Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks
von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 242 09 - Diskussion Zuletzt bearbeitet: 2012-05-22 19:22:44 Hindemith | Fragment, Gesichtet, KomplettPlagiat, Nm, SMWFragment, Schutzlevel sysop, Stephenson and Zelen 1989 |
|
|
Untersuchte Arbeit: Seite: 242, Zeilen: 9-14 |
Quelle: Stephenson and Zelen 1989 Seite(n): 3, Zeilen: 28-33 |
---|---|
It is possible that information will take a more circuitous route either by random communication or may be intentionally channeled through many intermediaries in order to “hide” or “shield” information in a way not captured by geodesic paths. These considerations raise questions as to how to include all possible paths in a centrality measure. | It is quite possible that information will take a more circuitous route either by random communication or may be intentionally channeled through many intermediaries in order to “hide” or “shield” information in a way not captured by geodesic paths. These considerations raise questions as to how to include all possible paths in a centrality measure. |
Nearly identical, not marked as a citation, no reference given. See also Nm/Fragment_144_16. |
|
vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120501082456
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120501082456