Fig. 19
From: Complex influence propagation based on trust-aware dynamic linear threshold models

Focus on a connector from Fig. 18 and its adaptation for the npC-F2DLT model
From: Complex influence propagation based on trust-aware dynamic linear threshold models
Focus on a connector from Fig. 18 and its adaptation for the npC-F2DLT model