Current teams : | ALMASTY ALSOC APR BD CIAN ComplexNetworks DECISION DELYS LFI MOCAH MoVe NPA PEQUAN PolSys QI RO SMA SYEL |
Former team : | ACASA |
Publications ComplexNetworks | 2023 | 2024 | Total |
---|---|---|---|
Books | 0 | 0 | 0 |
Edited books | 0 | 0 | 0 |
Journal articles | 1 | 5 | 6 |
Book chapters | 1 | 0 | 1 |
Conference papers | 6 | 5 | 11 |
Habilitations | 1 | 0 | 1 |
Thesis | 2 | 0 | 2 |
- J. Abello, F. Queyroi : “Network decomposition into fixed points of degree peeling”, Social Network Analysis and Mining, vol. 4 (1), pp. 191, (Springer) [Abello 2014]
- A. Albano, J.‑L. GUILLAUME, S. Heymann, B. Le Grand : “Studying Graph Dynamics Through Intrinsic Time Based Diffusion Analysis”, Applications of Social Media and Social Network Analysis [Albano 2014b]
- M. Danisch, J.‑L. GUILLAUME, B. Le Grand : “Multi-ego-centered communities in practice”, Social Network Analysis and Mining, vol. 4 (1), pp. 180, (Springer) [Danisch 2014d]
- R. Fournier, Th. Cholez, M. Latapy, I. Chrisment, C. Magnien, O. Festor, I. Daniloff : “Comparing Pedophile Activity in Different P2P Systems”, Social Sciences, vol. 3 (3), Special Issue on Contemporary Developments in Child Protection, pp. 314-325, (MDPI) [Fournier 2014b]
- R. Hollanders, D. Bernardes, B. Mitra, R. Jungers, J.‑Ch. Delvenne, F. Tarissan : “Data-driven traffic and diffusion modeling in peer-to-peer networks: A real case study”, Network Science, vol. 2 (3), pp. 341-366, (Cambridge University Press) [Hollanders 2014]
- M. Jacomy, T. Venturini, S. Heymann, M. Bastian : “ForceAtlas2, a Continuous Graph Layout Algorithm for Handy Network Visualization Designed for the Gephi Software”, PLoS ONE, vol. 9 (6), pp. e98679, (Public Library of Science) [Jacomy 2014]
- M. Latapy, A. Hamzaoui, C. Magnien : “Detecting Events in the Dynamics of Ego-centered Measurements of the Internet Topology”, Journal of Complex Networks, vol. 2 (1), pp. 38-59, (Oxford University Press) [Latapy 2014a]
- J.‑L. Wybo, C. Gouttas, E. Freyssinet : “L’impact des réseaux sociaux dans la gestion des crises et le cybercrime”, Sécurité et stratégie, vol. 18 (3), pp. 37-43, (Club des Directeurs de Sécurité des Entreprises) [Wybo 2014]