نتایج جستجو برای: friends
تعداد نتایج: 24957 فیلتر نتایج به سال:
Measuring privacy risk in online social networks is a challenging task. One of the fundamental difficulties is quantifying the amount of information revealed unintentionally. We present PrivAware, a tool to detect and report unintended information loss in online social networks. Our goal is to provide a rudimentary framework to identify privacy risk and provide solutions to reduce information l...
We seed a large real-world social network with binary information and analyze subsequent social learning. A unique feature of our field experiment is that we measure both the pre-existing social networks and the actual conversation network. Our experiment allows us to test how rational agents behave when processing information that originates within their social network. We find that informatio...
Red foxes that have been selected since 1959 for tameness to humans show some of the sociocognitive abilities of domestic dogs, raising questions for theories of the evolution of cognition.
The f0(1500) is identified in three glueball favoured production mechanisms: pp̄ annihilation, ψ → γf0 and Central Production. The production rate for glueballs in ψ → γG has been quantified and the f0(1500) is found to be consistent with a glueball qq̄ mixture. We illustrate a remarkable property of central production where kinematic cuts appear to make a systematic separation between glueballs ...
There has been increasing interest in intuitionistic methods over the years. Still, there has been relatively little work on intuitionistic set theory, and most of that has been on intuitionistic ZF. This investigation is about intuitionistic admissibility and theories of similar strength. There are several more particular goals for this paper. One is just to get some more Kripke models of vari...
Undesired mail, such as commercials, is called spam in mail services. Spit is what spam is for mail services, unsolicited communications. The difference in spit and spam is that spam can be checked before the delivery to the recipient and spit can be reliably detected only after the call is made. Voice over IP (VoIP) community has adopted a more peer-to-peer approach, in which the registrars an...
BioInformatics Pipeline Alternative Splicing Services (BIPASS) offer support to scientists interested in gathering information related to alternative splicing (AS) events. The service BIPAS–SpliceDB provides access to AS information that has been extracted a priori from various public databases and stored in a data warehouse. In contrast, the BIPAS– Align&Splice service allows scientists to sub...
The identification and recruitment of trustworthy partners represents an important adaptive challenge for any species that relies heavily on cooperation [1, 2]. From an evolutionary perspective, trust is difficult to account for as it involves, by definition, a risk of non-reciprocation and defection by cheaters [3, 4]. One solution for this problem is to form close emotional bonds, i.e., frien...
Pseudotype viruses: applications and troubleshooting’ (EuroSciCon 2013), a 1-day conference held at Cineworld: The O2 (London, UK) on 2 October 2013, focused on the technique of pseudotyping enveloped viruses (for a review of the technique, see [1]). The talks and posters covered the challenges and successes of pseudotyping viruses from a broad range of families (Retroviridae, Flaviviridae, Ort...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید