Network analysis

Results: 5019



#Item
451Scientific method / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Database / Data analysis / Data sharing

Youth Chances Additional File 4 Page 1 Youth Chances Data Sharing Policy Information for researchers interested in analysing Youth Chances data: How to access and use Youth Chances data

Add to Reading List

Source URL: www.youthchances.org

Language: English - Date: 2013-11-19 06:44:55
452Standards organizations / Information science / International standards / Knowledge representation / Product testing / Dipak Kalra / Health Level 7 / Interoperability / System of concepts to support continuity of care / Electronic health record / Health informatics / OpenEHR

Semantic Interoperability for Health Network Deliverable 3.2: Generalized methodology and analysis framework for semantic interoperability resources [Version 2.0, February 28, Call: FP7-ICT

Add to Reading List

Source URL: www.semantichealthnet.eu

Language: English - Date: 2015-08-11 02:53:43
453Graph theory / Network theory / Networks / Network analysis / Betweenness centrality / Centrality / Vertex / Graph / Giant component

Petter Holme Beom Jun Kim overload breakdown in evolving networks o

Add to Reading List

Source URL: petterholdotme.files.wordpress.com

Language: English - Date: 2015-09-22 01:15:42
454Risk / Society for Risk Analysis / Cultural Theory of risk / Cultural cognition / Social vulnerability / Affect heuristic / Precautionary principle / Paul Slovic / Network theory in risk assessment

JTC670 Social Processes of Risk. 3 cr. Prerequisite: graduate standing Fall 2014 meets 3:00 - 5:50 Wednesdays, Clark C256 Craig Trumbo, Journalism & Technical Communication C229 Clark Hall, , offi

Add to Reading List

Source URL: web.libarts.colostate.edu

Language: English - Date: 2015-11-05 11:38:20
455Bioinformatics / Scientific modeling / Models of computation / Systems biology / Concurrency / Computational biology / Linear temporal logic / Model checking / Agent-based model / Gene regulatory network / Construction and Analysis of Distributed Processes / Petri net

Computational Modeling, Formal Analysis, and Tools for Systems Biology

Add to Reading List

Source URL: www.eziobartocci.com

Language: English - Date: 2016-02-05 19:02:40
456Computer network security / Hacking / Code audit / Information technology audit / Vulnerability / Cross-site scripting / SQL injection / Web application security / Code injection / Uncontrolled format string / Application security / Computer security

Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2005-09-25 18:44:49
457Network theory / Networks / Algebraic graph theory / Centrality / Graph theory / Network analysis / PageRank / Influencer marketing

Identification  of  Opinion  Leaders  Using  Text  Mining  Technique  in   Virtual  Community       Chihli  Hung   Department  of  Information  Management    

Add to Reading List

Source URL: ceur-ws.org

Language: English - Date: 2014-12-18 08:23:06
458Network theory / Networks / Social networking services / Blog hosting services / Graph theory / Orkut / LiveJournal / Degree distribution / Scale-free network / Internet / Small-world network / Complex network

Measurement and Analysis of Online Social Networks Alan Mislove Massimiliano Marcon Krishna P. Gummadi

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2007-12-16 08:07:42
459Genomics / Gene expression / Bioinformatics / Essential gene / Genetics / Correlation and dependence / Gene co-expression network / Ridge

Genome Informatics 11: 83–Correspondence Analysis of Genes and Tissue Types and Finding Genetic Links from Microarray Data

Add to Reading List

Source URL: www.jsbi.org

Language: English - Date: 2001-02-21 03:41:16
460Human-based computation / Crowdsourcing / OpenStreetMap / Geographic information system / Disaster informatics / Citizen science / Missing Maps / Digital Humanitarian Network / Government crowdsourcing / Crowdsourcing software development

Herfort et al. A typology and analysis of geographic information crowdsourcing Being specific about geographic

Add to Reading List

Source URL: idl.iscram.org

Language: English - Date: 2016-05-22 08:40:50
UPDATE