Fig. 20
From: Complex influence propagation based on trust-aware dynamic linear threshold models

Possible configurations for the connector in Fig. 7
From: Complex influence propagation based on trust-aware dynamic linear threshold models
Possible configurations for the connector in Fig. 7