Logo

The Structure and Function of Complex Networks

Small book cover: The Structure and Function of Complex Networks

The Structure and Function of Complex Networks
by

Publisher: arXiv
Number of pages: 58

Description:
Inspired by empirical studies of networked systems such as the Internet, social networks, and biological networks, researchers have in recent years developed a variety of techniques and models to help us understand or predict the behavior of these systems. Here we review developments in this field, including such concepts as the small-world effect, degree distributions, clustering, network correlations, random graph models, models of network growth and preferential attachment, and dynamical processes taking place on networks.

Home page url

Download or read it online for free here:
Download link
(1.2MB, PDF)

Similar books

Book cover: An Introduction to Computer NetworksAn Introduction to Computer Networks
by - Loyola University Chicago
A free general-purpose textbook about computer networking, complete with diagrams and exercises. It is suitable as the primary text for an undergraduate or introductory graduate course in computer networking, or as a supplemental text ...
(17199 views)
Book cover: Data CommunicationsData Communications
by
Contents: Cables and Network Communication Systems; The Public Telephone Switched Network; The Internet; Standards Organizations; Data Codes; Asynchronous and Synchronous Protocols; Bit Orientated Protocols; Modems; TCP/IP and Inter-Networking; etc.
(13271 views)
Book cover: Network ProgrammingNetwork Programming
by - Prentice Hall
This book covers the advances in network flow methods ranging across modeling, applications, algorithms, and computational complexity. It deals with the problems faced on network structures that can be handled by linear programming techniques.
(14391 views)
Book cover: Secrets of Network Cartography: A Comprehensive Guide to NmapSecrets of Network Cartography: A Comprehensive Guide to Nmap
by - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13253 views)