Skip to main content

Network Science (2005) / Chapter Skim
Currently Skimming:

4 The Definition and Promise of Network Science
Pages 26-29

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 26...
... For example, in the of the global physical communications, information, and dis- study of the complex three-dimensional network formed by tribution networks described earlier are quite advanced, the magnetic atoms in solid atomic lattices, the emergent behavunderlying scientific knowledge has remained rather rudi- ior of phase transitions to various ordered states was discovmentary, according to the experts and literature surveyed by ered experimentally and predicted by sophisticated analyses the committee. Developing the metallurgy analogy further, of network models that describe the interactions between the the current state of knowledge about physical communica- spins on nearby lattice sites (Binney et al., 1992)
From page 27...
... They working in this field of investigation actually do. Because a work when these conditions are satisfied but are not neces- coherent community does not exist across the various applisarily suitable for substantially different network structures cations areas, an opportunity exists for the Army to nucleate like those needed for interplanetary communications (Jack- such a field by its leadership and funding policies.
From page 28...
... Indeed, truly surprising results might arise from a sys By focusing on the development of models and properties tematic study of network science. For example, it is widely of the underlying representations, this new area of scientific held that a revised military paradigm is needed to address investigation offers the promise of developing tools, tech- evolving threats and opportunities associated with terrorism niques, and models that apply to multiple applications areas.
From page 29...
... The disruption or exploita REFERENCES tion of these networks by adversarial social networks of terrorists or criminals is a demonstrated threat, making an in- Arquilla, J., and D Ronfeldt.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.