Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks
von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 140 01 - Diskussion Zuletzt bearbeitet: 2012-05-22 19:54:11 Hindemith | Fragment, Freeman 1980, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung |
|
|
Untersuchte Arbeit: Seite: 140, Zeilen: 1-6 |
Quelle: Freeman 1980 Seite(n): 588, Zeilen: 10-14 |
---|---|
Each entry in D is an index of the degree to which the node designated by the row of a matrix must depend on the vertex designated by the column to relay messages to and from others. Thus D captures the importance of each node as gatekeeper with respect to every other node—facilitating or perhaps inhibiting its communication. | Each entry in D is an index of the degree to which the point designated by the row of the matrix must depend on the point designated by the column to relay messages to and from others. Thus D captures the importance of each point as a gatekeeper with respect to each other point - facilitating or perhaps inhibiting its communication. |
Even though nearly identical, a reference to the source is completely missing. |
|
vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120522195509
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120522195509