共 54 条
- [1] Ahuja R.K., 1993, Network Flows
- [2] Aiello L.-M, 2010, Proceedings of the 2010 IEEE Second International Conference on Social Computing (SocialCom 2010). the Second IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2010), P249, DOI 10.1109/SocialCom.2010.42
- [3] [Anonymous], 1990, COMMAND CONTROL COMM
- [4] Bakshy E., 2011, P 4 ACM INT C WEB SE, P65, DOI [DOI 10.1145/1935826.1935845, 10.1145/1935826.1935845]
- [5] Barrios F., 2015, PREPRINT, DOI DOI 10.48550/ARXIV.1602.03606
- [6] Bhavnani V, 2021, 2021 4 BIENN INT C N, P1
- [7] Latent Dirichlet allocation [J]. JOURNAL OF MACHINE LEARNING RESEARCH, 2003, 3 (4-5) : 993 - 1022
- [8] Bouma G., 2009, P BIENN GERM SOC COM, P31, DOI DOI 10.1139/F04-132
- [9] Choirul Rahmadan M., 2020, 2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS), P126, DOI 10.1109/ICIMCIS51567.2020.9354320
- [10] Clauset A, 2004, PHYS REV E, V70, DOI 10.1103/PhysRevE.70.066111