نتایج جستجو برای: friend

تعداد نتایج: 11710  

2010
Michael Chau

Web 2.0 and social network applications have become increasingly popular. It is important for these applications to help users in maintaining their social networks by providing functions on friend suggestion and friend browsing. However, little study in this area has been reported in the literature. This paper proposes the design of two modules for friend suggestion and friend browsing. The fir...

2009

Donath et al. (2004) discuss social networking display as a whole, and its characteristic functions, affordances and constraints when existing in online environment. Focusing on the connections displayed as an integrated part of individual’s self-descriptive profiles, the authors analyze the psychology of establishing and managing one’s social networks within the framework of signaling theory. ...

Journal: :Journal of virology 2001
N Iwanami A Niwa Y Yasutomi N Tabata M Miyazawa

We have previously shown that immunization with a synthetic peptide that contains a single CD4(+) T-cell epitope protects mice against immunosuppressive Friend retrovirus infection. Cells producing infectious Friend virus were rapidly eliminated from the spleens of mice that had been immunized with the single-epitope peptide. However, actual effector mechanisms induced through T-helper-cell res...

Journal: :The Journal of Experimental Medicine 1980
F Plata M M Goodenow F Lilly

The HFL/b tumor cell line, induced by Friend erythroleukemia virus in BALB.B mice, was used to study the relation between virus production or nonproduction and the antigens recognized by Friend virus-specific cytolytic T lymphocytes (CTL). Analysis of clones and subclones of these tumor cells revealed a high degree of heterogeneity with respect to the production and release into culture fluids ...

2013
Mingsheng Tang Xinjun Mao Zahia Guessoum Huiping Zhou

To research rumor diffusion in social friend network, based on interests, a dynamic friend network is proposed, which has the characteristics of clustering and community, and a diffusion model is also proposed. With this friend network and rumor diffusion model, based on the zombie-city model, some simulation experiments to analyze the characteristics of rumor diffusion in social friend network...

Journal: :Personal Relationships 2015
Briana N Horwitz Chandra A Reynolds Susan T Charles

Emotional support from family and friends is associated with lower psychological distress. This study examined whether genetic and environmental influences explain associations among family support, friend support, and psychological distress. Data were drawn from the Midlife Development in the United States (MIDUS) study and included 947 pairs of MZ, same-sex DZ, and opposite-sex DZ twins. Resu...

Journal: :Cancer research 1975
N Kuzumaki H Kobayashi

The WKA/Mk rat tumors induced by Friend virus complex, Rauscher virus complex, and their associated lymphatic leukemia viruses were investigated for their antigenic relationhips with transplantation experiments and cytotoxicity tests. It was found that Friend lymphatic leukemia virus-induced tumors lacked part of the tumor-associated transplantation antigens (TATA's) on Friend virus complex-ind...

2007
A. Howard Fieldsteel Carole Kurahara Peter J. Dawson

Friend virus-induced reticulum cell sarcomas arising in BALB/c and BDF1 mice were grown in tissue culture and tested for the presence of Friend virus. Repeated tests in newborn BALB/c mice failed to detect infectious virus. Immunization with tissue cultures failed to protect mice against challenge with Friend virus or to induce detectable neutralizing antibody to the virus. Electron microscopy ...

Journal: :CoRR 2016
Stefanie Roos Martin Beck Thorsten Strufe

Friend-to-friend (F2F) overlays, which restrict direct communication to mutually trusted parties, are a promising substrate for privacy-preserving communication due to their inherent membership-concealment and Sybilresistance. Yet, existing F2F overlays suffer from a low performance, are vulnerable to denial-of-service attacks, or fail to provide anonymity. In particular, greedy embeddings allo...

2014
Niels Zeilemaker Johan A. Pouwelse

The privacy concerns associated with the popularity of online social networks have given rise to numerous research papers which focus on either storing the data in encrypted form, or decentralizing the network. However, without the incentive of being able to read private data, a centralized system cannot be sustained. A decentralized network does not rely on such incentives and can continue to ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید