How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks
von Nasrullah Memon, David L. Hicks, Henrik Legind Larsen
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm2/Fragment 440 16 - Diskussion Zuletzt bearbeitet: 2014-01-11 21:49:11 WiseWoman | Fragment, Gesichtet, KomplettPlagiat, Nm2, SMWFragment, Schutzlevel sysop, Stephenson and Zelen 1989 |
|
|
Untersuchte Arbeit: Seite: 440, Zeilen: 16-22 |
Quelle: Stephenson and Zelen 1989 Seite(n): 3, 27, Zeilen: 3: 28ff; 27: 34ff |
---|---|
We have attempted to illustrate the calculation of centralities to these prototypical situations. However we regard our efforts in this direction as only a beginning. We only considered shortest distances in this paper. It is quite possible that information will take a more circuitous route either by random communication or may be intentionally channeled through many intermediaries in order to “hide” or “shield” information in a way not captured by geodesic paths. These considerations raise questions as to how to include all possible paths in a centrality measure. | It is quite possible that information will take a more circuitous route either by random communication or may be intentionally channeled through many intermediaries in order to “hide” or “shield” information in a way not captured by geodesic paths. These considerations raise questions as to how to include all possible paths in a centrality measure.
[page 27] We have attempted to illustrate the calculation of centralities to these prototypical situations. However we regard our efforts in this direction as only a beginning. |
The source is not mentioned anywhere in the paper. |
|
vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20140111211536
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20140111211536