Identifying node importance in complex networks is of great significance to improve the network damage resistance and robustness. In the era of big data, the size of the network is huge and the network structure tends to change dynamically over time. Due to the high complexity, the algorithm based on the global information of the network is not suitable for the analysis of large-scale networks. Taking into account the bridging feature of nodes in the local network, this paper proposes a simple and efficient ranking algorithm to identify node importance in complex networks. In the algorithm, if there are more numbers of node pairs whose shortest paths pass through the target node and there are less numbers of shortest paths in its neighborho...
The functionalities, such as connectivity and communication capability of complex networks, are rela...
A complex network is a useful tool for representing and analyzing complex systems, such as the world...
In this study, we simulate the degree and betweenness node attack over a large set of 200 real-world...
Identifying node importance in complex networks is of great significance to improve the network dama...
AbstractEvaluating the importance of nodes for complex networks is of great significance to the rese...
Assessing and measuring the importance of nodes in a complex network are of great theoretical and pr...
The problem of node importance in a general controlled complex network is investigated in this brief...
AbstractTo solve the problem of node importance evaluation in complex networks, an improved method o...
Crucial nodes in a network refer to those nodes that their existence is so important in preserving t...
Relatively important node mining has always been an essential research topic in complex networks. Ex...
Understanding the complex network response to nodes failure is important to protect them and guarant...
This paper considers the problem of finding the most central nodes in neighborhoods of a given netwo...
Abstract In complex networks, key nodes are important factors that directly affect network structure...
This paper addresses the problem of finding the most synchrony vulnerable node in complex networks, ...
The centrality of an edge in a graph is proposed to be the degree of sensitivity of a graph distance...
The functionalities, such as connectivity and communication capability of complex networks, are rela...
A complex network is a useful tool for representing and analyzing complex systems, such as the world...
In this study, we simulate the degree and betweenness node attack over a large set of 200 real-world...
Identifying node importance in complex networks is of great significance to improve the network dama...
AbstractEvaluating the importance of nodes for complex networks is of great significance to the rese...
Assessing and measuring the importance of nodes in a complex network are of great theoretical and pr...
The problem of node importance in a general controlled complex network is investigated in this brief...
AbstractTo solve the problem of node importance evaluation in complex networks, an improved method o...
Crucial nodes in a network refer to those nodes that their existence is so important in preserving t...
Relatively important node mining has always been an essential research topic in complex networks. Ex...
Understanding the complex network response to nodes failure is important to protect them and guarant...
This paper considers the problem of finding the most central nodes in neighborhoods of a given netwo...
Abstract In complex networks, key nodes are important factors that directly affect network structure...
This paper addresses the problem of finding the most synchrony vulnerable node in complex networks, ...
The centrality of an edge in a graph is proposed to be the degree of sensitivity of a graph distance...
The functionalities, such as connectivity and communication capability of complex networks, are rela...
A complex network is a useful tool for representing and analyzing complex systems, such as the world...
In this study, we simulate the degree and betweenness node attack over a large set of 200 real-world...