<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Program Tools for Dynamic Investigation of Social Networks1</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alexander Mikov</string-name>
          <email>alexander_mikov@mail.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Elena Zamyatina</string-name>
          <email>e_zamyatina@mail.ru</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Daria Germanova</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Kuban State University</institution>
          ,
          <addr-line>Krasnodar, Russian Federation</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Research University Higher School of Economics</institution>
          ,
          <addr-line>Perm, Russian Federation</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Perm State National Research University</institution>
          ,
          <addr-line>Perm, Russian Federation</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper discusses the design and development of software tools for simulation of social networks. It is well known that social networks have become the object of attention of sociologists, political scientists, marketers, etc. The paper identifies two trends in the investigation of social networks: static and dynamic. Static approach involves the study of geometric forms of social networking, network structure (topology), its basic properties (the degree of centrality, distance, and so on). The dynamic approach makes it possible to follow the various stages of a social network formation, to identify the connections between nodes of social network, to identify the formation of clusters in the Internet-graph. Paper considers the existing software tools for social network simulation and put forward demands to the software of this kind (agentbased approach, distributed simulation). Moreover paper discusses if it is possible to use computer network simulator TriadNS for modeling of social networks and the definition of both static and dynamic characteristics of these networks.</p>
      </abstract>
      <kwd-group>
        <kwd>social networks</kwd>
        <kwd>modelling</kwd>
        <kwd>simulation</kwd>
        <kwd>static characteristics</kwd>
        <kwd>dynamic characteristics</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Social networks are becoming more widespread nowadays. A social network is a
special Internet resource and it allows for its members, regardless of their current
location, to communicate with their relatives, colleagues and friends, to share with
them a variety of information, as well as search for data of interest. Today there are
more than a billion social network users. Earlier social networks were used mainly for
communication between the people. Social networks are now used by various
companies to solve business issues, to work with the customers, to find the information, to
deliver the advertisements.
1 This work was carried out with the financial support of RFBR grant 16-47-230336 and the
Administration of Krasnodar Region</p>
      <p>Thus the study of social networks allows to investigate the principles of
information dissemination, the formation of user groups, the ways to attract customers.
Nowadays this information is very useful in a management of the business processes,
in marketing and etc.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Motivation</title>
      <p>
        There are two basic approaches to the analysis of social networks: static and dynamic
one [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The first approach involves the study of network structure (topology), its
basic properties (contiguity, the degree of centrality, distance and others) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. This
approach supposes the investigation of the current state of a “snapshot” of a social
network. Main attention is paid to the geometric characteristics of the network
(structure of network), as well as the different relations between the nodes (members of the
social network).
      </p>
      <p>
        Static (structural) approach allows one to characterize accurately the current state
of the system, but does not make it possible to see one to-many patterns that become
visible only in the study of the structure of the network in dynamic. Indeed the useful
information about social network “can be achieved at points in time through the use
of polling and survey data, but the most interesting questions typically lie in the space
in between these snapshots in time” [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The causal mechanism of the changes in
social networks may be obtained due to simulation (in time). The static approach
allows to understand such complex adaptive system as society, assists the scientists
and managers to take an appropriate decision, but only simulation (discrete event or
agent-based) “provides a fully traceable implementation of these concepts that readily
accommodates the varying timescales at which events unfold within society” [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. This
view is shared by the authors of other papers, some of which are listed in the
bibliography [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7 ref8">1, 2, 3, 4, 5, 6, 7, 8</xref>
        ].
      </p>
      <p>So simulation of the social network allows us to trace the dynamics of the various
stages of the formation of network, the main highlight of the formation of bonds
between the tires and the faith-course of cluster formation in the column.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Related works</title>
      <p>
        Nowadays there are a large number of specialized software systems, which are
designed to study the social networks: Visone2 – a program for social networks analyses
and visualization [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]; UCINE 3 – a program for an analyses social networks [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ];
KrackPlot4 - a program for social network graphs building, is fully compatible with
UCINET [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Some of these software systems – special social networks simulators,
for example: Netsim [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] (a flexible R package (R Core Team 2013) that allows to
combine and simulate a variety of micro-models to research their impact on the
dy2 http://visone.de
3 http://eclectic.ss.uci.edu/~lin/ucinet.html
4 http://www.heinz.cmu.edu/~krack
namic macro-features of social networks), ANA [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] (the Adversarial Network
Analyzer (ANA) is a Java applet that allows users to input new connections about the
graph and visualizes the state of the graph at all-time intervals). Some investigators
carried out investigations using NetLogo (agent-based software) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and Repast (a
library for agent-based modeling) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        One more social networks simulator is the SMSim simulator. It is described in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]
and implemented using Java. SMSim is a stochastic agent-based simulator where each
agent encapsulates the behavior of a social media network user. The environment
where the agents live and interact is a graph extracted from the social media network.
The corresponding graph notation is G = (A;R), where A is the set of agents and R is
the set of followers relationships. The SMSim is modeled as a discrete-event
simulation where the operation of the system is represented as a chronological sequence of
events. Each event occurs at an instant in time (which is called a time step or just
step) and marks a change of state in the system. “The agents and environment are
events at the simulation core” [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Agent-based simulation supposes that simulation
model includes intellectual agents changing their behavior during simulation
experiments because their behavior depends on the external environment or the behavior of
other agents. Moreover agents make decisions autonomously. But, as authors notice
in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], very often agents carry out simple operations: to make a post, to send a
message and so on.
      </p>
      <p>Let us consider the characteristics of this software for the simulation of social
networks.</p>
      <p>
        One can submit the following requirements for the simulators of social networks:
the simulator must have the software able to build web graphs. Web graphs for social
networks must have properties relevant to the properties of the real social networks
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Thus the degree of the nodes in generated web graph should be close to the
experimental one. For example, indicators of the degree distribution of vertices in many
social networks are less than 2.
      </p>
      <p>
        Another criterion is the flexibility of software tools that allow you to quickly
change the parameters of the models. So we can do a conclusion:
1. The simulator must have the software needed to build and to investigate web
graphs [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] that are similar to realistic social networks.
2. The simulator must have the software for the human behavior modelling [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7 ref8">1,
2, 3, 4, 5, 6, 7, 8</xref>
        ].
3. The simulator must have the software for the big data managing and
analyses, thus it will be advisable to use several computing nodes (or graph
processors or several processors of supercomputers)[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>Let us discuss the characteristics of the simulator TriadNS and emphasize the
simulation model representation in TriadNS. The authors will try to convince readers
that TriadNS meets the social simulation criteria and may become rather comfortable
for social network analyses both in static and dynamic investigations of social
networks.</p>
    </sec>
    <sec id="sec-4">
      <title>Simulation model representation in TriadNS</title>
      <p>
        Simulator of computer networks TriadNS was designed on the foundation of CAD
(Computer Aided Design) system Triad [
        <xref ref-type="bibr" rid="ref13 ref14">13,14</xref>
        ] in Perm State National Research
University in 80-th years of last century. Software system Triad and special language
Triad [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] were devoted to the computer systems design and simulation. The design
and implementation of CAD Triad was renewed in 2002. It was new version of Triad
– Triad.Net. New version is written in C#. Some years later special version TriadNS
for computer networks design and analyses was implemented. CAD TriadNS was
presented at various conferences both domestic and foreign [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], [29].
      </p>
      <p>Let us more precisely consider the CAD TriadNS and linguistic constructions of
the language Triad. First of all, let us present simulation model.</p>
      <p>Simulation model in TriadNS is represented by several objects functioning
according to some scenario and interacting with one another by sending messages. So
simulation model is ={STR, ROUT, MES} and it consists of three layers, where STR is a
layer of structures, ROUT – a layer of routines and MES – a layer of messages
appropriately.</p>
      <p>The layer of structures is dedicated to describe objects and their interconnections,
but the layer of routines presents their behavior. Each object can send a message to
another object. So, each object has the input and output poles (Pin – input poles are
used to send the messages, Pout – output poles serve to receive the messages). One
level of the structure is presented by graph P = {U, V, W}. P-graph is named as graph
with poles. A set of nodes V presents a set of programming objects, W – a set of
connections between them, U – a set of external poles. The internal poles are used for
information exchange within the same structure level; in contrast, the set of external
poles serves to send messages to the objects situated on higher or underlying levels of
description. Special statement out &lt;message&gt; through &lt;name of pole&gt; is used to send
the messages. One can describe the structure of a system to be simulated using such a
linguistic construction:
structure &lt;name of structure&gt; def (&lt;a list of generic parameters&gt;) (&lt;a list of input
and output parameters&gt;) &lt;a list of variables description&gt; &lt;statements&gt;) endstr</p>
      <p>Thus a layer of structure is a procedure with parameters. The computer network
designer may set the input parameters, for example, the number of nodes in
generating graph of the computer network, for example. One may define the variables of type
structure, type node, type edge, type arc and so on.</p>
      <p>Special algorithm (named “routine”) defines the behavior of an object. It is
associated with particular node of example, graph P = {U, V, W}. Each routine is specified
by a set of events (E-set), the linearly ordered set of time moments (T-set), and a set
of states {Q-set}. State is specified by the local variable values. Local variables are
defined in routine. The state is changed if an event occurs only. One event schedules
another event. Routine (as an object) has input and output poles (Prin and Prout). An
input pole serves to receive messages, output – to send them. One can pick out input
event ein. All the input poles are processed by an input event, an output poles – by the
other (usual) event.
routine&lt;name&gt;(&lt;a list of generic parameters&gt;)(&lt;a list of input and output formal
parameters&gt;) initial &lt;a sequence of a statements&gt; endi event &lt;a sequence of a
statements&gt; ende event &lt;a name of an event&gt; &lt;a sequence of statements statements&gt; ende
… event&lt;a name of an event&gt;&lt;a sequence of a statements&gt; ende endrout</p>
      <p>The simulation system Triad allows an investigator to describe only one layer and
to study it separately from other. Thus the static characteristics of a social network
(the characteristics of Internet-graph) may be obtained by an investigation of the layer
of structure. Triad-model may be considered as a variable. So user may create an
algorithm which allows to build model using operations on model (to add/delete an
arc, to add/delete an edge, to add/delete a node, to add/delete a polus, to define a
union or intersection of graphs).</p>
      <p>One can see the description of the computer network structure below.
structure ClientServer[integer theNumberofClients ] def ClientServer :=
node SERVER &lt;RECEPTION, DELIVERY&gt; +
node CLIENT [0: TheNumberofClients -1] &lt; RECEPTION, DELIVERY&gt;;
integer i;
for i := 0 by 1 to TheNumberofClients - 1 do</p>
      <p>ClientServer := ClientServer +
arc (Client[ i ].DELIVERY -- Server.RECEPTION ) +
arc (Server.DELIVERY--Client[i ].RECEPTION);
endf;
endstr</p>
      <p>The structure of the network ClientServer is presented above. This network is built
as a node “Server” and the array of nodes “Client” connected with node named
‘Server”. The links between nodes are set in the cycle for by the arcs with input and output
poles arc(Server.DELIVERY--Client[i ].RECEPTION). One may set the new value
of theNumberofClients before or during simulation run. The structure may be
described by graph constant: star (SERVER, CLIENT [0: TheNumberofClients -1]).</p>
      <p>The behavior of the node “Client” is described by routine. The description of
routine is given below:
routine Client (input RECEPTION; output DELIVERY )[ real deltaT ]
initial boolean RequestSent;</p>
      <p>Requestsent:= false; schedule Request in 0; Print "The initialization of client";
endi
event Request; out "Initialization of Request" through DELIVERY;
Print "Client sent request to server"; schedule Request in deltaT; ende
endrout</p>
      <p>Routine is a procedure with parameters. It includes not only input and output
parameters (parameters of interface) but the generic formal parameter deltaT – the time
interval between requests of Client to Server. The structure may be defined with the
help of “graph constants” – special procedures with parameters to build the structures
corresponding to known topologies of networks. A number of nodes in this structure
is set by parameters. A behavior of each node in model must be defined by
corresponding routine.</p>
      <p>The objects of simulation model are managed by the special algorithm during the
simulation run. Let us name it as “simulation algorithm” (TriadNS has distributed
version and corresponding algorithm for distributed objects of simulation model too).
CAD system Triad includes the special subsystem of analyses implementing the
algorithm of investigation - special algorithm for data (the results of simulation run)
collection and processing. The subsystem of analyses includes special objects of two
types: information procedures and conditions of simulation. Information procedures
are “connected” to nodes or, more precisely, to routines, which describe the behavior
of particular nodes during simulation experiment. Information procedures inspect the
execution process and play a role of monitors of test desk. Conditions of simulation
are special linguistic constructions defining the algorithm of investigation because the
corresponding linguistic construction includes a list of information procedures which
are necessary for investigator and a final processing of some information procedure.
Moreover it checks if conditions of simulation correspond to the end of simulation.</p>
      <p>The algorithm of investigation is detached from the simulation model. Hence it is
possible to change the algorithm of investigation if investigator is interested in the
other specifications of simulation model. But the simulation model remains invariant.
We may remind that it is not possible in some simulation systems.</p>
      <p>Simulation run is initialized after simulation statement processing. One can pay an
attention to the fact that the several models may be simulated under the same
conditions of simulation simultaneously. The influence of an external environment may be
described in conditions of simulation too. Once more benefit of TriadNS: an
investigator may build model using text or graphical editors.</p>
      <p>Simulation run is initialized after simulation statement processing. One can pay an
attention to the fact that the several models may be simulated under the same
conditions of simulation simultaneously.</p>
      <p>simulate &lt;a list of an elements of models, being inspected&gt; on conditions of
simulation &lt;name&gt; (a list of actual generic parameters&gt;) [&lt;a list of input and output actual
parameters&gt;] (&lt;a list of information procedures&gt; &lt;a list of statements&gt;…) endsim</p>
      <p>
        So we very briefly consider the program and linguistics tools of the simulator
TriadNS. One can see that TriadNS has interesting constructions of language which may
be used to build model of web graph. These constructions are: operations on model
and graph constants. Besides TriadNS has subsystem for data collection during
simulation run and final processing of data. TriadNS is rather comfortable software for
computer network design and analyses [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ]. Let us discuss the problems of social
networks investigations in TriadNS both static and dynamic. One of the problems is
to create models of graphs corresponding to real social networks. We’ll consider the
models of random graphs and the models of web graphs creation in TriadNS more
precisely.
      </p>
    </sec>
    <sec id="sec-5">
      <title>Social networks simulation</title>
      <p>The theory of random graphs is used to build the virtual social networks. There are
several models generating the random graphs. The properties of these graphs are
similar to the properties of real social networks. Let us list them below:
 The models of random graphs (Erdösh-Renyi model).
 The simplest model of scale-free networks (model Barabasi-Albert
and others).
 A more flexible model of scale-free networks (Lu Chung model, the
model of Janson-Luchk).</p>
      <p> A model of Kroneker stochastic graphs.</p>
      <p>
        Interesting review of the models of social networks similar to realistic one and the
description of these models are done in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>
        Let us consider more precisely some of the models of web graphs. First model is
the model of Erdös-Renyi. Erdös-Renyi model is the most investigated model of the
random graphs [
        <xref ref-type="bibr" rid="ref18 ref19 ref20">18, 19, 20</xref>
        ]. But in the early 2000s it turned out that this model
presents real-world social networks incorrectly.
      </p>
      <p>Let us remember what a random graph is. So we have a set Vn={1,..n}, it is a set
of nodes. Let us build a random graph on the foundation of Vn. A set E is a random
set of edges, these edges connect any node i with any node j with some probability (p
∈ (0,1)). It is possible to generate random graph in simulator TriadNS. One may
choose the appropriate parameters of random graph (a number of nodes and a
probability of the connection of two nodes) and with the help of graphical editor activates
the related procedure. The random graph G=(Vn,E) (the number of nodes is equal 30
and p = 0.25) is presented above (fig.1.).We obtain complete graph if p=1. This graph
is presented on fig.2.</p>
      <p>Complete graph (p = 1) may be built with the help of graph constant compl(n),
where n is a number of nodes in graph. Thus using graph constants and operations
with the structures (operations of the layer of structure: adding the nodes, adding the
edges, union and intersections of graphs and etc.) one may generate random graphs.</p>
      <p>The next model being discussed is a model of the graph of Barabashi - Albert. First
of all we have to introduce the concept of web graph. Let us assume that web graph
includes pages, sites and hosts (structure units in the Internet). All these objects are
the nodes of web-graph. The edges of a web graph are associated with the links
between web sites. A number of edges between the nodes is equal to the number of links
between related sites. Web sites may have the links to themselves, so web graph has a
graph loop.</p>
      <p>Thus a web graph is an oriented one and it includes the multiple edges and graph
loops. Let us list the properties of the web graphs. Web graphs are generated adding
new nodes connected by the edges with the old graph nodes. The diameter of web
graph is small (about 5-7). This property corresponds to the known property of any
social network (the theory of 6 handshakes).</p>
      <p>
        The new model of web graph (authors Barabashi-Albert [
        <xref ref-type="bibr" rid="ref21 ref22">21, 22</xref>
        ]) reflects the
property of social network growth. They found out that a new node of social network
tends to connect with those nodes which already have more links (a rich person
becomes richer). It is the concept of a preferable links. These graphs are scale-free ones.
      </p>
      <p>The example of a graph with 30 nodes and 3 additional nodes on each step is given
on fig.3.</p>
      <p>
        Therefore the simulator TriadNS has procedures to generate the models of social
networks (a class of random graphs and a class scale out networks) [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. All these
procedures have parameters.
6
      </p>
    </sec>
    <sec id="sec-6">
      <title>Program Tools for a social network investigation</title>
      <p>
        Social networks may be characterized by a variety of different metrics, let us consider
some of them below:
1. Homogeneity indicates the number of links between the similar actors
(gender, age interests) [
        <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
        ].
2. A transitivity of links - the increasing of probability of the appearance of
new links between actors (social network users) [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
3. Centrality – it is a metric allowing to determine the influence of separate
node or a group of nodes in the network [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
4. Degree - an actor’s total number of the connections [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
5. Degree centrality of the actors: a tendency to generate the links between the
nodes with a big degree [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ].
6. Clustering Coefficient - the number of edges in a neighborhood divided by
the maximum possible number of edges that could exist in that neighborhood
(information about how actors in a network tend to cluster together) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
One may obtain the characteristics of web graph with the help of great number of
standard information procedures. It is necessary to pick out the required
characteristics of a web graph and user will receive the appropriate results after
simulation run (fig.4).
So we considered program and linguistic tools of computer network simulator
TriadNS for building and analyses of the models of social networks. Investigator may
build a model of social network using graphical or text editors. Linguistic
constructions of Triad-language may do it more effective than other simulators. Effectiveness
may be achieved due to graph constants and operations of the layer of structure. One
may obtain the static characteristics of the web graphs with the help of standard
information procedures of simulator TriadNS and special standard procedures of layer
of structure. Moreover TriadNS allows to create new information procedures using
appropriate linguistic constructions. Dynamic investigations may be carried out by the
program and linguistic tools of TriadNS too.
      </p>
      <p>
        Moreover the simulator TriadNS provides distributed (parallel) simulation. Indeed
the optimistic algorithm for the synchronization of the events in distributed (parallel)
simulation model was implemented in TriadNS [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]. This property of the simulator is
necessary because the investigation of social networks deals with the big amount of
information.
8
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Gatti</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Appel</surname>
            <given-names>A.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Santos</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pinhanez</surname>
            <given-names>C.Z.</given-names>
          </string-name>
          <article-title>A Simulation-Based Approach To Analyze The Information Diffusion In Microblogging Online Social Network</article-title>
          .
          <source>Proceedings of Winter Simulation Conf</source>
          ., ed. M. E. Kuhl,
          <string-name>
            <given-names>N. M.</given-names>
            <surname>Steiger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. B.</given-names>
            <surname>Armstrong</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Joines</surname>
          </string-name>
          , Piscataway,
          <fpage>8</fpage>
          -
          <lpage>11</lpage>
          Dec.
          <year>2013</year>
          ; J.W. Marriott Hotel, Washington, D. C.; IEEE. pp.
          <fpage>1685</fpage>
          -
          <lpage>1696</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Ozmen</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yilmaz</surname>
            <given-names>L</given-names>
          </string-name>
          .
          <article-title>An Agent-Based Simulation Study of a Complex Adaptive Collaboration Network</article-title>
          .
          <source>Proceedings of the 2013 Winter Simulation Conference. R.</source>
          <string-name>
            <surname>Pasupathy</surname>
            ,
            <given-names>S.-H.</given-names>
          </string-name>
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Tolk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Hill</surname>
          </string-name>
          , and M. E. Kuhl, eds.
          <source>Piscataway</source>
          ,
          <volume>8</volume>
          -
          <fpage>11</fpage>
          Dec.
          <year>2013</year>
          ; J.W. Marriott Hotel, Washington, D. C. IEEE. pp.
          <fpage>412</fpage>
          -
          <lpage>423</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Alt</surname>
            <given-names>J.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lieberman</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <source>Representing Dynamic Social Networks In Discrete Event Social Simulation. Proceedings of the 2010 Winter Simulation Conference B</source>
          .
          <string-name>
            <surname>Johansson</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Jain</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Montoya-Torres</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Hugan</surname>
          </string-name>
          , and E. Yücesan, eds. Piscataway, Baltimore,
          <fpage>5</fpage>
          -8
          <source>December</source>
          <year>2010</year>
          , Marriott Waterfront Hotel, Baltimore, MD, pp.
          <fpage>1478</fpage>
          -
          <lpage>1489</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Menges</surname>
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mishra</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Narzisi</surname>
            <given-names>G</given-names>
          </string-name>
          .
          <article-title>Modeling and Simulation of E-Mail Social Networks: A New Stochastic Agent-Based Approach</article-title>
          .
          <source>Proceedings of the 2008 Winter Simulation Conference. S. J</source>
          .
          <string-name>
            <surname>Mason</surname>
            ,
            <given-names>R. R.</given-names>
          </string-name>
          <string-name>
            <surname>Hill</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Mönch</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Rose</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Jefferson</surname>
          </string-name>
          , J. W. Fowler eds. Piscataway, Miami,
          <fpage>7</fpage>
          -
          <lpage>10</lpage>
          December, Hotel Intercontinental Miami, FL. pp.
          <fpage>2794</fpage>
          -
          <lpage>2800</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Marin</surname>
            <given-names>E.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Carvalho</surname>
            <given-names>C.L.</given-names>
          </string-name>
          <string-name>
            <surname>Small-Scale</surname>
          </string-name>
          :
          <article-title>A New Model of Social Networks</article-title>
          .
          <source>Proceedings of the 2013 Winter Simulation Conference. R.</source>
          <string-name>
            <surname>Pasupathy</surname>
            ,
            <given-names>S.-H.</given-names>
          </string-name>
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Tolk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Hill</surname>
          </string-name>
          , and M. E. Kuhl, eds. Piscataway, Washington,
          <fpage>8</fpage>
          -
          <lpage>11</lpage>
          Dec.
          <year>2013</year>
          ; J.W. Marriott Hotel, Washington, D. C.; IEEE. pp.
          <fpage>2972</fpage>
          -
          <lpage>2983</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Gatti</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vieira</surname>
            <given-names>M.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Melo</surname>
            <given-names>J.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cavalin</surname>
            <given-names>P.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pinhanez</surname>
            <given-names>C.S.</given-names>
          </string-name>
          <article-title>Handling Big Data On Agent-Based Modeling Of Online Social Networks With MapReduce</article-title>
          .
          <source>Proceedings of the 2014 Winter Simulation Conference A</source>
          .
          <string-name>
            <surname>Tolk</surname>
            ,
            <given-names>S. Y.</given-names>
          </string-name>
          <string-name>
            <surname>Diallo</surname>
            ,
            <given-names>I. O.</given-names>
          </string-name>
          <string-name>
            <surname>Ryzhov</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Yilmaz</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Buckley</surname>
            , and
            <given-names>J. A</given-names>
          </string-name>
          . Miller, eds., Piscataway, Savannah,
          <fpage>7</fpage>
          -
          <lpage>10</lpage>
          Dec.
          <year>2014</year>
          ,
          <string-name>
            <given-names>Savannah</given-names>
            <surname>Intl</surname>
          </string-name>
          . Trade &amp; Convention Ctr., pp.
          <fpage>851</fpage>
          -
          <lpage>863</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Wang</surname>
            <given-names>X</given-names>
          </string-name>
          .
          <article-title>Agent Heterogeneity in Social Network Formation: An Agent-Based Approach</article-title>
          .
          <source>Proceedings of the 2013 Winter Simulation Conference R</source>
          . Pasupathy,
          <string-name>
            <given-names>S.-H.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tolk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Hill</surname>
          </string-name>
          , and M. E. Kuhl, eds.,
          <source>Piscataway</source>
          ,
          <fpage>8</fpage>
          -
          <lpage>11</lpage>
          Dec.
          <year>2013</year>
          ; J.W. Marriott Hotel, Washington, D. C. IEEE. pp.
          <fpage>3936</fpage>
          -
          <lpage>3937</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Wang</surname>
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Collins</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <article-title>Popularity Or Proclivity? Revisiting Agent Heterogeneity In Network Formation</article-title>
          .
          <source>Proceedings of the 2014 Winter Simulation Conference A</source>
          .
          <string-name>
            <surname>Tolk</surname>
            ,
            <given-names>S. Y.</given-names>
          </string-name>
          <string-name>
            <surname>Diallo</surname>
            ,
            <given-names>I. O.</given-names>
          </string-name>
          <string-name>
            <surname>Ryzhov</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Yilmaz</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Buckley</surname>
            , and
            <given-names>J. A</given-names>
          </string-name>
          . Miller, eds. Piscataway, Savannah,
          <fpage>7</fpage>
          -
          <lpage>10</lpage>
          Dec.
          <year>2014</year>
          ,
          <string-name>
            <given-names>Savannah</given-names>
            <surname>Intl</surname>
          </string-name>
          . Trade &amp; Convention Ctr., pp.
          <fpage>3084</fpage>
          -
          <lpage>3095</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Davydenko</surname>
            <given-names>V.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Romashkina</surname>
            <given-names>G.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chukanov</surname>
            <given-names>S.N.</given-names>
          </string-name>
          <article-title>Modeling of social networks</article-title>
          .
          <source>Vestnik Tyumenskogo gosudarstvennogo universiteta. № 1</source>
          ,
          <year>2005</year>
          . С.
          <volume>68</volume>
          -
          <fpage>79</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Stadtfeld С. NetSim: A Social Networks Simulation Tool</surname>
          </string-name>
          in R. https://www.ethz.ch/content/dam/ethz/special-interest/gess/social-networksdam/documents/jss_netsim.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Orendovici R. Ritter</surname>
            ,
            <given-names>F.E.</given-names>
          </string-name>
          <string-name>
            <surname>Social</surname>
          </string-name>
          <article-title>Network Analysis and Simulation of the Development of Adversarial Networks</article-title>
          . http://acs.ist.psu.edu/papers/orendoviciR12.pdf
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Mikov</surname>
            <given-names>A.I.</given-names>
          </string-name>
          <article-title>Formal Method for Design of Dynamic Objects and Its Implementation in</article-title>
          CAD Systems // Gero J.S. and
          <string-name>
            <surname>F.Sudweeks F</surname>
          </string-name>
          .(eds),
          <source>Advances in Formal Design Methods for CAD, Preprints of the IFIP WG 5</source>
          .2 Workshop on Formal Design Methods for Computer-Aided Design, Mexico, Mexico,
          <year>1995</year>
          . pp.
          <fpage>105</fpage>
          -
          <lpage>127</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Zamyatina</surname>
            <given-names>E.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mikov</surname>
            <given-names>A.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mikheev</surname>
            <given-names>R.A. Lingvisticheskie</given-names>
          </string-name>
          <article-title>i intellektualnye instrumentalnye sredstva simulyatora kompiutornyh setei TRIADNS</article-title>
          .
          <source>International Journal “Information theories &amp; Applications (IJ ITA)</source>
          .
          <source>Vol 19, Number</source>
          <volume>4</volume>
          ,
          <year>2012</year>
          , pp.
          <fpage>355</fpage>
          -
          <lpage>368</lpage>
          . ITHEA, Sofia, 1000,
          <string-name>
            <given-names>P.O.B.</given-names>
            775,
            <surname>Bulgaria</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Zamyatina</surname>
            <given-names>E.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mikov</surname>
            <given-names>A.I.</given-names>
          </string-name>
          <article-title>Programmnye sredstva imitatsii Triad.Net dlya obespecheniya eyo adaptiruemosti I otkrytosti</article-title>
          .
          <source>Informatizatsiya i svyaz. №5</source>
          ,
          <year>2012</year>
          , ANO «
          <article-title>Redaktsiya zhurnala «Informatizatsiya I svyaz»</article-title>
          ,
          <source>ISSN 2078-8320</source>
          , PP.
          <fpage>130</fpage>
          -
          <lpage>133</lpage>
          [in Russian].
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Mikov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zamiatina</surname>
            <given-names>E. Program</given-names>
          </string-name>
          <string-name>
            <surname>Tools</surname>
          </string-name>
          and
          <article-title>Language for Networks Simulation and Analysis</article-title>
          .
          <source>Proceedings SDN &amp; NFV - The Next Generation of Computational Infrastructure: 2014 International Science and Technology Conference «Modern Networking Technologies (MoNeTec)» October 27-29</source>
          , 2014 Lomonosov Moscow State University pp.
          <fpage>94</fpage>
          -
          <lpage>102</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Mikov</surname>
            <given-names>A.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zamyatina</surname>
            <given-names>E.B.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Mikheev R</surname>
          </string-name>
          .
          <article-title>A. Towards the Flexibility of Software for Computer Network Simulation /Proceedings of the 18th International Conference on Computers (part of CSCC '14) Advances in information science</article-title>
          and applications
          <string-name>
            <surname>- volumes</surname>
            <given-names>I &amp; II</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Santorini</surname>
            <given-names>Island</given-names>
          </string-name>
          , Greece,
          <source>July 17-21</source>
          ,
          <year>2014</year>
          , Edited by Prof.
          <source>Nikos Mastorakis</source>
          ,
          <source>ISBN: 978-1-61804-237-8</source>
          , pp.
          <fpage>391</fpage>
          -
          <lpage>397</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Amblard</surname>
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bouadjio-Boulic</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gutiyrrez</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Gaudou</surname>
          </string-name>
          <string-name>
            <surname>B.</surname>
          </string-name>
          ,
          <source>Which Models Are Used In Social Simulation To Generate Social Networks? A Review Of 17 Years Of Publications In Jasss. Proceedings of the 2015 Winter Simulation Conference</source>
          . L.
          <string-name>
            <surname>Yilmaz</surname>
            ,
            <given-names>W. K. V.</given-names>
          </string-name>
          <string-name>
            <surname>Chan</surname>
          </string-name>
          , I. Moon,
          <string-name>
            <surname>T. M. K. Roeder</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Macal</surname>
          </string-name>
          , and M. D. Rossetti, eds. Piscataway, Washington,
          <fpage>6</fpage>
          -
          <lpage>10</lpage>
          Dec.
          <year>2015</year>
          ; J.W. Marriott Hotel, Washington, D. C.; IEEE. pp.
          <fpage>4021</fpage>
          -
          <lpage>4033</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Raigorodskiyi A.M. Matematicheskie</surname>
          </string-name>
          modeli interneta //Zhurnal «Kvant» №4,
          <year>2012</year>
          . http://elementy.ru [in Russian]
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Raigorodskiyi A.M.</surname>
          </string-name>
          <article-title>Modeli sluchainykh graphov I ikh primenenie //Trudy MFTI, V 2, №4</article-title>
          . pp.
          <fpage>130</fpage>
          -
          <lpage>140</lpage>
          [in Russian]
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Mislove</surname>
            <given-names>A.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Druschel</surname>
            <given-names>P</given-names>
          </string-name>
          .
          <article-title>Online social networks: measurement, analysis, and applications to distributed information systems</article-title>
          . Houston, Texas, USA: Rice University,
          <year>2009</year>
          . 244 p.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21. L.
          <article-title>-</article-title>
          <string-name>
            <surname>A. Barabási</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Albert</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Jeong</surname>
          </string-name>
          .
          <article-title>Scale-free characteristics of random networks: the topology of the world-</article-title>
          wide web // Physica.
          <year>2000</year>
          . V. A281 pp.
          <fpage>69</fpage>
          -
          <lpage>77</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22. L.
          <article-title>-</article-title>
          <string-name>
            <surname>A. Barabási</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Albert</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Jeong</surname>
          </string-name>
          .
          <source>Diameter of the world-wide web // Nature</source>
          .
          <year>1999</year>
          . V.
          <volume>401</volume>
          . pp.
          <fpage>130</fpage>
          -
          <lpage>131</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <given-names>W.</given-names>
            <surname>Aiello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Chung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Lu</surname>
          </string-name>
          . A Random Graph Model for Massive Graphs // Experimental Mathematics.
          <year>2001</year>
          . V.
          <volume>10</volume>
          . pp.
          <fpage>53</fpage>
          -
          <lpage>56</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Bernovski</surname>
            <given-names>M. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozyurin</surname>
            <given-names>H.H.</given-names>
          </string-name>
          <article-title>Sluchainye graphy, modeli I generator bezmashtabnykh graphov // Trudy Instituta sistemnogo programmirovaniya RAN</article-title>
          .
          <year>2012</year>
          . V.
          <volume>22</volume>
          , pp.
          <fpage>419</fpage>
          -
          <lpage>432</lpage>
          [in Russian].
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Newman</surname>
            <given-names>M. E. J.</given-names>
          </string-name>
          <article-title>A measure of betweenness centrality based on random walks</article-title>
          . Available at: http://aps.arxiv.org/pdf/cond-mat/0309045.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Newman</surname>
            <given-names>M. E. J.</given-names>
          </string-name>
          <article-title>The mathematics of networks</article-title>
          . http://wwwpersonal.umich.edu/~mejn/papers/palgrave.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <article-title>Analiz sotsialnykh setei kak metod vliyaniya na klientov</article-title>
          . http://datareview.info. [in Russian]
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Mikov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zamyatina</surname>
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozlov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ermakov</surname>
            <given-names>S.</given-names>
          </string-name>
          <article-title>Some Problems of the Simulation Model Efficiency and Flexibility</article-title>
          .
          <source>Proceedings of «2013 8th EUROSIM Congress on Modelling and Simulation EUROSIM</source>
          <year>2013</year>
          », Cardiff, Wales, United Kingdom,
          <fpage>10</fpage>
          -
          <lpage>13</lpage>
          of September. P .
          <volume>532</volume>
          -
          <fpage>538</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>