[1] |
汪小帆,李翔,陈关荣.复杂网络理论及其应用[M]. 北京:清华大学出版社, 2006.
|
[2] |
CANCHO R F I, JANSSEN C, SOLÉ R V. The Topology of Technology Graphs: Small World Patterns in Electronic Circuits[J]. Physical Review E Statistical Nonlinear & Soft Matter Physics, 2001, 64(2):322-333.
|
[3] |
郑军, 周海平. 基于复杂网络理论的大型电路分析与优化[J]. 计算机工程, 2011, 37(15):283-285.
|
[4] |
AMARALL A N, SCALA A, BARTHÉLÉMY M, et al. Classes of Small-world Networks[J]. Proceedings of the National Academy of Sciences of the United States of America, 2000, 97(21):11149-11152.
|
[5] |
RAMAN K, WAGNER A.The Evolvability of Programmable Hardware[J]. Journal of the Royal Society Interface, 2011, 8(55):269-281.
|
[6] |
郭征, 郭鑫泠, 宋传旺,等. 小世界网络抗毁性及介度相关性研究[J]. 信息网络安全, 2014(10):81-85.
|
[7] |
杨海钢, 孙嘉斌, 王慰. FPGA器件设计技术发展综述[J]. 电子与信息学报, 2010, 32(3):714-727.
|
[8] |
江丽娜, 高能, 马原,等. 祖冲之序列密码算法IP核的设计与实现[J]. 信息网络安全, 2012(8):219-222.
|
[9] |
顾前, 杨旭华, 王万良,等. 基于复杂网络的城市公共交通网络研究[J]. 计算机工程, 2008, 34(20):266-268.
|
[10] |
BARTHÉLEMY M. Betweenness Centrality in Large Complex Networks[J]. Physics, 2003, 38(2):163-168.
|
[11] |
周玉晶, 沈嘉荟, 邱海韬,等. 基于复杂网络的社交媒体内容安全可视化分析系统[J]. 信息网络安全, 2016(9):158-162.
|
[12] |
张亮. 复杂网络增长模型及社区结构划分方法[D].大连:大连理工大学, 2008.
|
[13] |
HOLME P, KIM B J, YOON C N, et al.Attack Vulnerability of Complex Networks.[J]. Physical Review E Statistical Nonlinear & Soft Matter Physics, 2002, 65(5 Pt 2):056109.
|
[14] |
GALLOS L K, COHEN R, LILJEROS F, et al.Attack Strategies on Complex Networks[J] .Lecture Notes in Computer Science, 2006,3993:1048-1055.
|
[15] |
DING Zheng, WU Qiang, ZHANG Yizhong, et al.Deriving an NCD File from an FPGA Bitstream: Methodology, Architecture and Evaluation[J]. Microprocessors & Microsystems, 2013, 37(3):299-312.
|
[16] |
BECKHOFF C, KOCH D, TORRESEN J.The Xilinx Design Language (XDL): Tutorial and use cases[C]// IEEE. International Workshop on Reconfigurable Communication-Centric Systems-On-Chip, June 20-22 ,2011. Montpellier, France.NJ: IEEE, 2011:1-8.
|