The Social Network

Results: 5246



#Item
321

The Co-evolution of Cultures, Social Network Communities, and Agent Locations in an Extension of Axelrod’s Model of Cultural Dissemination Jens Pfaua,∗, Michael Kirleya , Yoshihisa Kashimab a Deptartment of Computin

Add to Reading List

Source URL: jp.poerf.de

Language: English - Date: 2014-03-31 09:36:05
    322

    DecemberMOBILE ADVERTISING AND MARKETING TRENDS ROUNDUP Mobile now accounts for most of the time US adults spend with the internet, and marketers have responded. From mobile social network advertising to mobile

    Add to Reading List

    Source URL: www.emarketer.com

    Language: English - Date: 2015-12-03 14:04:30
      323

      Relational Models Volker Tresp and Maximilian Nickel Siemens AG and Ludwig Maximilian University of Munich Draft To appear in the Encyclopedia of Social Network Analysis and Mining, Springer.

      Add to Reading List

      Source URL: www.dbs.ifi.lmu.de

      Language: English - Date: 2013-09-18 05:23:56
        324Software / Computing / Social media / Advertising / Communication design / Product design / Facebook / Reality television

        BETTER DATA. BETTER RESULTS. Pre and Post Video Measurement Case Study The Need A major cable network contacted LoudDoor

        Add to Reading List

        Source URL: dl.dropboxusercontent.com

        Language: English
        325Computing / Cyberwarfare / Computer security / Computer network security / Cybercrime / Spamming / Social engineering / Botnet / Web threat / Malware / Vulnerability / Computer virus

        Fighting the ‘Good’ Internet War Dan Cvrˇcek† and George Danezis 1 University of Cambridge, UK & Brno University of Technology, CZ. 2

        Add to Reading List

        Source URL: www0.cs.ucl.ac.uk

        Language: English - Date: 2013-10-10 06:48:56
        326Social networking services / Employment / LinkedIn / Recruitment / Professional network service / Job hunting / Employment website

        Top 10 Online Job Hunting Tips Here’s how LinkedIn can help you find and attract the best opportunities. 1. Make time 6. Get into groups

        Add to Reading List

        Source URL: ccd.rice.edu

        Language: English - Date: 2013-08-20 12:14:17
        327Cybercrime / Social engineering / Spamming / Computer network security / Identity theft / Phishing / Computer security / Targeted threat / Internet Security Awareness Training / Votiro

        T2 SPEAR PHISHING PROTECTION T2 Employee Defense Training Transform your most exploited vulnerability into a powerful security asset. Spear phishing is the most prevalent and successful tactic used in advanced targeted

        Add to Reading List

        Source URL: pages.phishlabs.com

        Language: English - Date: 2016-03-30 09:53:04
        328Network theory / Graph theory / Operations research / Clustering coefficient / Social network / Assortativity / Bipartite graph / Complex network / Climate as complex networks

        Revealing properties of the bipartite structure of online social networks Raphaël TACKX, Jean-loup GUILLAUME,

        Add to Reading List

        Source URL: rcis2015.hua.gr

        Language: English - Date: 2015-05-25 09:38:28
        329Facebook / Photo sharing / Social information processing / Litter / European Distance and E-learning Network / United States Environmental Protection Agency

        1 Report on the implementation of the European Clean Up DayIndex

        Add to Reading List

        Source URL: www.ewwr.eu

        Language: English - Date: 2015-06-16 09:11:25
        330

        Proceedings of the 1st Workshop on Social Information Retrieval for Technology-Enhanced Learning & Exchange Exploring affiliation network models as a collaborative filtering mechanism in e-learning Miguel-Angel Sicilia,

        Add to Reading List

        Source URL: leo9r.com

        Language: English - Date: 2014-05-09 01:41:40
          UPDATE