• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,414
Next 10 →

Finding Core Members in Virtual Communities ∗

by Haiqiang Chen, Xueqi Cheng, Yue Liu
"... Finding the core members of a virtual community is an important problem in community analysis. Here we presented an simulated annealing algorithm to solve this problem by optimizing the user interests concentration ratio in user groups. As an example, we test this algorithm on a virtual community si ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Finding the core members of a virtual community is an important problem in community analysis. Here we presented an simulated annealing algorithm to solve this problem by optimizing the user interests concentration ratio in user groups. As an example, we test this algorithm on a virtual community

Play Safety Forum core members

by David Ball, Tim Gill, Bernard Spiegal, David Ball, Rob Wheway, Ð Child, Accident Prevention Trust, Don Earley, Ð Fields Trust
"... decades has focused on how Governments, organisations and individuals make decisions when faced with difÞcult choices, particularly those involving risk. This work has ranged over nuclear waste, ßood control, food safety, transport safety and environmental protection, as well as aspects of public li ..."
Abstract - Add to MetaCart
decades has focused on how Governments, organisations and individuals make decisions when faced with difÞcult choices, particularly those involving risk. This work has ranged over nuclear waste, ßood control, food safety, transport safety and environmental protection, as well as aspects of public life including sport and leisure and childrenÕs play. For further information visit www.mdx.ac.uk/risk/.

How core members of Electronic Networks of Practice contribute to

by unknown authors
"... Cracking the core: ..."
Abstract - Add to MetaCart
Cracking the core:

Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,

by ] Richard Hackman , Grec R Oldham , 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract - Cited by 622 (2 self) - Add to MetaCart
for this state of affairs is that existing theories of work The authors express great appreciation to members of the consulting firm that helped us gain access to the organizations where this research was conducted; to Kenneth Brousseau, Daniel Feldman, and Linda Frank for assistance in data collection

Abstracts of a Series of Lectures to be delivered by the Core Members

by Short-term Invitees, Andrea Blunck, Hans Havlicek , 2009
"... In this series of lectures we introduce the projective line over a Jordan system. This can be seen as a generalization of the projective line over a ring. A Jordan system is a substructure of a ring (or an algebra) which is closed with respect to addition (and scalar multiplication) and inversion. S ..."
Abstract - Add to MetaCart
In this series of lectures we introduce the projective line over a Jordan system. This can be seen as a generalization of the projective line over a ring. A Jordan system is a substructure of a ring (or an algebra) which is closed with respect to addition (and scalar multiplication) and inversion. Standard examples are special Jordan algebras. A Jordan system can also be seen as a special case of a Jordan pair. We present examples of all these algebraic structures. Moreover, we present, as an associated geometric structure, the projective line over a Jordan system. This projective line naturally appears in the theory of chain geometries: The point set of a chain geometry is the projective line over a K-algebra A (with K a field), and the chains of this geometry are the K-sublines. Each Jordan system J contained in A gives rise to a subgeometry of the chain geometry, with point set the projective line over J. Under certain geometric conditions on the chain geometry, this can be reversed: Each subgeometry can be described with the help of a Jordan system J in A. As an example we study the geometry of points and circles on a non-degenerate quadric in a projective space over K. This can be described as a subgeometry of the chain geometry over an associated Clifford algebra C by finding a suitable Jordan system J in C. Moreover, we study morphisms of the algebraic and the geometric structures under consideration. A series of three lectures to be given on August 21, 22 and 24, 2009.

CoolStreaming/DONet: A Data-driven Overlay Network for Peer-to-Peer Live Media Streaming

by Xinyan Zhang, Jiangchuan Liu, Bo Li, Tak-shing Peter Yum - in IEEE Infocom , 2005
"... This paper presents DONet, a Data-driven Overlay Network for live media streaming. The core operations in DONet are very simple: every node periodically exchanges data availability information with a set of partners, and retrieves unavailable data from one or more partners, or supplies available dat ..."
Abstract - Cited by 475 (42 self) - Add to MetaCart
This paper presents DONet, a Data-driven Overlay Network for live media streaming. The core operations in DONet are very simple: every node periodically exchanges data availability information with a set of partners, and retrieves unavailable data from one or more partners, or supplies available

Network structure mining: locating and isolating core members in covert terrorist networks

by Muhammad Akram Shaikh, Wang Jiaxin - WSEAS Transactions on Information Science and Applications , 2008
"... Abstract: Knowing patterns of relationship in covert (illegal) networks is very useful for law enforcement agencies and intelligence analysts to investigate collaborations among criminals. Previous studies in network analysis have mostly dealt with overt (legal) networks with transparent structures. ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
. Structural properties are determined by the graph structure of the network. These structural properties are used for locating and isolating core members by using importance ranking score and thereby analyzing the effect to remove these members in terrorist networks. The discussion is supported with a case

Structure and evolution of online social networks

by Ravi Kumar, Jasmine Novak, Andrew Tomkins - In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining , 2006
"... In this paper, we consider the evolution of structure within large online social networks. We present a series of measurements of two such networks, together comprising in excess of five million people and ten million friendship links, annotated with metadata capturing the time of every event in the ..."
Abstract - Cited by 400 (4 self) - Add to MetaCart
in the life of the network. Our measurements expose a surprising segmentation of these networks into three regions: singletons who do not participate in the network; isolated communities which overwhelmingly display star structure; and a giant component anchored by a well-connected core region which persists

VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming*

by Shaojie Qiao, Changjie Tang, Jing Peng, Hongjian Fan, Yong Xiang
"... Abstract. Intelligence operation against the terrorist network has been studied extensively with the aim to mine the clues and traces of terrorists. The contribu-tions of this paper include: (1) introducing a new approach to classify terrorists based on Gene Expression Programming (GEP); (2) analyzi ..."
Abstract - Add to MetaCart
) analyzing the characteris-tics of the terrorist organization, and proposing an algorithm called Create Vir-tual Community (CVC) based on tree-structure to create a virtual community; (3) proposing a formal definition of Virtual Community (VC) and the VCCM Mining algorithm to mine the core members of a

Hard-Core Members ’ of Consumption-Oriented Subcultures Enactment of Identity: The Sacred Consumption of Two Subcultures

by Tandy D. Chalmers
"... This study investigates how hard-core members of two non-brand focused consumption-oriented subcultures enact their iden-tities. The authors analyzed data collected from prolonged investi-gations of the North American organized distance running subcul-ture and the Australian Hip Hop culture. Results ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
This study investigates how hard-core members of two non-brand focused consumption-oriented subcultures enact their iden-tities. The authors analyzed data collected from prolonged investi-gations of the North American organized distance running subcul-ture and the Australian Hip Hop culture
Next 10 →
Results 1 - 10 of 3,414
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University