Social networks

Results: 3881



#Item
981Fragmentation of identity through structural holes in email contacts danah boyd, Jeff Potter, Fernanda Viegas This is the first half of a paper submitted for Keith Hampton’s “Social Networks” course; the second hal

Fragmentation of identity through structural holes in email contacts danah boyd, Jeff Potter, Fernanda Viegas This is the first half of a paper submitted for Keith Hampton’s “Social Networks” course; the second hal

Add to Reading List

Source URL: smg.media.mit.edu

Language: English - Date: 2002-10-18 00:35:53
982Computational & Mathematical Organization Theory, 10, 205–226, 2004 c 2004 Kluwer Academic Publishers. Manufactured in The Netherlands.  The Social Embeddedness of Academic Online Groups in Offline Networks as a Norm

Computational & Mathematical Organization Theory, 10, 205–226, 2004 c 2004 Kluwer Academic Publishers. Manufactured in The Netherlands.  The Social Embeddedness of Academic Online Groups in Offline Networks as a Norm

Add to Reading List

Source URL: www.umatzat.net

Language: English - Date: 2009-10-27 08:42:13
983GFI White Paper  Social networking at work: Thanks, but no thanks? Millions of people around the world with access to the Internet are members of one or more social networks. They have a permanent

GFI White Paper Social networking at work: Thanks, but no thanks? Millions of people around the world with access to the Internet are members of one or more social networks. They have a permanent

Add to Reading List

Source URL: www.gfi.com

Language: English - Date: 2011-06-05 05:44:50
984Measurement and methodology for mining mobile, cloud-based, social systems Jennifer Neville Departments of Computer Science and Statistics Purdue University

Measurement and methodology for mining mobile, cloud-based, social systems Jennifer Neville Departments of Computer Science and Statistics Purdue University

Add to Reading List

Source URL: dmlab.cs.umn.edu

Language: English - Date: 2012-02-23 22:37:04
985Break-out sessions at GAWSocio-economical and policy priorities, and sustainability and expansion of networks Sonja Vidič / Shiv Dev Attri

Break-out sessions at GAWSocio-economical and policy priorities, and sustainability and expansion of networks Sonja Vidič / Shiv Dev Attri

Add to Reading List

Source URL: www.wmo.int

Language: English - Date: 2013-03-20 08:29:13
986How to manage and remember your online passwords David McLelland - Technology and Online Security Expert Whether it’s our email, social networks, telephone or electricity bills, online auction sites or online banking,

How to manage and remember your online passwords David McLelland - Technology and Online Security Expert Whether it’s our email, social networks, telephone or electricity bills, online auction sites or online banking,

Add to Reading List

Source URL: downloads.bbc.co.uk

Language: English - Date: 2014-09-12 08:22:41
987Connect with us prilosec 10 mg tablets through your social networks. Gastrointestinal: Dryness of the weight watchers model after my second prescription. A typical maintenance dose is 3-6 mg once daily. Like any medicine

Connect with us prilosec 10 mg tablets through your social networks. Gastrointestinal: Dryness of the weight watchers model after my second prescription. A typical maintenance dose is 3-6 mg once daily. Like any medicine

Add to Reading List

Source URL: blog.fabricinteractive.com

Language: English - Date: 2015-06-17 22:48:45
988Networks, Gaps and Fostering Capacity Development South and Southeast Asia www.catalyst-project.eu a project funded by the European Commission Seventh Framework Programme FP7

Networks, Gaps and Fostering Capacity Development South and Southeast Asia www.catalyst-project.eu a project funded by the European Commission Seventh Framework Programme FP7

Add to Reading List

Source URL: www.catalyst-project.eu

Language: English - Date: 2014-02-07 06:14:09
9892014 IEEE Security and Privacy Workshops  iCOP: Automatically Identifying New Child Abuse Media in P2P Networks Claudia Peersman∗ , Christian Schulze† , Awais Rashid∗ , Margaret Brennan‡ and Carl Fischer∗ ∗ S

2014 IEEE Security and Privacy Workshops iCOP: Automatically Identifying New Child Abuse Media in P2P Networks Claudia Peersman∗ , Christian Schulze† , Awais Rashid∗ , Margaret Brennan‡ and Carl Fischer∗ ∗ S

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-30 03:11:09
990The Hyperion Project: From Data Integration to Data Coordination Marcelo Arenas1 Vasiliki Kantere1 Anastasios Kementsietsidis 1 Iluju Kiringa2 1

The Hyperion Project: From Data Integration to Data Coordination Marcelo Arenas1 Vasiliki Kantere1 Anastasios Kementsietsidis 1 Iluju Kiringa2 1

Add to Reading List

Source URL: web.ing.puc.cl

Language: English - Date: 2013-04-26 05:57:03