نتایج جستجو برای: friends

تعداد نتایج: 24957  

2009
Justin Becker Hao Chen

Measuring privacy risk in online social networks is a challenging task. One of the fundamental difficulties is quantifying the amount of information revealed unintentionally. We present PrivAware, a tool to detect and report unintended information loss in online social networks. Our goal is to provide a rudimentary framework to identify privacy risk and provide solutions to reduce information l...

2010
Markus M. Möbius Tuan Phan Adam Szeidl Abhijit Banerjee Ben Golub

We seed a large real-world social network with binary information and analyze subsequent social learning. A unique feature of our field experiment is that we measure both the pre-existing social networks and the actual conversation network. Our experiment allows us to test how rational agents behave when processing information that originates within their social network. We find that informatio...

Journal: :Current Biology 2005
Richard W. Byrne

Red foxes that have been selected since 1959 for tameness to humans show some of the sociocognitive abilities of domestic dogs, raising questions for theories of the evolution of cognition.

1997
Frank E. Close

The f0(1500) is identified in three glueball favoured production mechanisms: pp̄ annihilation, ψ → γf0 and Central Production. The production rate for glueballs in ψ → γG has been quantified and the f0(1500) is found to be consistent with a glueball qq̄ mixture. We illustrate a remarkable property of central production where kinematic cuts appear to make a systematic separation between glueballs ...

Journal: :J. Symb. Log. 2002
Robert S. Lubarsky

There has been increasing interest in intuitionistic methods over the years. Still, there has been relatively little work on intuitionistic set theory, and most of that has been on intuitionistic ZF. This investigation is about intuitionistic admissibility and theories of similar strength. There are several more particular goals for this paper. One is just to get some more Kripke models of vari...

2010
Samu Varjonen Andrei Gurtov

Undesired mail, such as commercials, is called spam in mail services. Spit is what spam is for mail services, unsolicited communications. The difference in spit and spam is that spam can be checked before the delivery to the recipient and spit can be reliably detected only after the call is made. Voice over IP (VoIP) community has adopted a more peer-to-peer approach, in which the registrars an...

Journal: :Environmental Health Perspectives 1996
J Barrett

BioInformatics Pipeline Alternative Splicing Services (BIPASS) offer support to scientists interested in gathering information related to alternative splicing (AS) events. The service BIPAS–SpliceDB provides access to AS information that has been extracted a priori from various public databases and stored in a data warehouse. In contrast, the BIPAS– Align&Splice service allows scientists to sub...

Journal: :Current Biology 2016
Jan M. Engelmann Esther Herrmann

The identification and recruitment of trustworthy partners represents an important adaptive challenge for any species that relies heavily on cooperation [1, 2]. From an evolutionary perspective, trust is difficult to account for as it involves, by definition, a risk of non-reciprocation and defection by cheaters [3, 4]. One solution for this problem is to form close emotional bonds, i.e., frien...

Journal: :Future microbiology 2014
Barnabas King Janet Daly

Pseudotype viruses: applications and troubleshooting’ (EuroSciCon 2013), a 1-day conference held at Cineworld: The O2 (London, UK) on 2 October 2013, focused on the technique of pseudotyping enveloped viruses (for a review of the technique, see [1]). The talks and posters covered the challenges and successes of pseudotyping viruses from a broad range of families (Retroviridae, Flaviviridae, Ort...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید