• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 15,041
Next 10 →

Table 2: Table shows the geographical distribution of Twitter users. North America, Europe and Asia have the highest adoption of Twitter.

in Why We Twitter: Understanding Microblogging Usage and Communities
by Akshay Java, Tim Finin
"... In PAGE 4: ... For the 76K users in our collec- tion about 39K had specified locations that could be parsed correctly and resolved to their respective latitude and longi- tudinal coordinates (using Yahoo! Geocoding API7 ). Fig- ure 7 and Table2 shows the geographical distribution of Twitter users and the number of users in each continent. Twitter is most popular in US, Europe and Asia (mainly Japan).... ..."

Table 5 shows a listing of top ten hubs and authorities. From this list, we can see that some users have high authority score, and also high hub score. For example, Scobleizer, Ja- sonCalacanis, bloggersblog, and Webtickle who have many followers and friends in Twitter are located in this category. Some users with very high authority scores have relatively low hub score, such as Twitterrific, ev, and springnet. They have many followers while less friends in Twitter, and thus are located in this category. Some other users with very

in Why We Twitter: Understanding Microblogging Usage and Communities
by Akshay Java, Tim Finin
"... In PAGE 5: ...001348 JasonCalacanis 0.001534 Table5 : Top 10 Hubs and Authorities in Twitter. Some of the top authorities are also popular blog- gers.... ..."

Table 3: Table shows the distribution of Twitter social network links across continents. Most of the social network lies within North America. (N.A = North America, S.A = South America)

in Why We Twitter: Understanding Microblogging Usage and Communities
by Akshay Java, Tim Finin

Table 3 Discriminant analysis of SMS users with unwillingness-to-communicate, shortcomings in text messaging, and demographics predictorsa (N = 532)

in in SMS
by Louis Leung 2006
"... In PAGE 10: ... Discriminant analysis was run using these three aspects as predictors. Table3 shows that SMS student users were more likely to be male with a high family household income and were well aware of the shortcomings inherent in SMS text messaging, such as the confusing acronyms and the unclear message intention. When compared to non-users, SMS users were more socially anxious or felt less valued in face-to-face communication but not significantly linked to UCS-R.... ..."

Table 2 Examples of augmentations and diminishments Focal Products

in Personalized in-store e-commerce with the promopad: an augmented reality shopping assistant
by Wei Zhu, Charles B. Owen, Hairong Li, Joo-hyun Lee 2004
"... In PAGE 15: ... The PromoPad can replace the surrounding competition with complementary settings of the product or specific suggested complementary products. Table2 lists several possible examples of augmentations and diminishments of the focal products from Table 1. ... ..."
Cited by 2

Table 7. An Example of Application Port Table

in Analysis Internet Application Traffic Monitoring and Analysis
by Myung-sup Kim 2004
"... In PAGE 14: ...able 6. Notations for FRM...................................................................................43 Table7 .... In PAGE 61: ...Table 7. An Example of Application Port Table We also record the communication type of each application according to the classification in Table7 . We use this communication type information in the FRM process to finalize the grouping of flows.... ..."

Table III: Standardized discriminant function and correlation coefficient Discriminating variables Discriminant

in What drives e-service adoption? The case of Internet securities trading in
by Siriluck Rotchanakitumnuai

Table III: User-to-User Latency

in The x-Kernel: An Architecture for Implementing Network Protocols
by Norman C. Hutchinson, Larry L. Peterson 1991
Cited by 606

TABLE: USERS

in Implementing and Evaluating Common Repository Services
by Bonnie M. Edwards 1995
Cited by 1

Table: users +----------+-------------+

in ABSTRACT Multi-Module Vulnerability Analysis of Web-based Applications
by Davide Balzarotti, Marco Cova, Viktoria V. Felmetsger, Giovanni Vigna
Next 10 →
Results 1 - 10 of 15,041
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University