Graphs appear in numerous applications including cyber security, the Internet, social networks, protein networks, recommendation systems, citation networks, and many more …
J Magnusson, T Kvernvik - Proceedings of the 1st International Workshop …, 2012 - dl.acm.org
This paper describes a scalable solution for identifying influential subscribers in for example telecom networks. The solution estimates one weighted value of influence out of several …
As of late there has been an immense increase of data within modern society. This is evident within the field of telecommunications. The amount of mobile data is growing fast. For a …
B Doherty, D Rumery, B Barnes… - Proceedings of the 2012 …, 2012 - academia.edu
There exists a lack of'off the shelf'and user-friendly computational tools that allow architects and other design consultants to quickly analyse and simulate circulation patterns of …
The Internet relies on its inter-domain routing system to allow data transfer between any two endpoints regardless of where they are located. This routing system currently uses a …
How do contagions spread in population networks What happens if the networks change with time Which hospitals should we give vaccines to, for maximum effect How to detect …
We are in the era of Big Data. Enormous amount of data are being collected everyday in business transactions, mobile sensors, social interactions, bioinformatics, astronomy, etc …
Social networks have formed the basis of many studies into large networks analysis. Whilst much is already known regarding efficient algorithms for large networks analysis, data …