31![Accelerating Cross-Project Knowledge Collaboration Using Collaborative Filtering and Social Networks Masao Ohira Naoki Ohsugi Tetsuya Ohoka Ken-ichi Matsumoto {masao, naoki-o, tetsuy-o, matumoto} @ is.naist.jp Software E Accelerating Cross-Project Knowledge Collaboration Using Collaborative Filtering and Social Networks Masao Ohira Naoki Ohsugi Tetsuya Ohoka Ken-ichi Matsumoto {masao, naoki-o, tetsuy-o, matumoto} @ is.naist.jp Software E](https://www.pdfsearch.io/img/9028f7607cbf61f2673699e0b62c3e1a.jpg) | Add to Reading ListSource URL: 2005.msrconf.orgLanguage: English - Date: 2005-08-17 16:08:30
|
---|
32![Disentangling Social Capital Lab-in-the-Field Evidence on Coordination, Networks and Cooperation Sandra Polania Reyes University College London1 Job Market paper This version: October 30th, 2015 Disentangling Social Capital Lab-in-the-Field Evidence on Coordination, Networks and Cooperation Sandra Polania Reyes University College London1 Job Market paper This version: October 30th, 2015](https://www.pdfsearch.io/img/cc7b0134075904664441c44e7e8a7116.jpg) | Add to Reading ListSource URL: www.ucl.ac.ukLanguage: English - Date: 2018-04-13 12:47:20
|
---|
33![Information Systems Frontiers 7:4/5, 337–358, 2005 C 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. Propagation Models for Trust and Distrust in Social Networks Cai-Nicolas Ziegler and Information Systems Frontiers 7:4/5, 337–358, 2005 C 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. Propagation Models for Trust and Distrust in Social Networks Cai-Nicolas Ziegler and](https://www.pdfsearch.io/img/99943dcd52afbe9766a4258d6204ab8f.jpg) | Add to Reading ListSource URL: www2.informatik.uni-freiburg.deLanguage: English - Date: 2005-12-12 17:25:36
|
---|
34![Estimating the Clustering Coefficient of a Social Network by a Non-Backtracking Random Walk Kenta Iwasaki, and Kazuyuki Shudo Tokyo Institute of Technology Abstract—The clustering coefficient of social networks can be Estimating the Clustering Coefficient of a Social Network by a Non-Backtracking Random Walk Kenta Iwasaki, and Kazuyuki Shudo Tokyo Institute of Technology Abstract—The clustering coefficient of social networks can be](https://www.pdfsearch.io/img/c15874525a73cce826711c7075d7267c.jpg) | Add to Reading ListSource URL: www.shudo.netLanguage: English - Date: 2018-06-01 08:44:44
|
---|
35![Resilience and Cascading Failures in Large-Scale Networks Wilbert Samuel Rossi1 Giacomo Como2 Abstract— Many cascading phenomena in social, economic Resilience and Cascading Failures in Large-Scale Networks Wilbert Samuel Rossi1 Giacomo Como2 Abstract— Many cascading phenomena in social, economic](https://www.pdfsearch.io/img/97efa37f8d0fd3dfaa693767024778ad.jpg) | Add to Reading ListSource URL: wwwhome.ewi.utwente.nlLanguage: English - Date: 2014-05-10 16:29:31
|
---|
36![Networks of collaboration and field emergence in ‘Internet Studies’ Thesis submitted in partial fulfilment of the requirement for the degree of MSc in Social Science of the Internet Networks of collaboration and field emergence in ‘Internet Studies’ Thesis submitted in partial fulfilment of the requirement for the degree of MSc in Social Science of the Internet](https://www.pdfsearch.io/img/2b6c154867c07cb28ea49c3362d1ea29.jpg) | Add to Reading ListSource URL: mominmalik.comLanguage: English - Date: 2016-06-03 23:05:44
|
---|
37![](/pdf-icon.png) | Add to Reading ListSource URL: daveowhite.comLanguage: English - Date: 2018-02-20 09:19:53
|
---|
38![2013 IEEE Symposium on Security and Privacy SoK: The Evolution of Sybil Defense via Social Networks Lorenzo Alvisi UT Austin 2013 IEEE Symposium on Security and Privacy SoK: The Evolution of Sybil Defense via Social Networks Lorenzo Alvisi UT Austin](https://www.pdfsearch.io/img/4944e116824598929a55aee5465a33f6.jpg) | Add to Reading ListSource URL: oaklandsok.github.ioLanguage: English - Date: 2018-03-14 15:33:55
|
---|
39![All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin Kirda EURECOM Sophia Antipolis, France All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin Kirda EURECOM Sophia Antipolis, France](https://www.pdfsearch.io/img/738b4879fdfb3d959d9cfb6a4cba7dbd.jpg) | Add to Reading ListSource URL: seclab.ccs.neu.eduLanguage: English - Date: 2018-08-14 16:50:48
|
---|
40![MEDIA CONTACT: Carin Campbell Smith, or Gisele Galoustian, Just Like Humans, Dolphins Have Social Networks MEDIA CONTACT: Carin Campbell Smith, or Gisele Galoustian, Just Like Humans, Dolphins Have Social Networks](https://www.pdfsearch.io/img/b0ccb2d37f8945c608bea0b0a7a99ce2.jpg) | Add to Reading ListSource URL: fau.eduLanguage: English - Date: 2015-05-05 09:14:25
|
---|