{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T22:30:07Z","timestamp":1723242607182},"reference-count":46,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11875042","11505114","11805128","10975099"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013285","name":"Program for Professor of Special Appointment (Orientational Scholar) at the Shanghai Institutions of Higher Learning","doi-asserted-by":"publisher","award":["D-USST02","QD2015016","USST-SYS-01"],"id":[{"id":"10.13039\/501100013285","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Communications in Nonlinear Science and Numerical Simulation"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1016\/j.cnsns.2019.104911","type":"journal-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T02:10:47Z","timestamp":1562638247000},"page":"104911","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":12,"special_numbering":"C","title":["Predator-prey games on complex networks"],"prefix":"10.1016","volume":"79","author":[{"given":"Tongfeng","family":"Weng","sequence":"first","affiliation":[]},{"given":"Huijie","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Changgui","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Pan","family":"Hui","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5378-1582","authenticated-orcid":false,"given":"Michael","family":"Small","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cnsns.2019.104911_bib0001","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1038\/nature18272","article-title":"Mean first passage times of non-Markovian random walkers in confinement","volume":"534","author":"Gu\u00e9rin","year":"2016","journal-title":"Nature (London)"},{"key":"10.1016\/j.cnsns.2019.104911_bib0002","doi-asserted-by":"crossref","first-page":"118701","DOI":"10.1103\/PhysRevLett.92.118701","article-title":"Random walks on complex networks","volume":"92","author":"Noh","year":"2004","journal-title":"Phys Rev Lett"},{"key":"10.1016\/j.cnsns.2019.104911_bib0003","doi-asserted-by":"crossref","first-page":"011128","DOI":"10.1103\/PhysRevE.77.011128","article-title":"Exact mean first-passage time on the T-graph","volume":"77","author":"Agliari","year":"2008","journal-title":"Phys Rev E"},{"key":"10.1016\/j.cnsns.2019.104911_bib0004","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.cnsns.2010.02.016","article-title":"Random walks and flights over connected graphs and complex networks","volume":"16","author":"Volchenkov","year":"2011","journal-title":"Commun Nonlinear Sci Numer Simulat"},{"key":"10.1016\/j.cnsns.2019.104911_bib0005","doi-asserted-by":"crossref","first-page":"056110","DOI":"10.1103\/PhysRevE.86.056110","article-title":"Long range navigation on complex networks using L\u00e9vy random walks","volume":"86","author":"Riascos","year":"2012","journal-title":"Phys Rev E"},{"key":"10.1016\/j.cnsns.2019.104911_bib0006","doi-asserted-by":"crossref","first-page":"033032","DOI":"10.1088\/1367-2630\/17\/3\/033032","article-title":"Diversity of timescale promotes the maintenance of extortioners in a spatial prisoner\u2019s dilemma game","volume":"17","author":"Rong","year":"2015","journal-title":"New J Phys"},{"key":"10.1016\/j.cnsns.2019.104911_bib0007","doi-asserted-by":"crossref","first-page":"37547","DOI":"10.1038\/srep37547","article-title":"Navigation by anomalous random walks on complex networks","volume":"6","author":"Weng","year":"2016","journal-title":"Sci Rep"},{"key":"10.1016\/j.cnsns.2019.104911_bib0008","doi-asserted-by":"crossref","first-page":"13696","DOI":"10.1073\/pnas.0904354106","article-title":"Survival of an evasive prey","volume":"106","author":"Oshanin","year":"2009","journal-title":"Proc Natl Acad Sci USA"},{"key":"10.1016\/j.cnsns.2019.104911_bib0009","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1186\/1752-0509-5-71","article-title":"Agent based simulation of reactions in the crowded and structured intracellular environment: influence of mobility and location of the reactants","volume":"5","author":"Klann","year":"2011","journal-title":"BMC Syst Biol"},{"key":"10.1016\/j.cnsns.2019.104911_bib0010","series-title":"The physics of foraging: an introduction to random searches and biological encounters","author":"Viswanathan","year":"2011"},{"key":"10.1016\/j.cnsns.2019.104911_bib0011","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1080\/17486700903029280","article-title":"Fractal pharmacokinetics","volume":"11","author":"Pereira","year":"2010","journal-title":"Comput Math Methods Med"},{"key":"10.1016\/j.cnsns.2019.104911_bib0012","doi-asserted-by":"crossref","first-page":"052147","DOI":"10.1103\/PhysRevE.89.052147","article-title":"Slow encounters of particle pairs in branched structures","volume":"89","author":"Agliari","year":"2014","journal-title":"Phys Rev E"},{"key":"10.1016\/j.cnsns.2019.104911_bib0013","doi-asserted-by":"crossref","first-page":"056102","DOI":"10.1103\/PhysRevE.73.056102","article-title":"Condensation phase transitions of symmetric conserved mass aggregation model on complex networks","volume":"73","author":"Kwon","year":"2006","journal-title":"Phys Rev E"},{"key":"10.1016\/j.cnsns.2019.104911_bib0014","doi-asserted-by":"crossref","first-page":"066105","DOI":"10.1103\/PhysRevE.77.066105","article-title":"Condensation phenomena of a conserved mass aggregation model on weighted complex networks","volume":"77","author":"Kwon","year":"2008","journal-title":"Phys Rev E"},{"key":"10.1016\/j.cnsns.2019.104911_bib0015","doi-asserted-by":"crossref","first-page":"052111","DOI":"10.1103\/PhysRevE.93.052111","article-title":"Two particle problem in comblike structures","volume":"93","author":"Agliari","year":"2016","journal-title":"Phys Rev E"},{"key":"10.1016\/j.cnsns.2019.104911_bib0016","doi-asserted-by":"crossref","first-page":"855","DOI":"10.1007\/s00214-007-0323-5","article-title":"Autocatalytic reaction on low dimensional substrates","volume":"118","author":"Agliari","year":"2007","journal-title":"Theor Chem Acc"},{"key":"10.1016\/j.cnsns.2019.104911_bib0017","doi-asserted-by":"crossref","first-page":"027101","DOI":"10.1103\/PhysRevE.76.027101","article-title":"Roles of mixing patterns in cooperation on a scale free networked game","volume":"76","author":"Rong","year":"2007","journal-title":"Phys Rev E"},{"key":"10.1016\/j.cnsns.2019.104911_bib0018","doi-asserted-by":"crossref","first-page":"10409","DOI":"10.1073\/pnas.1206569109","article-title":"Iterated prisoner\u2019s dilemma contains strategies that dominate any evolutionary opponent","volume":"109","author":"Press","year":"2012","journal-title":"Proc Natl Acad Sci USA"},{"key":"10.1016\/j.cnsns.2019.104911_bib0019","doi-asserted-by":"crossref","first-page":"052302","DOI":"10.1103\/PhysRevE.95.052302","article-title":"Extortion provides alternative routes to the evolution of cooperation in structured populations","volume":"95","author":"Xu","year":"2017","journal-title":"Phys Rev E"},{"key":"10.1016\/j.cnsns.2019.104911_bib0020","doi-asserted-by":"crossref","first-page":"016107","DOI":"10.1103\/PhysRevE.80.016107","article-title":"Biased random walks in complex networks: the role of local navigation rules","volume":"80","author":"Fronczak","year":"2009","journal-title":"Phys Rev E"},{"key":"10.1016\/j.cnsns.2019.104911_bib0021","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1140\/epjb\/e2009-00095-5","article-title":"Centrality measure of complex networks using biased random walks","volume":"68","author":"Lee","year":"2009","journal-title":"Eur Phys J B"},{"key":"10.1016\/j.cnsns.2019.104911_bib0022","doi-asserted-by":"crossref","first-page":"017102","DOI":"10.1103\/PhysRevE.80.017102","article-title":"Searching method through biased random walks on complex networks","volume":"80","author":"Lee","year":"2009","journal-title":"Phys Rev E"},{"key":"10.1016\/j.cnsns.2019.104911_bib0023","doi-asserted-by":"crossref","first-page":"990","DOI":"10.3938\/jkps.56.990","article-title":"Biased random walk sampling on assortative networks","volume":"56","author":"Yook","year":"2010","journal-title":"J Korean Phys Roc"},{"key":"10.1016\/j.cnsns.2019.104911_bib0024","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1086\/jar.33.4.3629752","article-title":"An information flow model for conflict and fission in small groups","volume":"33","author":"Zachary","year":"1977","journal-title":"J Anthropol Res"},{"key":"10.1016\/j.cnsns.2019.104911_bib0025","doi-asserted-by":"crossref","first-page":"48006","DOI":"10.1209\/0295-5075\/119\/48006","article-title":"Hunting for a moving target on a complex network","volume":"119","author":"Weng","year":"2017","journal-title":"Europhys Lett"},{"key":"10.1016\/j.cnsns.2019.104911_bib0026","doi-asserted-by":"crossref","first-page":"083109","DOI":"10.1063\/1.5004730","article-title":"Predicting search time when hunting for multiple moving targets: a recursive harmonic law","volume":"28","author":"Weng","year":"2018","journal-title":"Chaos"},{"key":"10.1016\/j.cnsns.2019.104911_bib0027","doi-asserted-by":"crossref","first-page":"1275","DOI":"10.1103\/RevModPhys.80.1275","article-title":"Critical phenomena in complex networks","volume":"80","author":"Dorogovtsev","year":"2008","journal-title":"Rev Mod Phys"},{"key":"10.1016\/j.cnsns.2019.104911_bib0028","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1214\/aoms\/1177729893","article-title":"Adjustment of an inverse matrix corresponding to a change in one element of a given matrix","volume":"21","author":"Sherman","year":"1950","journal-title":"Ann Math Stat"},{"key":"10.1016\/j.cnsns.2019.104911_bib0029","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1511\/2006.61.3495","article-title":"Connecting the dots","volume":"94","author":"Hayes","year":"2006","journal-title":"Am Sci"},{"key":"10.1016\/j.cnsns.2019.104911_bib0030","doi-asserted-by":"crossref","first-page":"036104","DOI":"10.1103\/PhysRevE.74.036104","article-title":"Finding community structure in networks using the eigenvectors of matrices","volume":"74","author":"Newman","year":"2006","journal-title":"Phys Rev E"},{"key":"10.1016\/j.cnsns.2019.104911_bib0031","first-page":"17","article-title":"On the evolution of random graphs","volume":"5","author":"Erdos","year":"1960","journal-title":"Publ Math Inst Hung Acad Sci"},{"key":"10.1016\/j.cnsns.2019.104911_bib0032","doi-asserted-by":"crossref","first-page":"208701","DOI":"10.1103\/PhysRevLett.89.208701","article-title":"Assortative mixing in networks","volume":"89","author":"Newman","year":"2002","journal-title":"Phys Rev Lett"},{"key":"10.1016\/j.cnsns.2019.104911_bib0033","series-title":"The Stanford GraphBase: a platform for combinatorial computing","author":"Knuth","year":"1993"},{"key":"10.1016\/j.cnsns.2019.104911_bib0034","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1093\/bioinformatics\/bti098","article-title":"Pdzbase: a protein protein interaction database for pdz domains","volume":"21","author":"Beuming","year":"2005","journal-title":"Bioinformatics"},{"key":"10.1016\/j.cnsns.2019.104911_bib0035","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1007\/s00265-003-0651-y","article-title":"The bottlenose dolphin community of doubtful sound features a large proportion of long lasting associations","volume":"54","author":"Lusseau","year":"2003","journal-title":"Behav Ecol Sociobiol"},{"key":"10.1016\/j.cnsns.2019.104911_bib0036","series-title":"The art of computer programming","author":"Knuth","year":"2008"},{"key":"10.1016\/j.cnsns.2019.104911_bib0037","first-page":"114","article-title":"Network analysis of trophic dynamics in south florida ecosystems","author":"Ulanowicz","year":"2005","journal-title":"U S Geol Surv Program South Florida Ecosyst"},{"key":"10.1016\/j.cnsns.2019.104911_bib0038","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1111\/j.1469-7998.1991.tb03832.x","article-title":"Social status in female bighorn sheep: expression, development and reproductive correlates","volume":"225","author":"Hass","year":"1991","journal-title":"J Zool"},{"key":"10.1016\/j.cnsns.2019.104911_bib0039","series-title":"The monkeys of Arashiyama","author":"Fedigan","year":"1991"},{"key":"10.1016\/j.cnsns.2019.104911_bib0040","doi-asserted-by":"crossref","first-page":"253","DOI":"10.2307\/2785979","article-title":"The diffusion of an innovation among physicians","volume":"20","author":"Coleman","year":"1957","journal-title":"Sociometry"},{"key":"10.1016\/j.cnsns.2019.104911_bib0041","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1016\/j.jtbi.2010.11.033","article-title":"What\u2019s in a crowd? Analysis of face to face behavioral networks","volume":"271","author":"Isella","year":"2011","journal-title":"J Theor Biol"},{"key":"10.1016\/j.cnsns.2019.104911_bib0042","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1142\/S0219525903001067","article-title":"Community structure in jazz","volume":"6","author":"Gleiser","year":"2003","journal-title":"Adv Compl Syst"},{"key":"10.1016\/j.cnsns.2019.104911_sbref0043","series-title":"Aspects and Applications of the Random Walk","author":"Weiss","year":"1994"},{"key":"10.1016\/j.cnsns.2019.104911_bib0044","doi-asserted-by":"crossref","article-title":"First-passage phenomena on finite inhomogeneous networks","author":"Agliari","year":"2014","DOI":"10.1142\/9789814590297_0005"},{"key":"10.1016\/j.cnsns.2019.104911_bib0045","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"Barab\u00e1si","year":"1999","journal-title":"Science"},{"key":"10.1016\/j.cnsns.2019.104911_bib0046","series-title":"The Compleat Strategyst","author":"Williams","year":"1966"}],"container-title":["Communications in Nonlinear Science and Numerical Simulation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1007570419302321?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1007570419302321?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T18:44:11Z","timestamp":1568832251000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1007570419302321"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":46,"alternative-id":["S1007570419302321"],"URL":"http:\/\/dx.doi.org\/10.1016\/j.cnsns.2019.104911","relation":{},"ISSN":["1007-5704"],"issn-type":[{"value":"1007-5704","type":"print"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Predator-prey games on complex networks","name":"articletitle","label":"Article Title"},{"value":"Communications in Nonlinear Science and Numerical Simulation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cnsns.2019.104911","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"104911"}}