{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T04:24:04Z","timestamp":1747110244034,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,5,25]],"date-time":"2017-05-25T00:00:00Z","timestamp":1495670400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100013003","name":"Universit\u00e0 degli Studi di Cagliari","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100013003","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Netw Sci"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s41109-017-0032-5","type":"journal-article","created":{"date-parts":[[2017,5,25]],"date-time":"2017-05-25T12:26:40Z","timestamp":1495715200000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Functional models and extending strategies for ecological networks"],"prefix":"10.1007","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4668-2476","authenticated-orcid":false,"given":"Gianni","family":"Fenu","sequence":"first","affiliation":[]},{"given":"Pier Luigi","family":"Pau","sequence":"additional","affiliation":[]},{"given":"Danilo","family":"Dess\u00ec","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,25]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Arrigo, F, Benzi M (2016) Updating and downdating techniques for optimizing network communicability. SIAM J Sci Comput 38(1): B25\u2013B49. doi: 10.1137\/140991923 . http:\/\/epubs.siam.org\/doi\/10.1137\/140991923 .","DOI":"10.1137\/140991923"},{"issue":"2","key":"32_CR2","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1093\/bioinformatics\/btm554","volume":"24","author":"Y Assenov","year":"2008","unstructured":"Assenov, Y, Ram\u00edrez F, Schelhorn SE, Lengauer T, Albrecht M (2008) Computing topological parameters of biological networks. Bioinformatics (Oxford, England) 24(2): 282\u2013284.","journal-title":"Bioinformatics (Oxford, England)"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Aymerich, FM, Fenu G, Surcis S (2009) A real time financial system based on grid and cloud computing In: Proceedings of the ACM Symposium on Applied Computing, SAC \u201909, 1219\u20131220.. ACM, New York. http:\/\/doi.acm.org\/10.1145\/1529282.1529555 .","DOI":"10.1145\/1529282.1529555"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Borgatti, S (2005) Centrality and network flow. Soc Netw 27(1). http:\/\/works.bepress.com\/steveborgatti\/3\/ .","DOI":"10.1016\/j.socnet.2004.11.008"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, M, Crow M, Erbacher RF (2013) Vulnerability analysis of a smart grid with monitoring and control system In: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, CSIIRW \u201913, 59:1\u201359:4.. ACM, New York. http:\/\/doi.acm.org\/10.1145\/2459976.2460042 .","DOI":"10.1145\/2459976.2460042"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Dwivedi, A, Yu X, Sokolowski P (2009) Identifying vulnerable lines in a power network using complex network theory In: IEEE International Symposium on Industrial Electronics. ISIE 2009, 18\u201323.. IEEE, New York. doi: 10.1109\/ISIE.2009.5214082 . http:\/\/ieeexplore.ieee.org\/document\/5214082\/?arnumber=5214082 .","DOI":"10.1109\/ISIE.2009.5214082"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Dyer, RJ, Nason JD (2004) Population Graphs: the graph theoretic shape of genetic structure. Mol Ecol 13(7): 1713\u20131727. http:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/j.1365-294X.2004.02177.x\/abstract .","DOI":"10.1111\/j.1365-294X.2004.02177.x"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Estrada, E, Bodin \u00d6 (2008) Using Network Centrality Measures to Manage Landscape Connectivity. Ecol Appl 18(7): 1810\u20131825. http:\/\/onlinelibrary.wiley.com\/doi\/10.1890\/07-1419.1\/abstract .","DOI":"10.1890\/07-1419.1"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Fenu, G, Pau PL, Dess\u00ec D (2016) Modeling and extending ecological networks using land similarity. In: Cherifi H, Gaito S, Quattrociocchi W, Sala A (eds)Complex Networks & Their Applications V, 709\u2013718.. Springer International Publishing, Studies in Computational Intelligence. doi: 10.1007\/978-3-319-50901-3_56 . http:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-50901-3_56 .","DOI":"10.1007\/978-3-319-50901-3_56"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Iyer, S, Killingback T, Sundaram B, Wang Z (2013) Attack robustness and centrality of complex networks. PLOS ONE 8(4): e59,613. doi: 10.1371\/journal.pone.0059613 . http:\/\/journals.plos.org\/plosone\/article?id=10.1371\/journal.pone.0059613 .","DOI":"10.1371\/journal.pone.0059613"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Lad, M, Massey D, Zhang L (2006) Visualizing internet routing changes. IEEE Trans Vis Comput Graph 12(6): 1450\u20131460. doi: 10.1109\/TVCG.2006.108 .","DOI":"10.1109\/TVCG.2006.108"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"McRae, BH, Dickson BG, Keitt TH, Shah VB (2008) Using circuit theory to model connectivity in ecology, evolution, and conservation. Ecology 89(10): 2712\u20132724. http:\/\/onlinelibrary.wiley.com\/doi\/10.1890\/07-1861.1\/abstract .","DOI":"10.1890\/07-1861.1"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Mishkovski, I, Biey M, Kocarev L (2011) Vulnerability of complex networks. Commun Nonlinear Sci Numer Simul 16(1): 341\u2013349. doi: 10.1016\/j.cnsns.2010.03.018 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1007570410001607 .","DOI":"10.1016\/j.cnsns.2010.03.018"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Naujokaitis-Lewis, IR, Rico Y, Lovell J, Fortin MJ, Murphy MA (2013) Implications of incomplete networks on estimation of landscape genetic connectivity. Conserv Genet 14(2): 287\u2013298. doi: 10.1007\/s10592-012-0385-3 . https:\/\/link.springer.com\/article\/10.1007\/s10592-012-0385-3 .","DOI":"10.1007\/s10592-012-0385-3"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Pinto, N, Keitt TH (2008) Beyond the least-cost path: evaluating corridor redundancy using a graph-theoretic approach. Landsc Ecol 24(2): 253\u2013266. http:\/\/link.springer.com\/article\/10.1007\/s10980-008-9303-y .","DOI":"10.1007\/s10980-008-9303-y"},{"key":"32_CR16","unstructured":"QGIS Development Team (2009) QGIS Geographic Information System. Open Source Geospatial Foundation. http:\/\/qgis.osgeo.org ."},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"Shannon, P, Markiel A, Ozier O, Baliga NS, Wang JT, Ramage D, Amin N, Schwikowski B, Ideker T (2003) Cytoscape: a software environment for integrated models of biomolecular interaction networks. Genome Res 13(11): 2498\u20132504. doi: 10.1101\/gr.1239303 .","DOI":"10.1101\/gr.1239303"},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Stelzl, U, Worm U, Lalowski M, Haenig C, Brembeck FH, Goehler H, Stroedicke M, Zenkner M, Schoenherr A, Koeppen S, Timm J, Mintzlaff S, Abraham C, Bock N, Kietzmann S, Goedde A, Toks\u00f6z E, Droege A, Krobitsch S, Korn B, Birchmeier W, Lehrach H, Wanker EE (2005) A human protein-protein interaction network: a resource for annotating the proteome. Cell 122(6): 957\u2013968. doi: 10.1016\/j.cell.2005.08.029 .","DOI":"10.1016\/j.cell.2005.08.029"},{"key":"32_CR19","doi-asserted-by":"crossref","unstructured":"Urban, DL, Minor ES, Treml EA, Schick RS (2009) Graph models of habitat mosaics. Ecol Lett 12(3): 260\u2013273. doi: 10.1111\/j.1461-0248.2008.01271.x . http:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/j.1461-0248.2008.01271.x\/abstract .","DOI":"10.1111\/j.1461-0248.2008.01271.x"},{"key":"32_CR20","doi-asserted-by":"crossref","unstructured":"Vimal, R, Mathevet R, Thompson JD (2012) The changing landscape of ecological networks. J Nat Conserv 20(1): 49\u201355. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1617138111000471 .","DOI":"10.1016\/j.jnc.2011.08.001"},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Viswanath, B, Mislove A, Cha M, Gummadi KP (2009) On the evolution of user interaction in Facebook In: Proceedings of the 2Nd ACM Workshop on Online Social Networks. WOSN \u201909, 37\u201342.. ACM, New York. doi: 10.1145\/1592665.1592675 . http:\/\/doi.acm.org\/10.1145\/1592665.1592675 .","DOI":"10.1145\/1592665.1592675"}],"container-title":["Applied Network Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-017-0032-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41109-017-0032-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-017-0032-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T22:52:49Z","timestamp":1589755969000},"score":1,"resource":{"primary":{"URL":"http:\/\/appliednetsci.springeropen.com\/articles\/10.1007\/s41109-017-0032-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,25]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["32"],"URL":"https:\/\/doi.org\/10.1007\/s41109-017-0032-5","relation":{},"ISSN":["2364-8228"],"issn-type":[{"type":"electronic","value":"2364-8228"}],"subject":[],"published":{"date-parts":[[2017,5,25]]},"article-number":"10"}}