Analysis of Graph Centralities with the Help of Shapley Values

Social network analysis as a modern theoretical approach to studying various processes of human life. Application SNA to fields of science. Application exact and approximate Shapley values in the assessment of centrality measures of nodes in networks.

Подобные документы

  • Study of method of the adaptive shaping of flows of network traffic and method of tuning of the control systems with an indirect feedback. Analysis of algorithm of multivariable adaptation of shaper to changing the set of parameters of input traffic.

    статья, добавлен 27.12.2016

  • Description of technology of off-wire computer networks with the productivity 100 Mb/s in the point of output and maintenance of information. Description of parameters of middle access and determination of multiple entrance. Physical layer, radio, WLAN.

    методичка, добавлен 10.08.2011

  • The support was the key to effective implementation of advanced technologies and systemic implementation scale of China’s digital policy. A comparative analysis of the transformational processes of digitalization of China and Ukraine was carried out.

    статья, добавлен 21.08.2022

  • Application of sorting to organize large data arrays. Data sorting algorithms. Study of the algorithm for parallel hyperfast sorting of data arrays in the C# programming language. Development of flow graph and program code. Using the test program.

    статья, добавлен 08.06.2024

  • The application of NBIC technologies, combining ideas of nano-, bio-, information and communication technologies and robotics. Prospects of using these technologies in the management of production processes, interaction between the state and society.

    статья, добавлен 31.05.2021

  • Data flow diagrams as a hierarchy of functional processes related data flows. Familiarity with the main components of a data flow diagram: external entities, systems and subsystems, processes. Analysis of the structure of building hierarchy DFD.

    статья, добавлен 25.03.2019

  • International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.

    книга, добавлен 08.03.2014

  • The role of information technology in human life. The use of personal computers, television monitors, slide projectors, videodisc players, multimedia systems and the Internet. Office furniture. Communication in organizations. As for color harmony.

    контрольная работа, добавлен 04.03.2016

  • Arithmetic and number theory in C and C++. The fundamental operations in programs. Modular arithmetic: calculating with residue classes. Addition chains and windows. Cryptographic application of exponentiation. A modern the data encryption standard.

    книга, добавлен 08.03.2014

  • Analysis of the model of dynamic classification software applications included in the business critical systems for security access. Information technology, allowing to distinguish three basic classes of safety-critical access software applications.

    статья, добавлен 22.12.2016

  • Presents the main transformational processes of scientific understanding of the role of "artificial" and "natural" intellect. The natural intellect is presented as a social phenomenon that arose from the interaction of individual cerebral structures.

    статья, добавлен 17.11.2023

  • Outline of theoretical and methodological guidelines for understanding the sense (meaning) of an artistic text from the perspective of cognitive translation studies with attention to the possibilities of computerization of the corresponding meaning.

    статья, добавлен 19.03.2023

  • The study of accidents and disasters involving a variety of critical infrastructures, assessment of the level of fault tolerance software management systems. The calculation method based optimization of software testing management system infrastructure.

    статья, добавлен 28.02.2016

  • Problems of creation and application of the original mechanism of cataloging of digital information resources ISO 15836: 2003. Initiation of multiple metadata Dublin core, which is used for system-wide description of electronic information resources.

    статья, добавлен 05.03.2023

  • Micali-Reyzin computational model. Target circuit and block cipher. Analysis of single point leakages. Towards the analysis of real constructions. Definition of security against side-channel attacks. The initialize a PRNG securely with a public seed.

    статья, добавлен 15.09.2012

  • A computer based decision support system is proposed the basic tasks of which are adaptive model constructing of financial processes. The system is developed with the use of system analysis principles, forming alternatives for models and forecasts.

    статья, добавлен 20.01.2017

  • Secret stories, codes, and cryptogram puzzles. Historical background to the conspiracy stories. Caesar/shift ciphers. Hints to help crack the cryptograms and puzzles. Answers to all cryptograms, their assignment and application in modern practice.

    учебное пособие, добавлен 08.03.2014

  • Peculiarities of hackers and hacktivists' participation in modern hybrid conflicts. Analysis of "localization" of hactivist activity on the example of the Belarusian group "Cyber Partisans". Significance of partisan themes for modern Belarusian identity.

    статья, добавлен 24.02.2024

  • Exploring a new open source version of the ReaderBench platform. Calculation of indexes of complexity of texts of various levels according to the Common European scale. Evaluation of the complexity of the perception of the text in various fields.

    статья, добавлен 16.08.2023

  • Pattern discovery in biosequences. Social network mining from the web. Discovering spatio-textual association rules in document images. Discovery of latent patterns with hierarchical bayesian mixed-membership models and the issue of model choice.

    книга, добавлен 19.03.2014

  • Public key encryption and digital signature security definitions. Composable symbolic analysis for public key encryption. Ideal functionality formulations. Redefining ideal functionalities. Adding signatures to universally composable symbolic analysis.

    учебное пособие, добавлен 15.09.2012

  • The methods of image segmentation, a process of division of an image into different segments which contain pixels of similar color, are considered. Graph-based segmentation algorithm, which is based on Kruskal’s algorithm is implemented in C++ language.

    статья, добавлен 23.02.2016

  • The Iterative Extraction as extended approach extraction techniques in Principal Component Analysis to other additive data models. Additive models for clustering & similarity data and apply Iterative Extraction for deriving feasible clustering solutions.

    учебное пособие, добавлен 08.02.2013

  • Study the ways in which computer systems or network devices connect to each other. Possibilities of using network topology. Features and issues of bus topology, star topology, ring topology, mesh topology, tree topology, daisy chain and hybrid topology.

    реферат, добавлен 11.10.2017

  • Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.

    статья, добавлен 14.01.2017

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.