2019
DOI: 10.1017/nws.2019.7
|View full text |Cite
|
Sign up to set email alerts
|

Centralities for networks with consumable resources

Abstract: Identification of influential nodes is an important step in understanding and controlling the dynamics of information, traffic and spreading processes in networks. As a result, a number of centrality measures have been proposed and used across different application domains. At the heart of many of these measures, lies an assumption describing the manner in which traffic (of information, social actors, particles, etc.) flows through the network. For example, some measures only count shortest paths while others … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 89 publications
0
1
0
Order By: Relevance
“…The chimera graph [1], which we henceforth callχ, is the hardware graph for D-Wave computers. This graph underpins the chip design for computational tasks such as optimization [2][3][4], graph partitioning [5], and machine learning [6][7][8], which classical computers and algorithms struggle to perform efficiently and accurately. D-Wave computers solve problems by converting the problem graph into its hardware graph, using the minor embedding technique of representing one logical qubit by several physical qubits [9][10][11].…”
Section: Introductionmentioning
confidence: 99%
“…The chimera graph [1], which we henceforth callχ, is the hardware graph for D-Wave computers. This graph underpins the chip design for computational tasks such as optimization [2][3][4], graph partitioning [5], and machine learning [6][7][8], which classical computers and algorithms struggle to perform efficiently and accurately. D-Wave computers solve problems by converting the problem graph into its hardware graph, using the minor embedding technique of representing one logical qubit by several physical qubits [9][10][11].…”
Section: Introductionmentioning
confidence: 99%