Login / Signup

Whom to trust in a signed network? Optimal solution and two heuristic rules.

Fanyuan MengMatús MedoBerno Buechel
Published in: Inf. Sci. (2022)
Keyphrases