Atjaunināt sīkdatņu piekrišanu

E-grāmata: Social Computing, Behavioral-Cultural Modeling and Prediction: 6th International Conference, SBP 2013, Washington, DC, USA, April 2-5, 2013, Proceedings

Edited by , Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the proceedings of the 6th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, SBP 2013, held in Washington, DC, USA in April 2013. The total of 57 contributions, which consists of papers and posters, included in this volume was carefully reviewed and selected from 137 submissions. This conference is strongly committed to multidisciplinarity, consistent with recent trends in computational social science and related fields. The topics covered are: behavioral science, health sciences, military science and information science. There are also many papers that provide methodological innovation as well as new domain-specific findings.
Behavioral Science.- The Evolution of Paternal Care.- Parent Training
Resource Allocation Optimization Using an Agent-Based Model of Child
Maltreatment.- Influence and Power in Group Interactions.- The Marketcast
Method for Aggregating Prediction Market Forecasts.- Peer Nominations and Its
Relation to Interactions in a Computer Game.- Predicting People Personality
Using Novel Mobile Phone-Based Metrics.- Moral Values from Simple Game Play.-
An Agent-Based Model for Simultaneous Phone and SMS Traffic over Time.-
Reconstructing Online Behaviors by Effort Minimization.- Copping in Heroin
Markets: The Hidden Information Costs of Indirect Sales and Why They Matter.-
Cultural Polarization and the Role of Extremist Agents: A Simple Simulation
Model.- Using Imageability and Topic Chaining to Locate Metaphors in
Linguistic Corpora.- Automated Trading in Prediction Markets.- Health
Sciences.- Social Network Analysis of Peer Effects on Binge Drinking among
U.S.
Adolescents.- Feedback Dynamic between Emotional Reinforcement and Healthy
Eating: An Application of the Reciprocal Markov Model.- Testing the
Foundations of Quantal Response Equilibrium.- Discovering Consumer Health
Expressions from Consumer-Contributed Content.- Patient-Centered Information
Extraction for Effective Search on Healthcare Forum.- Controlling for
Population Variances in Health and Exposure Risk
Using Randomized Matrix Based Mathematical Modeling.- How Do E-Patients
Connect Online? A Study of Social Support Roles in Health Social Networking.-
Information Science.- Dynamic Stochastic Blockmodels: Statistical Models for
Time-Evolving Networks.- LA-LDA: A Limited Attention Topic Model for Social
Recommendation.- Graph Formation Effects on Social Welfare and Inequality in
a Networked Resource Game.- Recommendation in Reciprocal and Bipartite Social
NetworksA Case
Study of Online Dating.- In You We Follow: Determining the Group Leader in
Dialogue.- Pareto Distance for Multi-layer Network Analysis.-Formation of
Multiple Networks.- A Flexible Framework for Probabilistic Models of Social
Trust.- Coauthor Prediction for Junior Researchers.- Massive Media Event Data
Analysis to Assess World-Wide Political Conflict and Instability.-
Sparsification and Sampling of Networks for Collective Classification.- A
Comparative Study of Social Media and Traditional Polling in the Egyptian
Uprising of 2011.- Hashtag Lifespan and Social Networks during the London
Riots.- A Text Cube Approach to Human, Social and Cultural Behavior in the
Twitter Stream.- Mapping Cyber-Collective Action among Female Muslim Bloggers
for the Women to Drive Movement.- Discovering Patterns in Social Networks
with Graph Matching Algorithms.- Critiquing Text Analysis in Social Modeling:
Best Practices, Limitations, and New Frontiers.- Which Targets to Contact
First to Maximize Influence over Social Network.- Intruder or Welcome Friend:
Inferring Group Membership in Online Social Networks.- Identifying
Influential Twitter Users in the 2011 Egyptian Revolution.- Socio-Cultural
Opinion Evolution.- Who Shall We Follow in Twitter for Cyber Vulnerability?.-
Respondent-Driven Sampling in Online Social Networks.- Trade-Offs in Social
and Behavioral Modeling in Mobile Networks.- Privacy Protection in
Personalized Web Search: A Peer Group-Based Approach.- Detecting Anomalous
Behaviors Using Structural Properties of Social Networks.- Measuring User
Credibility in Social Media.- Financial Crisis, Omoris Law, and Negative
Entropy Flow.- Trust Metrics and Results for Social Media Analysis.-
Methodology.- Predicting Mobile Call Behavior via Subspace Methods.- Modeling
the Interaction between Emergency Communications and Behavior in the
Aftermath of a Disaster.- Modeling the Dynamics of Dengue Fever.- Improving
Markov Chain Monte Carlo Estimation with Agent-Based Models.- Military
Science.- Geographic Profiling of Criminal Groups for Military Cordon and
Search.- Exploiting User Model Diversity in ForecastAggregation.- Risk-Based
Models of Attacker Behavior in Cybersecurity.