摘要
记者前几天在电视上看到一个街头采访,采访问题是:上班时间除了工作,你会在互联网上做什么?街头接受采访的人群年龄跨度很大,从20岁的年轻人到60岁的老大爷,答案五花八门:炒股、博客、开心网偷菜、去关心的网站看帖子、论坛灌水、购物……
出处
《信息安全与通信保密》
2011年第12期27-28,共2页
Information Security and Communications Privacy
同被引文献16
-
1ARENAS A, D'IAZ-GUILERA A, P'EREZ-VICENTE C J. Synchronization Reveals Topological Scales in Complex Networks[J]. Phys. Rev.Lett, 2006, 96(11): 1-4.
-
2LESKOVEC J, LANG K J, DASGUP'FA A, et al. Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters[J]. Internet Math,2009, 6(1): 29-123.
-
3GIRVAN M, NEWMAN M E J. Community Structure in Social and Biological Networks[J]. Natl. Acad. Sci. USA, 2002, 99(12): 7821-7826.
-
4CLAUSET A, NEWMAN M E J, MOORE C. Finding Community Structure in Very Large Networks[J]. Phys. Rev. E, 2004, 70(6): 1-6.
-
5WU F, HUBERMAN B A. Finding Communities in Linear Time: A Physics Approach[J]. Eur.Phys.J.B, 2004, 38(2): 331-338.
-
6SON S, JEONG H, NOH J D. Random Field Lsing Model and Community Structure in Complex Networks[J]. Eur. Phys.J.B, 2006, 50(3): 431-437.
-
7RAGHAVAN U N, ALBERT R, KUMARA S. Near Linear Time Algorithm to Detect Community Structures in Large- scale Networks[J]. Phys. Rev.E, 2007, 76(3): 1-11.
-
8SUBELJ L, BAJEC M. Robust Network Community Detection using Balanced Propagation[J]. Phys. Rev.E, 2011, 81(3): 353-362.
-
9LIU X, MURATA T. Advanced Modularity-specialized Label Propagation Algorithm for Detecting Communities in Networks[J]. Physica A, 2009, 389(7): 1493-1500.
-
10HU Y, CHEN H, ZHANG P, et al. Comparative Definition of Community and Corresponding Identifying Algorithm[J]. Phys. Rev. E, 2005, 75(2): 1-7.
引证文献2
-
1季青松,赵郁忻,陈乐生,陈秀真,李生红.有效改善标签传播算法鲁棒性的途径[J].信息安全与通信保密,2012,10(9):135-137. 被引量:3
-
2巨乃岐,卢晓莉,王恒桓.试论保密的经济价值[J].信息安全与通信保密,2013,11(2):53-54.
-
1读编桥[J].电脑爱好者,2009(13):118-118.
-
2李虓.走基层转作风——关于如何做好街头采访的探讨[J].西部广播电视,2016,37(7):158-160.
-
3网罗天下[J].电脑爱好者,2013(11):57-57.
-
4罗超.黄河数字:以务实和塌实的作风开拓市场[J].中国公共安全,2009(24):46-46.
-
5稀饭.照亮独立游戏界的烛光[J].游戏机实用技术,2016(16):84-85.
-
6包塔.有道:切入场景,以产品驱动营销[J].声屏世界(广告人),2015,0(12):203-203. 被引量:1
-
7胡晓荷.我国密码研究应用面临的难题和方向——访上海大学通信与信息工程学院王潮教授[J].信息安全与通信保密,2011,9(10):7-7.
-
8小笋.智慧在猪丛中呼喊[J].科技中国,2009(4):106-106.
-
9晶合声音[J].大众软件,2008(4):80-80.
-
10枫林,magnum.思考——来自读者的声音[J].大众硬件,2003(11):18-19.