Return to Article Details Behavior of the Social Spider Technique on Network Reconfiguration Download Download PDF