Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Online social networks 295
- Social networks 177
- Social media 139
- Internet marketing 117
- Social aspects 86
- Management 72
- Internet 68
- Data mining 66
- Economic aspects 62
- Computer networks 58
- Computer network resources 56
- Application software 54
- Facebook (Electronic resource) 54
- Marketing 54
- Engineering & Applied Sciences 53
- Development 50
- Security measures 48
- Computer security 46
- Data processing 44
- Social Sciences 42
- Business networks 41
- Design 39
- Web sites 39
- Information technology 38
- History 37
- Social Change 35
- Sociology & Social History 34
- Twitter 34
- Technological innovations 33
- Electrical & Computer Engineering 32
-
1481por Al-Turjman, FadiTabla de Contenidos: “…-- 2.5 Blockchain with artificial intelligence: challenges, opportunities, and solutions for the 6G internet of things -- 2.6 Discussion -- 2.7 Conclusion -- References -- 3 A simple online payment system using blockchain technology -- 3.1 Introduction -- 3.1.1 Objectives -- 3.2 Research and design -- 3.2.1 Blockchain technology and its application on online payment systems -- 3.2.2 Designing the architecture of the online payment system -- 3.2.3 Integration of the Metamask API into the online payment system using Python -- 3.2.4 User interface design of the proposed system -- 3.3 Conclusions -- References -- 4 Efficient spam email classification logistic regression model trained by modified social network search algorithm -- 4.1 Introduction -- 4.2 Background and literature review -- 4.2.1 Logistic regression -- 4.2.2 Metaheuristic optimization -- 4.3 Proposed hybrid metaheuristics -- 4.3.1 Introduced social network search algorithm -- 4.3.2 Novel initialization scheme…”
Publicado 2024
Libro electrónico -
1482Publicado 2017Tabla de Contenidos: “…Sociometry, sociodrama and other action methods -- 6. Social Network Analysis -- Network leadership -- 7. Creative Problem Solving -- The price of conformity -- Innovation leadership: nine critical functions -- 8. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1483por Guhlich, AnnaTabla de Contenidos: “…3.3.5 The role of the family and social networks -- 3.4 Summary and research desiderata -- 4 Biographical approaches to migration and social mobility -- 4.1 Biographical approaches -- 4.1.1 Historical and theoretical background of the biographicalapproach -- 4.1.2 The central biographical concepts -- 4.2 Biographical approaches to migration -- 4.2.1 First approaches to migration from a biographical perspective -- 4.2.2 Links between the transnational and biographical approach -- 4.3 Shifting social positions in transnational spaces -- 4.3.1 Theorising social mobility in transnational spaces -- 4.3.2 The transferability of skills across borders -- 4.3.3 Translocational positionality -- 4.3.4 Making sense of one's own class positioning -- 4.4 Summary: biographical approaches to migration and social mobility -- 5 The research process -- 5.1 Telling the stories: the theoretical background behind the "biographical narrative interview" -- 5.1.1 Theoretical assumptions -- 5.1.2 The focus on storytelling -- 5.1.3 The autobiographical presentation -- 5.1.4 Narrative constraints -- 5.1.5 Cognitive figures of autobiographical presentation -- 5.2 The reflexive research process -- 5.3 Constructing the sample -- 5.4 Interview settings -- 5.5 The interview process -- 5.6 A brief summary of interviewees -- 5.7 Ethnographical notes -- 5.8 Transcription -- 5.9 Analysis -- 5.9.1 Formal analysis of the text -- 5.9.2 Structural description -- 5.9.3 Analytical abstraction and the construction of types -- 5.10 Reflections on the research process -- 5.10.1 Reflections on the research process in transnational settings -- 5.10.2 The role of language and translation in the research process -- 5.10.3 Being part of it: reflections on my own position within thefield -- 6 Biographies -- 6.1 Background: the Czech educational system…”
Publicado 2017
Libro electrónico -
1484Publicado 2016Tabla de Contenidos: “…THE EASY AND VERY EFFECTIVE METHODS -- Hiding the Evidence -- Whole Device Encryption -- Data Wiping -- Physical Destruction -- THE BEST METHODS AREN'T THE MOST COMMONLY USED METHODS -- ANOTHER SIMPLE METHOD -- FILE SIGNATURE MANIPULATION -- TIME STAMP MODIFICATIONS -- DECOY STORAGE DEVICES -- PORTABLE APPS -- HIDDEN OPERATING SYSTEMS -- VIRTUAL MACHINES -- PLANNING AGAINST ANTIFORENSICS -- FINDING COMMUNICATION RECORDS ON HARD DRIVES -- Locked Computers -- Mobile Devices -- WHEN ALL ELSE FAILS OR IS LIKELY TO FAIL -- SUMMARY -- REFERENCES -- 8 - Electronic Intercepts -- INTRODUCTION -- VALUE OF ELECTRONICALLY INTERCEPTED COMMUNICATIONS -- AUTHORITY AND NECESSITY -- TECHNOLOGY -- Capture Communications at the Source -- Capture Communications at the Receiver -- Trap and Trace/Pen Registers/Dialed Number Recorders -- Wiretaps -- Internet -- TECHNICAL BARRIERS -- FINDING CELL PHONE NUMBERS -- SUMMARY -- REFERENCES -- 9 - Digital Identity -- INTRODUCTION -- IDENTITY -- Biometric Identity -- Digital Identity -- FINDING THE DIGITAL IDENTITY -- First Things First -- Dark Web -- Third-Party Providers -- SUMMARY -- REFERENCES -- 10 - Putting It All Together -- INTRODUCTION -- COLLECTING REAL-TIME COMMUNICATIONS -- Online Communications -- Electronic Intercepts -- COLLECTING HISTORICAL COMMUNICATIONS -- Online Historical Information -- Government Access Resources -- From Seized Electronic Devices -- TURNING INFORMATION INTO INTELLIGENCE -- Link and Social Networking Analysis -- THE (VIRTUALLY) IMPOSSIBLE -- Cryptography and Steganography -- Software Applications -- Tor and Anonymous Chat -- Devices -- NON-TECH COMMUNICATIONS -- PUTTING THE CASE TOGETHER -- Associations and Relationships Analysis -- SUMMARY -- REFERENCES -- 11 - Closing Thoughts -- INTRODUCTION -- PRIVACY EXPECTATIONS -- LEGAL AND TECHNICAL CONSIDERATIONS -- Legal Considerations…”
Libro electrónico -
1485Publicado 2024Tabla de Contenidos: “…Chapter 4: Organizational learning theories and technology -- Introduction -- Learning organizations -- Communities of practice -- Learning preferences and experiential learning -- Social discourse and the use of language -- Identity -- Skills -- Emotion -- Linear development in learning approaches -- Chapter 5: Managing organizational learning and technology -- The role of line management -- Line managers -- First-line managers -- Supervisor -- Management vectors -- Knowledge management -- Change management -- Change management for IT organizations -- Social networks and information technology -- Chapter 6: Digital technology platforms and the future of work -- Introduction -- Process barriers -- Data-centric mindsets and organizational resilience in data platform companies -- Understanding organizational resilience's relationship to data platforms -- Data platform architecture and resilience -- Proliferation of data platforms -- Data platforms and leadership -- Product leadership -- Data platform executive leadership -- Intrapreneurism versus entrepreneurism -- Vision versus reason -- Steering and build-measure-learn -- Accelerate -- Common leadership strategies -- Intrapreneurial leadership considerations based on types of data platforms -- Summary -- Chapter 7: Virtual teams and outsourcing -- Introduction -- Status of virtual teams -- Management considerations -- Dealing with multiple locations -- Externalization -- Internalization -- Combination -- Socialization -- Externalization dynamism -- Internalization dynamism -- Combination dynamism -- Socialization dynamism -- Dealing with multiple locations and outsourcing -- Revisiting social discourse -- Identity -- Skills -- Emotion -- Chapter 8: Organizational learning, IT, and technology disruptions -- Introduction -- Siemens AG -- Aftermath -- ICAP -- Five years later -- General Electric (GE)…”
Libro electrónico -
1486por Sanders, Chris, 1986-Tabla de Contenidos: “…Protocol Hierarchy Statistics -- Name Resolution -- Enabling Name Resolution -- Potential Drawbacks to Name Resolution -- Protocol Dissection -- Changing the Dissector -- Viewing Dissector Source Code -- Following TCP Streams -- Packet Lengths -- Graphing -- Viewing IO Graphs -- Round-Trip Time Graphing -- Flow Graphing -- Expert Information -- 6: Common Lower-Layer Protocols -- Address Resolution Protocol -- The ARP Header -- Packet 1: ARP Request -- Packet 2: ARP Response -- Gratuitous ARP -- Internet Protocol -- IP Addresses -- The IPv4 Header -- Time to Live -- IP Fragmentation -- Transmission Control Protocol -- The TCP Header -- TCP Ports -- The TCP Three-Way Handshake -- TCP Teardown -- TCP Resets -- User Datagram Protocol -- The UDP Header -- Internet Control Message Protocol -- The ICMP Header -- ICMP Types and Messages -- Echo Requests and Responses -- Traceroute -- 7: Common Upper-Layer Protocols -- Dynamic Host Configuration Protocol -- The DHCP Packet Structure -- The DHCP Renewal Process -- DHCP In-Lease Renewal -- DHCP Options and Message Types -- Domain Name System -- The DNS Packet Structure -- A Simple DNS Query -- DNS Question Types -- DNS Recursion -- DNS Zone Transfers -- Hypertext Transfer Protocol -- Browsing with HTTP -- Posting Data with HTTP -- Final Thoughts -- 8: Basic Real-World Scenarios -- Social Networking at the Packet Level -- Capturing Twitter Traffic -- Capturing Facebook Traffic -- Comparing Twitter vs. …”
Publicado 2011
Libro electrónico -
1487Publicado 2017Tabla de Contenidos: “…-- List of Figures xi -- List of Tables xvii -- Foreword xix -- Preface xxi -- Acknowledgments xxiii -- List of Abbreviations xxv -- About the CompanionWebsite xxvii -- 1 Introduction 1 -- 1.1 The Rise of Cyber-Physical Systems 1 -- 1.2 Humans as Elements of Cyber-Physical Systems 4 -- 1.3 Objectives and Structure 7 -- Part I Evolution and Theory 9 -- 2 Evolution of HiTL Technologies 11 -- 2.1 "Things", Sensors, and the RealWorld 11 -- 2.2 Human Sensing and Virtual Communities 17 -- 2.3 In Summary... 23 -- 3 TheoryofHiTLCPSs 25 -- 3.1 Taxonomies for HiTLCPSs 25 -- 3.2 Data Acquisition 28 -- 3.2.1 Humans as Sets of Sensors 28 -- 3.2.2 Humans as Communication Nodes 29 -- 3.3 State Inference 30 -- 3.3.1 Human Nature 30 -- 3.3.2 Humans as Processing Nodes 31 -- 3.4 Actuation 31 -- 3.4.1 Humans and Robots as Actuators 31 -- 3.5 In Summary... 32 -- 4 HITL Technologies and Applications 35 -- 4.1 Technologies for Supporting HiTLCPS 35 -- 4.1.1 Data Acquisition 35 -- 4.1.2 State Inference 39 -- 4.1.3 Actuation 42 -- 4.2 Experimental Projects 45 -- 4.2.1 HiTL in Industry and at Home 46 -- 4.2.2 HiTL in Healthcare 48 -- 4.2.3 HiTL in Smartphones and Social Networking 51 -- 4.3 In Summary... 56 -- Part II Human-in-the-Loop: Hands-On 57 -- 5 ASampleApp 59 -- 5.1 A Sample Behavior Change Intervention App 59 -- 5.2 The Sample App's Base Architecture 60 -- 5.2.1 The Android App 60 -- 5.2.2 The Server 65 -- 5.3 Enhancing the Sample App with HiTL Emotion-awareness 66 -- 5.3.1 Choosing a Machine Learning Technique 67 -- 5.3.2 Implementing Emotion-awareness 68 -- 5.4 In Summary... 71 -- 6 Setting up the Development Environment 73 -- 6.1 Installing Android Studio 73 -- 6.2 Cloning the Android Project 77 -- 6.3 Deploying the Server 85 -- 6.3.1 Installing the Software and Cloning the Server's Project 85 -- 6.3.2 Obtaining a Foursquare(R)'s Client ID and Client Secret 88 -- 6.3.3 Setting up the Database 91 -- 6.3.4 Deploying the Server on Tomcat 7 95 -- 6.4 Testing the Sample App 99 -- 6.5 In Summary... 101.…”
Libro electrónico -
1488Publicado 2009Tabla de Contenidos: “…-- CHAPTER 2: The Project Ecosystem -- Identify the Type of Site -- Brand Presence -- Marketing Campaign -- Content Source -- Task-Based Applications -- E-Commerce Sites -- E-Learning Applications -- Social Networking Applications -- Choose Your Hats -- Information Architect -- Interaction Designer -- User Researcher -- Other Roles You May Play or May Need -- Building a Network of User Advocacy -- Understand the Company Culture -- History -- Hierarchy -- Logistics -- Pulling It Together -- CHAPTER 3: Proposals for Consultants and Freelancers -- Proposals -- Creating the Proposal -- Title Page -- Revision History -- Project Overview -- Project Approach -- Scope of Work -- Assumptions -- Deliverables -- Ownership and Rights -- Additional Costs and Fees -- Project Pricing -- Payment Schedule -- Acknowledgment and Sign-Off -- Statements of Work -- CHAPTER 4: Project Objectives and Approach -- Solidify Project Objectives -- How Can a UX Designer Help? …”
Libro electrónico -
1489Publicado 2014Tabla de Contenidos: “…Use Case Example - Recommendations -- Recommender systems dissected -- Using a graph model for recommendations -- Specific query examples for recommendations -- Recommendations based on product purchases -- Recommendations based on brand loyalty -- Recommendations based on social ties -- Bringing it all together - compound recommendations -- Business variations on recommendations -- Fraud detection systems -- Access control systems -- Social networking systems -- Questions and answers -- Summary -- 7. …”
Libro electrónico -
1490Publicado 2012Tabla de Contenidos: “…Columnar Databases -- SQL Accelerators -- Early Adoption Challenges and Benefits -- Architectural Trends for Enterprise Integration -- Concluding Remarks -- References -- Authors -- Chapter 6: Enterprise Mobility Adoption Strategy -- Introduction to Enterprise Mobility -- Need for an Enterprise Mobility Roadmap -- Defining Enterprise Mobility Adoption Strategy -- Business Needs Mobility Roadmap -- Multi Platform Support -- Leverage Mobile Capabilities -- Right Partner -- Technology Options Application Type -- COTS vs Custom Development -- Deployment -- Mandatory Capabilities Smooth Integration -- Comprehensive Security -- Well Designed UI -- Functionalities -- Robust Solutions System Scalability -- Device Diversity Testing -- Network Optimization -- On Demand Scaling -- Major Influencers from Emerging Trends -- Concluding Remarks -- References -- Authors -- Chapter 7: Web as a Platform Patterns and Practices -- Cloud Computing - the Web Platform Enabler -- Internet Integration -- VPN based Integration -- Controlled Integration with Gateways -- A well thought out service Design -- Identity Management and Access Control -- A Business-To-Business scenario -- Social Network scenario -- Data Security -- Encryption during transfer -- Encryption at rest -- Backend data integration -- Business Intelligence -- (Complement in-house BI with web based BI platforms) -- Conclusion -- References -- Authors -- Chapter 8: Self-Management - The Defining Attribute of Next-Gen Architectures -- Self-management - Characteristics and Approaches -- Architecture of self-managing systems -- Component Monitoring and Control -- Component Configuration Management -- Autonomic Goal and Policy Management -- Self-managing Systems - Current State and Emerging Trends -- Conclusion -- References -- Authors -- Chapter 9: Applying Virtualization Concepts in Enterprise IT -- Introduction…”
Libro electrónico -
1491Publicado 2019Tabla de Contenidos: “….-- p. 129-142. Widening social networks through education in leisure time / Eter Koverova. -- p. 143-154. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto)Libro -
1492Publicado 2017“…What You Will Learn Acquire, format and visualize your data using R Using R to perform an Exploratory data analysis Introduction to machine learning algorithms such as classification and regression Get started with social network analysis Generate dynamic reporting with Shiny Get started with geospatial analysis Handling large data with R using Spark and MongoDB Build Recommendation system- Collaborative Filtering, Content based and Hybrid Learn real world dataset examples- Fraud Detection and Image Recognition In Detail Data analytics with R has emerged as a very important focus for organizations of all kinds. …”
Libro electrónico -
1493Publicado 2025Tabla de Contenidos: “…-- 1.3 Artificial and social networks -- 1.3.1 Network theory -- 1.3.2 Network analysis -- 1.4 Scholarly investigation into social network intelligence -- 1.5 AI as it is portrayed in the media -- 1.5.1 2013: AlexNet and variational autoencoders -- 1.5.2 In 2018 -- 1.5.3 Last three year's review -- 1.6 Latest developments in AI -- 1.6.1 Computer vision -- 1.6.2 Features of computer vision -- 1.6.3 AI in education -- 1.6.4 AI-optimized hardware -- 1.7 Definition of artificial superintelligence (ASI) -- 1.7.1 The state of artificial intelligence at the moment -- 1.8 The future of digital communications using AI -- 1.9 The benefits of AI-powered automation for digital communication -- 1.9.1 Increased efficiency -- 1.9.2 Improved accuracy -- 1.9.3 Enhanced personalization -- 1.9.4 Increased security -- 1.10 How does AI impact digital communications? …”
Libro electrónico -
1494Publicado 2017Tabla de Contenidos: “…Community: Size and Type of Audience -- Content: Format and Type -- Channel: Social Networks and Sites -- Credibility: Topical Relevancy -- Chemistry: Brand-Influencer Fit -- Controversy: Lack of Resonance and Transparency -- Employee Advocacy -- Employees Are the Most Credible Voices in Your Organization -- Employee Advocacy Drives Sales -- Who Is Doing Employee Advocacy Right? …”
Libro electrónico -
1495Publicado 2013Tabla de Contenidos: “…-- IDEA #55: How social networks share knowledge -- IDEA #56: I'm in charge - check my paycheque -- IDEA #57: Great performance, but I regress -- IDEA #58: A bird in the hand is worth two in the bush -- IDEA #59: The hidden evil of stereotype threats -- IDEA #60: How to turn that black swan white -- IDEA #61: Kick the habit -- IDEA #62: The biology of risk-taking -- IDEA #63: Do you have a Pareto or a long tail? …”
Libro electrónico -
1496Publicado 2017Tabla de Contenidos: “…-- Connecting to social network platforms without OAuth -- OAuth1 and OAuth2 -- Practical usage of OAuth -- Parsing API outputs -- Twitter -- Creating application -- Selecting the endpoint -- Using requests to connect -- Facebook -- Creating an app and getting an access token -- Selecting the endpoint -- Connect to the API -- GitHub -- Obtaining OAuth tokens programmatically -- Selecting the endpoint -- Connecting to the API -- YouTube -- Creating an application and obtaining an access token programmatically -- Selecting the endpoint -- Connecting to the API -- Pinterest -- Creating an application…”
Libro electrónico -
1497Publicado 2010Tabla de Contenidos: “…Determining Data to Send to the Server -- Accessing Phone Status Information -- Uploading Data to a Remote Application Server -- Summary -- Q&A -- Workshop -- HOUR 17: Adding Social Features -- Enhancing Your Application with Social Features -- Adding Friend Support to Your Application -- Integrating with Social Networking Services -- Summary -- Q&A -- Workshop -- HOUR 18: Creating a Home Screen App Widget -- Designing an App Widget -- Handling App Widget User Events -- Working with Widget Background Operations -- Summary -- Q&A -- Workshop -- Part IV: Adding Polish to Your Android Application -- HOUR 19: Internationalizing Your Application -- General Internationalization Principles -- How Android Localization Works -- Android Internationalization Strategies -- Using Localization Utilities -- Summary -- Q&A -- Workshop -- HOUR 20: Developing for Different Devices -- Configuration Management for Android -- Summary -- Q&A -- Workshop -- HOUR 21: Diving Deeper into Android -- Exploring More Core Android Features -- Designing Advanced User Interfaces -- Working with Multimedia -- Working with 2D and 3D Graphics -- Personalizing Android Devices -- Managing and Sharing Data -- Accessing Underlying Device Hardware -- Summary -- Q&A -- Workshop -- HOUR 22: Testing Android Applications -- Testing Best Practices -- Maximizing Test Coverage -- Summary -- Q&A -- Workshop -- Part V: Publishing Your Application -- HOUR 23: Getting Ready to Publish -- Understanding the Release Process -- Preparing the Release Candidate Build -- Testing the Application Release Candidate -- Packaging and Signing an Application -- Testing the Signed Application Package -- Summary -- Q&A -- Workshop -- HOUR 24: Publishing on the Android Market -- Selling on the Android Market -- Exploring Other Android Publishing Options -- Summary -- Q&A -- Workshop -- Part VI: Appendixes…”
Libro electrónico -
1498Publicado 2012Tabla de Contenidos: “…-- Conclusion -- Chapter 9: Attack Characterization Techniques -- Postincident Characterization -- Another Tall Tale -- Discovery -- Malware -- Aftermath -- Real-World Tactics -- Engaging an Active Threat -- Traffic, Targets, and Taxonomy -- Aftermath -- Conclusion -- Chapter 10: Attack Attribution -- A Brief Note About Levels of Information Present in Objects -- Profiling Vectors -- Time -- Motivations -- Social Networks -- Skill Level -- Vector Summary -- Strategic Application of Profiling Techniques -- Example Study: The Changing Social Structure of the Hacking Community -- Micro- and Macro-Level Analyses -- The Rise of the Civilian Cyber Warrior -- The Balance of Power -- Potential Civilian Cyber Warrior Threats -- Conclusion -- References -- Chapter 11: The Value of APTs -- Espionage -- Costs of Cyber Espionage -- Value Network Analysis -- APTs and Value Networks -- The RSA Case…”
Libro electrónico -
1499Publicado 2023Tabla de Contenidos: “…-- References -- Chapter 2 The Job Interview-It's Tougher for Women -- References -- Chapter 3 Working from Home Is Great-But It May Hurt Your Career -- References -- Chapter 4 Social Skills Are Worth More Now Than 10 Years Ago-Much More -- References -- Chapter 5 Fifty Percent of People Find a New Job Through Their Social Networks-Weak Connections Matter More Than Strong Ones -- References -- Chapter 6 When Finding a New Job, Rigidly Structuring Your Day Is a Power Move -- References -- Chapter 7 Better "Zappa" Than "Adams"-Why Coming Later Alphabetically Gives You an Unfair Advantage -- References -- Chapter 8 Job Hunting and Patience -- References -- Part II Behavioral Economics for Hiring and Retaining Talent -- Chapter 9 Startups with a Larger Share of Women Last Longer -- References -- Chapter 10 The Unintended Positive Side Effects of Employee Referral Programs -- References -- Chapter 11 Managers Make Systematic Hiring Mistakes-Machines Can Help -- References -- Chapter 12 Why Employers Prefer Employees Who Don't Job Hop -- References -- Chapter 13 Look for Candidates Who Demonstrate Patience and Long-Term Thinking -- References -- Chapter 14 Unintended Negative Consequences of Salary Transparency -- References -- Part III Behavioral Economics for Managers: Teamwork, Motivation, and Productivity -- Chapter 15 Prejudiced Managers Hurt Employee Productivity-More by Neglect and Lack of Engagement Than Active Discrimination -- References -- Chapter 16 When It's Hot Outside, People Are More Risk Averse and Make Worse Decisions -- References…”
Libro electrónico -
1500por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Educational attainment among younger and older adults of working age -- Social connections -- Figure 2.28. Perceived social network support -- Box 2.7. Measuring social connections -- The distribution of social connections -- Figure 2.29. …”
Publicado 2015
Libro electrónico