination[D].Hefei:Hefei University of Technology,2012. [11]XU X D,XIAO Y T,ZHU S R.Research on rumor spreading simulation in micro blog community[J].Computer Engineering,2011,37(10):272-274. [12]ZHOU J Y,LIU Z Z,XU X K.Empirical analysis of influential factors of network communication with reference to zero model[J].Complex Systems and Complexity Science,2019,16(3):40-47. [13]XUAN Q,WANG Z,WANG J,et al.Data Augmentation Based on Null Model for Graph Classification[J].arXiv:2112.00476,2021. [14]CAZABET R,BORGNAT P,JENSEN P.Enhancing space-aware community detection using degree constrained spatial null model[C]//International Workshop on Complex Networks.Cham:Springer,2017:47-55. [15]NIAN X,FU H.Efficient routing on two layer degree-coupled networks[J].Physica A:Statistical Mechanics and its Applications,2014,410:421-427. [16]ULRICH W,GOTELLI N J.Pattern detection in null modelanalysis[J].Oikos,2013,122(1):2-18. [17]SHANG K K.Research on zero model construction and behavior prediction of online social network[D].Qingdao:Qingdao Technological University,2013. [18]SHANG K K,XU X K.Construction and application of complex networknull model based on Scrambling Algorithm[J].Journal of University of Electronic Science and Technology of China,2014,43(1):7-20. [19]XU X K,CUI W K,CUI L Y,et al.Construction and application of zero model of non weighted network[J].Journal of University of Electronic Science and Technology of China,2019,48(1):122-141. [20]ZHOU H Y,LI S L,LIU H K.Study on the epidemic situation of novel coronavirus pneumonia based on Sir/IR model-Based on the data from January to may 2020 in Hubei Province[J].Journal of Hunan University of Technology,2021,35(6):89-94. [21]PENG H,NEMATZADEH A,ROMERO D M,et al.Network modularity controls the speed of information diffusion[J].Phy-sical Review E,2020,102(5):052316. [22]ROZEMBERCZKI B,DAVIES R,SARKAR R,et al.GEMSEC:Graph Embedding with Self Clustering[C]//Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.2019:65-72. [23]AHMED N K,BERCHMANS F,NEVILLE J,et al.Time-Based Sampling of Social Network Activity Graphs[C]//Proceedings of the Eighth Workshop on Mining and Learning with Graphs.2010:1-9. [24]TUR E M,ZEPPINI P,FRENKEN K.Diffusion with social reinforcement:The role of individual preferences[J].Physical Review E,2018,97(2):022302. |
[1] | LUO Ruiqi, YAN Jinlin, HU Xinrong, DING Lei. EEG Emotion Recognition Based on Multiple Directed Weighted Graph and ConvolutionalNeural Network [J]. Computer Science, 2023, 50(6A): 220600128-8. |
[2] | SUN Bao-hua, HU Nan, LI Dong-yang. Analysis Research of Software Requirement Safety Based on Neural Network and NLP [J]. Computer Science, 2019, 46(6A): 348-352. |
[3] | ZHENG Wen-ping, QU Rui and MU Jun-fang. Generation Algorithm for Scale-free Networks with Community Structure [J]. Computer Science, 2018, 45(2): 76-83. |
[4] | DENG Dong-mei,ZHU Jian,CHEN Duan-bing and GAO Hui. Influence of Bursty on Information Diffusion [J]. Computer Science, 2013, 40(Z11): 26-28. |
[5] | . PPI Networks Clustering Model and Algorithm Combining with the Principle of Artificial Fish School [J]. Computer Science, 2012, 39(7): 205-209. |
[6] | . Common Algorithm on Computing Networks' Clustering Coefficient and Cycles [J]. Computer Science, 2011, 38(11): 213-215. |
[7] | LI Kong-wen,GU Qing,ZHANG Yao,CHEN Dao-xu. Local Community Detecting Method Based on the Clustering Coefficient [J]. Computer Science, 2010, 37(7): 46-49. |
[8] | ZHANG Cheng-cai,QI Xiao-gang. Analysis of Wireless Sensor Network Characteristics Measurement Based on Complex Network Theory [J]. Computer Science, 2010, 37(11): 44-46. |
|