Fig. 20From: Complex influence propagation based on trust-aware dynamic linear threshold modelsPossible configurations for the connector in Fig. 7Back to article page