Filters








541 Hits in 8.3 sec

Axiomatic Analysis of Contact Recommendation Methods in Social Networks: An IR Perspective [chapter]

Javier Sanz-Cruzado, Craig Macdonald, Iadh Ounis, Pablo Castells
2020 Lecture Notes in Computer Science  
Contact recommendation is an important functionality in many social network scenarios including Twitter and Facebook, since they can help grow the social networks of users by suggesting, to a given user  ...  In this paper, inspired by new advances in the axiomatic theory of IR, we study the existing IR axioms for the contact recommendation task.  ...  In this paper, we analyze the reasons behind the effectiveness of IR approaches for the task of recommending contacts in social networks, through an exploratory analysis of the importance and validity  ... 
doi:10.1007/978-3-030-45439-5_12 fatcat:yxi6xvg53zfnrovkg4whummnzu

Vital nodes identification in complex networks

Linyuan Lü, Duanbing Chen, Xiao-Long Ren, Qian-Ming Zhang, Yi-Cheng Zhang, Tao Zhou
2016 Physics reports  
In despite of the emphasis on physics-rooted approaches, the unification of the language and comparison with cross-domain methods would trigger interdisciplinary solutions in the near future.  ...  In this review, we clarify the concepts and metrics, classify the problems and methods, as well as review the important progresses and describe the state of the art.  ...  We also acknowledge the team lead by Zi-Ke Zhang (some members are the authors of the companying review) for useful exchange of research. This work is supported by the National Natural Science  ... 
doi:10.1016/j.physrep.2016.06.007 fatcat:3zecrlkydfex3gv5o62fozgksu

The Comparative Method and Law Reform

Darius Whelan
1988 Social Science Research Network  
As up-to-date information on law reform agencies i3 rather difficult to come by, we have decided to conduct a direct survey of the agencies for some basic information.  ...  tually concluded that the concept of illegitimacy should be abolished in Ireland as it had been in the countries discussed.52 The Commission appears to have built up a large network of contacts with legal  ...  stated that in their view it was "axiomatic" that much of the law was out of date, some of it shockingly so.  ... 
doi:10.2139/ssrn.2170672 fatcat:k25ijaif2vf27f7hkfvnxzduwu

Understanding and countering the spread of conspiracy theories in social networks: Evidence from epidemiological models of Twitter data

Julian Kauk, Helene Kreysa, Stefan R. Schweinberger, Stefano Cresci
2021 PLoS ONE  
We conclude that an early response combined with strong fact-checking and a moderate level of deletion of problematic posts is a promising strategy to fight conspiracy theories in social networks.  ...  Conspiracy theories in social networks are considered to have adverse effects on individuals' compliance with public health measures in the context of a pandemic situation.  ...  We also thank Christine Nussbaum and Frank Nussbaum for their comments on the methods section of the manuscript.  ... 
doi:10.1371/journal.pone.0256179 fatcat:c2w3dew3vjfbfl5taisl7xgxti

The Purpose of Child Support

Ira Mark Ellman, Tara Ellman
2006 Social Science Research Network  
The availability of such a template was important to the decision of an Arizona committee, appointed by the Arizona Supreme Court, to recommend changes in that state's guidelines consistent with the analysis  ...  from the IRS 2003 Statistics of Income Individual Tax File).  ... 
doi:10.2139/ssrn.926692 fatcat:6dyoigdrxbh5dn4zzbsam4oe7y

Consumer Law and Artificial Intelligence: Challenges to the EU Consumer Law and Policy Stemming from the Business' Use of Artificial Intelligence - Final report of the ARTSY project

Agnieszka Jabłonowska, Maciej Kuziemski, Anna Maria Nowak, Hans-W. Micklitz, Przemysław Pałka, Giovanni Sartor
2018 Social Science Research Network  
To do so, we argue, the legal reaction should be grounded in an empirical analysis and proceed case-by-case, bottom-up, as a series of responses to concrete research questions.  ...  In the third section, we repeat the analysis through the lens of four general "uses" of AI by businesses in various sectors: knowledge generation, automated decision making, advertising and other commercial  ...  exercise of rights conferred on workers in the context of freedom of movement for workers. 32 For an analysis from a perspective of the modern developments such as automated decision-making see: Barocas  ... 
doi:10.2139/ssrn.3228051 fatcat:nec3xmkusrbhtphuc6htbg2lf4

Cascading Network Failure in Power Grid Blackouts [chapter]

Dr.Ian Dobson
2014 Encyclopedia of Systems and Control  
The emerging risk analysis, simulation, and modeling of cascading blackouts are briefly surveyed, and key references are suggested.  ...  Cascading failure consists of complicated sequences of dependent failures and can cause large blackouts.  ...  There is an extensive complex networks literature on cascading in abstract networks that is largely motivated by idealized models of propagation of failures in the Internet.  ... 
doi:10.1007/978-1-4471-5102-9_264-1 fatcat:slhzrvsilfephprfzlkkccbyma

Brass Rings and Red-Headed Stepchildren: Protecting Active Criminal Informants

Michael Rich
2012 Social Science Research Network  
Denno, 378 U.S. 368, 376 (1964) ("It is now axiomatic that a defendant in a criminal case is deprived of due process of law if his conviction is founded, in whole or in part, upon an involuntary confession  ...  Cir. 1999) (rejecting a claim by an IRS informant for a monetary award on the ground that no contract arises from an indefinite award offer and informant conduct in response).186.  ...  the definition of "employee" in the relevant states to include informants whose services are provided in exchange for a promise of leniency from law enforcement. 355 to cooperate, and an adversarial  ... 
doi:10.2139/ssrn.1998787 fatcat:guj5rrwoknbxtkxn5nlkc3bhku

Caching Mechanism in Peer-to-Peer Networks through Active XML

Abdullah Alrefae, Eric Pardede, Binh Viet Phan
2012 Journal of Software  
Petri net systems synthesis can construct large systems without the requirement of reachability analysis so that it can reduce the high complexity of analyzing global system.  ...  In a synthesis process, such good properties of subsystems as liveness and deadlock-freeness etc, must be preserved in synthesized system.  ...  This work was supported in part by a grant from the Natural Science Foundation of Guangdong (101510631-01000046) and the National Science Foundation of China (60940033).  ... 
doi:10.4304/jsw.7.3.508-515 fatcat:6vlsijzaxjbohh3ti5toew7rmi

Beyond Tinkering: Economics after Behavioral Economics

Stephen E. Ellis, Grant M. Hayden
2005 Social Science Research Network  
In the case at hand, however, Orwell seems to have lost contact with his usual overall evaluation.  ...  ., Tversky & Kahneman, supra, at 298, 299-300, 302; Alain Chatteauneuf & Peter Wakker, An Axiomatization of Cumulative Prospect Theory for Decision Under Risk, 18 J.  ... 
doi:10.2139/ssrn.824405 fatcat:52myk4y4gnhplf2losflu2kkga

Smart design engineering: leveraging product design and development to exploit the benefits from the 4th industrial revolution

Marcus Vinicius Pereira Pessoa
2020 Design Science  
In this context, smart design engineering is here defined as a methodology used during the analysis and design of a product or a system, which can be composed by hardware, software and/or services, and  ...  These features were then analyzed against the 4th IR environment perspectives and core technologies, which led to understanding how they can be used to improve the PDDP.  ...  Features analysis against 4th IR trends and technologies The cross impact among the perspective affected by the IR as presented in Figure 1 shows that no single perspective can be analyzed individually  ... 
doi:10.1017/dsj.2020.24 fatcat:5fmgcoqns5gg7m2qjzsnii6nwe

Influence analysis: A survey of the state-of-the-art

Meng Han, Yingshu Li
2018 Mathematical Foundations of Computing  
Online social networks have seen an exponential growth in number of users and activities recently.  ...  First, we review the development process of influence analysis in social networks based on several basic conceptions and features in a social aspect. Then the online social networks are discussed.  ...  Therefore, influence analysis occupies an important place in social networks.  ... 
doi:10.3934/mfc.2018010 fatcat:n2vnokuivbbdjjuptgyzurhceu

Punishing Crimes of Terror in Article III Courts

Christina Parajon Skinner
2012 Social Science Research Network  
The Founders' hope for an "Enlightened" and "humane" "way of war" influenced the methods and purposes of military trial by commission in the years following the Revolution.'"  ...  furtherance of political or social objectives."  ... 
doi:10.2139/ssrn.2144529 fatcat:wplhgkia4ve57lilvvmqliomji

Ahead by a Century: Tim Edgar, Machine-Learning and the Future of Anti-Avoidance

Benjamin Alarie
2020 Social Science Research Network  
is currently regarded as tax avoidance in our current system of taxation is necessarily undesirable from a social welfare perspective.  ...  of the conventional methods of fact-finding, statutory interpretation, and legal analysis.  ...  They recommend going beyond that in order to finance a substantial expansion of US social programs.  ... 
doi:10.2139/ssrn.3607928 fatcat:bmuq2jyyc5er5m2gafupqlh2oq

Origins of the Internal Affairs Doctrine

Frederick Tung
2005 Social Science Research Network  
Happily, in any event, my analysis may have something for everyone.  ...  REV. 1461 (1989); see also Michael Klausner, Corporations, Corporate Law, and Networks of Contracts, 81 VA. L. REV. 757 (1995) (suggesting that network effects may impede race to the top); cf.  ...  Similarly, in 1897, the Supreme Court of Pennsylvania affirmed a dismissal of an action by shareholders of an electric utility company against the management for breach of fiduciary duty.  ... 
doi:10.2139/ssrn.686592 fatcat:kw33fdxbifauhikzlmtnzqcm6u
« Previous Showing results 1 — 15 out of 541 results