Results 1 - 10
of
3,414
Finding Core Members in Virtual Communities ∗
"... Finding the core members of a virtual community is an important problem in community analysis. Here we presented an simulated annealing algorithm to solve this problem by optimizing the user interests concentration ratio in user groups. As an example, we test this algorithm on a virtual community si ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Finding the core members of a virtual community is an important problem in community analysis. Here we presented an simulated annealing algorithm to solve this problem by optimizing the user interests concentration ratio in user groups. As an example, we test this algorithm on a virtual community
Play Safety Forum core members
"... decades has focused on how Governments, organisations and individuals make decisions when faced with difÞcult choices, particularly those involving risk. This work has ranged over nuclear waste, ßood control, food safety, transport safety and environmental protection, as well as aspects of public li ..."
Abstract
- Add to MetaCart
decades has focused on how Governments, organisations and individuals make decisions when faced with difÞcult choices, particularly those involving risk. This work has ranged over nuclear waste, ßood control, food safety, transport safety and environmental protection, as well as aspects of public life including sport and leisure and childrenÕs play. For further information visit www.mdx.ac.uk/risk/.
Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,
, 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract
-
Cited by 622 (2 self)
- Add to MetaCart
for this state of affairs is that existing theories of work The authors express great appreciation to members of the consulting firm that helped us gain access to the organizations where this research was conducted; to Kenneth Brousseau, Daniel Feldman, and Linda Frank for assistance in data collection
Abstracts of a Series of Lectures to be delivered by the Core Members
, 2009
"... In this series of lectures we introduce the projective line over a Jordan system. This can be seen as a generalization of the projective line over a ring. A Jordan system is a substructure of a ring (or an algebra) which is closed with respect to addition (and scalar multiplication) and inversion. S ..."
Abstract
- Add to MetaCart
In this series of lectures we introduce the projective line over a Jordan system. This can be seen as a generalization of the projective line over a ring. A Jordan system is a substructure of a ring (or an algebra) which is closed with respect to addition (and scalar multiplication) and inversion. Standard examples are special Jordan algebras. A Jordan system can also be seen as a special case of a Jordan pair. We present examples of all these algebraic structures. Moreover, we present, as an associated geometric structure, the projective line over a Jordan system. This projective line naturally appears in the theory of chain geometries: The point set of a chain geometry is the projective line over a K-algebra A (with K a field), and the chains of this geometry are the K-sublines. Each Jordan system J contained in A gives rise to a subgeometry of the chain geometry, with point set the projective line over J. Under certain geometric conditions on the chain geometry, this can be reversed: Each subgeometry can be described with the help of a Jordan system J in A. As an example we study the geometry of points and circles on a non-degenerate quadric in a projective space over K. This can be described as a subgeometry of the chain geometry over an associated Clifford algebra C by finding a suitable Jordan system J in C. Moreover, we study morphisms of the algebraic and the geometric structures under consideration. A series of three lectures to be given on August 21, 22 and 24, 2009.
CoolStreaming/DONet: A Data-driven Overlay Network for Peer-to-Peer Live Media Streaming
- in IEEE Infocom
, 2005
"... This paper presents DONet, a Data-driven Overlay Network for live media streaming. The core operations in DONet are very simple: every node periodically exchanges data availability information with a set of partners, and retrieves unavailable data from one or more partners, or supplies available dat ..."
Abstract
-
Cited by 475 (42 self)
- Add to MetaCart
This paper presents DONet, a Data-driven Overlay Network for live media streaming. The core operations in DONet are very simple: every node periodically exchanges data availability information with a set of partners, and retrieves unavailable data from one or more partners, or supplies available
Network structure mining: locating and isolating core members in covert terrorist networks
- WSEAS Transactions on Information Science and Applications
, 2008
"... Abstract: Knowing patterns of relationship in covert (illegal) networks is very useful for law enforcement agencies and intelligence analysts to investigate collaborations among criminals. Previous studies in network analysis have mostly dealt with overt (legal) networks with transparent structures. ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
. Structural properties are determined by the graph structure of the network. These structural properties are used for locating and isolating core members by using importance ranking score and thereby analyzing the effect to remove these members in terrorist networks. The discussion is supported with a case
Structure and evolution of online social networks
- In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
, 2006
"... In this paper, we consider the evolution of structure within large online social networks. We present a series of measurements of two such networks, together comprising in excess of five million people and ten million friendship links, annotated with metadata capturing the time of every event in the ..."
Abstract
-
Cited by 400 (4 self)
- Add to MetaCart
in the life of the network. Our measurements expose a surprising segmentation of these networks into three regions: singletons who do not participate in the network; isolated communities which overwhelmingly display star structure; and a giant component anchored by a well-connected core region which persists
VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming*
"... Abstract. Intelligence operation against the terrorist network has been studied extensively with the aim to mine the clues and traces of terrorists. The contribu-tions of this paper include: (1) introducing a new approach to classify terrorists based on Gene Expression Programming (GEP); (2) analyzi ..."
Abstract
- Add to MetaCart
) analyzing the characteris-tics of the terrorist organization, and proposing an algorithm called Create Vir-tual Community (CVC) based on tree-structure to create a virtual community; (3) proposing a formal definition of Virtual Community (VC) and the VCCM Mining algorithm to mine the core members of a
Hard-Core Members ’ of Consumption-Oriented Subcultures Enactment of Identity: The Sacred Consumption of Two Subcultures
"... This study investigates how hard-core members of two non-brand focused consumption-oriented subcultures enact their iden-tities. The authors analyzed data collected from prolonged investi-gations of the North American organized distance running subcul-ture and the Australian Hip Hop culture. Results ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
This study investigates how hard-core members of two non-brand focused consumption-oriented subcultures enact their iden-tities. The authors analyzed data collected from prolonged investi-gations of the North American organized distance running subcul-ture and the Australian Hip Hop culture
Results 1 - 10
of
3,414