نتایج جستجو برای: weak tie

تعداد نتایج: 147920  

2006
Glenda Jacobs

In the light of recent NZ government initiatives designed to increase occupational networking amongst K-12 teachers, this paper examines the potential of the Internet to meet this objective. The paper then investigates why teachers might ignore or avoid opportunities to form and benefit from weak ties online, despite claiming to regard such networking as professionally valuable. Finally, recomm...

2003
Martin Barbie Clemens Puppe Attila Tasnadi

We characterize the preference domains on which the Borda count satisfies Arrow’s “independence of irrelevant alternatives” condition. Under a weak richness condition, these domains are obtained by fixing one preference ordering and including all its cyclic permutations (“Condorcet cycles”). We then ask on which domains the Borda count is non-manipulable. It turns out that it is non-manipulable...

2004
Jian-Xiong Chen Ying Chen Laura DeBusk Wenyu Lin Pengnain Charles Lin

Chen, Jian-Xiong, Ying Chen, Laura DeBusk, Wenyu Lin, and Pengnain Charles Lin. Dual functional roles of Tie-2/angiopoietin in TNF-mediated angiogenesis. Am J Physiol Heart Circ Physiol 287: H187–H195, 2004; 10.1152/ajpheart.01058.2003.—Inflammation and angiogenesis are associated with pathological disorders. TNFis a major inflammatory cytokine that also regulates angiogenesis. TNFhas been show...

2012
David J. Vumbaco Michael N. Kammer Lynn V. Koplitz Joel T. Mague

In the crystal structure of the title compound, C(7)H(7)N(2) (+)·Br(-), the cations are associated into inversion dimers through weak pairwise C-H⋯N hydrogen bonds. The dimers further form stepped sheets via weak pairwise C-H⋯N hydrogen bonds. In the sheets, the spacing between the mean planes of the laterally displaced aromatic rings in adjacent dimers is 1.124 (6) Å. Three N-H⋯Br inter-action...

2013
Zhiang Wu Haicheng Tao Youquan Wang Changjian Fang Jie Cao

This demo showcase the Community Extraction Cloud (CEC) system. The key idea is to drop weak-tie nodes by efficiently extracting core nodes based on the novel concept of asymptotically equivalent structures (AES) and parallel AES mining algorithm. Meanwhile, to facilitate storing and processing of massive networks, several cloud computing technologies including HDFS, Katta, and Hama are seamles...

Journal: :J. Economic Theory 2014
Lars Ehlers

We study markets with indivisible goods where monetary compensations are not possible. Each individual is endowed with an object and a preference relation over all objects. When preferences are strict, Gale’s top trading cycle algorithm finds the unique core allocation. When preferences are not necessarily strict, we use an exogenous profile of tie-breakers to resolve any ties in individuals’ p...

Journal: :CoRR 2018
Florian Adriaens Tijl De Bie Aristides Gionis Jefrey Lijffijt Polina Rozenshtein

Social networks often provide only a binary perspective on social ties: two individuals are either connected or not. While sometimes external information can be used to infer the strength of social ties, access to such information may be restricted or impractical. Sintos and Tsaparas (KDD 2014) first suggested to infer the strength of social ties from the topology of the network alone, by lever...

2004
Chris Baerveldt Ronan Van Rossem Marjolijn Vermande Frank Weerman

The goal of the present study was to investigate three issues in the current debate on youth delinquency: (1) Whether the level of delinquency of adolescents is negatively correlated with the quality of her/his personal networks (as stated by the social inability model) or not (as stated by the social ability model); (2) Whether there is homophily in adolescents’ networks regarding degree of de...

Journal: :Societies 2021

This study examined which media people use on a day-to-day basis to communicate and whether tie strength influenced this use. Furthermore, we analyzed online offline interactions differ in perceived intimacy impacts interaction intimacy: 347 real of 9 participants (3 male, 6 female) were analyzed; 172 (WhatsApp, Facebook Messenger, email, SMS interactions) 175 (recorded phone face-to-face conve...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید