• Documents
  • Authors
  • Tables

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 91
Next 10 →

1The weakness of ‘weak ties ’ in the classroom

by Luis M. Vaquero, Manuel Cebrian
"... Granovetter’s “strength of weak ties ” hypothesizes that isolated social ties offer limited access to external prospects, while heterogeneous social ties diversify one’s opportunities. We analyze the most complete record of college student interactions to date (approximately 80,000 interactions by 2 ..."
Abstract - Add to MetaCart
Granovetter’s “strength of weak ties ” hypothesizes that isolated social ties offer limited access to external prospects, while heterogeneous social ties diversify one’s opportunities. We analyze the most complete record of college student interactions to date (approximately 80,000 interactions

Standing on the Shoulders of Others: Network Ties and Individual Creativity

by Yuanyuan Wang
"... Social network theory elaborates how network ties can generate social capital through structural access and relational mechanism, then to enhance individual creativity. By categorizing network ties into strong and weak in terms of tie strength, this article discusses how individuals may utilize diff ..."
Abstract - Add to MetaCart
Social network theory elaborates how network ties can generate social capital through structural access and relational mechanism, then to enhance individual creativity. By categorizing network ties into strong and weak in terms of tie strength, this article discusses how individuals may utilize

Consequential Strangers and Peripheral Ties: The Importance of Unimportant Relationships

by Karen L. Fingerman , 2009
"... Social networks in the 21st century include a wide array of partners. Most individuals report a few core ties (primarily family) and hundreds of peripheral ties. Weak ties differ from intimate ties in emotional quality, stability, density (i.e., who knows whom), and status hierarchies. Undoubtedly, ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
Social networks in the 21st century include a wide array of partners. Most individuals report a few core ties (primarily family) and hundreds of peripheral ties. Weak ties differ from intimate ties in emotional quality, stability, density (i.e., who knows whom), and status hierarchies. Undoubtedly

On the Interplay between Social and Topical Structure ∗

by Daniel M. Romero, Chenhao Tan, Johan Ugander
"... People’s interests and people’s social relationships are intuitively connected, but understanding their interplay and whether they can help predict each other has remained an open question. We examine the interface of two decisive structures forming the backbone of online social media: the graph str ..."
Abstract - Cited by 19 (2 self) - Add to MetaCart
that the social relationships between the initial adopters of a hashtag can predict the future popularity of that hashtag. By studying weighted social relationships, we observe that while strong reciprocated ties are the easiest to predict from hashtag structure, they are also much less useful than weak directed

Visualization and Analysis of Social Networks of Research Funding

by James Folkstad, Stephen C. Hayne
"... This paper describes a longitudinal analysis of the social networks formed by research collaborations at a Carnegie I research university. Over the last several years, many federal agencies, e.g., NSF, NIH, DOE, have recommended that funding proposals be submitted by collaborative interdisciplinary ..."
Abstract - Add to MetaCart
teams because of a growing acknowledgment of the importance of discoveries and outcomes from interdisciplinary science and technology. This is based on theory that more weak-tie relationships will lead to an increase in innovation. By modeling, visualizing and analyzing these social networks, we compare

Discourse, social theory, and social research: The discourse of welfare reform

by Norman Fairclough - Journal of Sociolinguistics , 2000
"... 2 Discourse, social theory, and social research: the discourse of welfare reform Abstract Recent social theory includes important insights into language which constitute a so far underdeveloped resource for sociolinguistics. But much of this theory stops short -theoretical frameworks and categories ..."
Abstract - Cited by 47 (2 self) - Add to MetaCart
;building of sociolinguistic theory', arguing that on the one hand sociolinguistics has often been only 'weakly social' in failing to connect with social theory, and on the other hand language-oriented traditions in social science have 'shunned the technical resources that linguistics and semantics offer

Transfer Link Prediction across Heterogeneous Social Networks

by Jie Tang, Tiancheng Lou, Jon Kleinberg
"... Interpersonal ties are responsible for the structure of social networks and the transmission of informa-tion through these networks. Different types of social ties have essentially different influence on people. Awareness of the types of social ties can benefit many applications such as recommendati ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Interpersonal ties are responsible for the structure of social networks and the transmission of informa-tion through these networks. Different types of social ties have essentially different influence on people. Awareness of the types of social ties can benefit many applications

VIRTUAL STRONG TIES: INTERNET-BASED POLITICAL LINKAGES OVER TIME1 A Paper Presented at the Annual Meeting of the Midwest Political Science Association

by John C. Scott , 2007
"... Abstract: How do politically weak groups offset their weakness against stronger special interest groups? How do social movement linkages compare to links among lobbyists? This study addresses these questions using unique or underutilized data sources and techniques by examining the structure of ti ..."
Abstract - Add to MetaCart
of ties among political actors. In response to cutbacks in health care and pension benefits, worker and retiree groups have organized themselves in order to stem or reverse such actions by former employers. Social network theory suggests that strong ties are used by weak groups to enhance identity

R.: Bayesian credibility modeling for personalized recommendation in participatory media

by Aaditeshwar Seth, Jie Zhang, Robin Cohen - Proceedings of the 18th International Conference on User Modeling, Adaptation, and Personalization (UMAP), Lecture Notes in Computer Science
"... Abstract. In this paper, we focus on the challenge that users face in processing messages on the web posted in participatory media settings, such as blogs. It is desirable to recommend to users a restricted set of messages that may be most valuable to them. Credibility of a mes-sage is an important ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
messages to users, we employ Bayesian learning, built on past user behaviour, integrating new concepts of con-text and completeness of messages inspired from the strength of weak ties hypothesis, from social network theory. We are able to demonstrate that our method is effective in providing the most

Connections Network Topography, Key Players and Terrorist Networks

by Sean F Everton
"... In recent years social network analysis (SNA) has enhanced our understanding of how terrorist networks organize themselves and has offered potential strategies for their disruption. To date, however, SNA research of terrorist networks has tended to focus on key actors within the network who score hi ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
In recent years social network analysis (SNA) has enhanced our understanding of how terrorist networks organize themselves and has offered potential strategies for their disruption. To date, however, SNA research of terrorist networks has tended to focus on key actors within the network who score
Next 10 →
Results 1 - 10 of 91
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University