首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
针对传统社会网络隐私保护技术对大规模社会网络数据处理效率较低的问题,提出一种分布式结点分裂匿名社会网络隐私保护算法(Distributed-Vertex Splitting Social Network Privacy Preserving,D-VSSP)。D-VSSP算法利用MapReduce和Pregel-like分布式计算模型处理社会网络图数据。首先基于MapReduce分布式计算模型对大图中的结点的标签信息进行标签平凡化、标签平凡化分组和精确分组处理;然后基于Pregel-like的消息传递机制,选举结点分裂,进行分布式结点分裂匿名。实验结果表明,在 对大规模社会网络数据的处理效率上, D-VSSP算法优于传统算法。  相似文献   

2.
This article is part of a 12-month study commissioned by the UK Data Service as part of the “Big Data Network” program funded by the Economic and Social Research Council (ESRC). The larger study focuses on the potential uses and accompanying challenges of data generated by social networking applications. This article, “Preserving Social Media: The Problem of Access,” comprises an excerpt of that longer study, allowing the authors a space to explore in closer detail the issue of making social media archives accessible to researchers and students now and in the future.  相似文献   

3.
In the light of technological and cultural changes, a question that digital archives face is: Which characteristics of our assets must be preserved to keep them usable and authentic? The concept of significant properties, which can be thought of as the “essence” of a digital object, provides one possible answer. The GESIS Data Archive for the Social Sciences (DAS) currently determines the significant properties of the data it preserves. We describe the procedure used to determine the significant properties of our digital assets, present first results of our work, and give an outlook on work still to be done.  相似文献   

4.
Open Design is an emerging area of research that seeks to connect and extend the culture of making, social innovation, open-source software, and open-source hardware. A cornerstone for Open Design is to broaden participation in technology innovation by allowing people to use and contribute to publicly shared resources. Makerspaces are important access points to share and contribute to these resources. However, prior to entering the physical door of a makerspace, makerspaces’ social media presence serve as the ‘front door’ for Open Design activities. In this paper, we examine different ‘front doors’ of Open Design, asking: What are the characteristics that produce makerspaces’ social media presences, and how do these representations shape potential access to Open Design activities? We manually collected and qualitatively analyzed 500 public posts on the Facebook sites of five makerspaces in Copenhagen, Denmark. By choosing the same geographical area, we were able to explore the characteristics of makerspaces’ social media presences for the same potential population of Open Design participants. Our analysis identifies three main characteristics of makerspaces’ social media presence, which together shape access to Open Design activities, namely reach, transparency, and discourse. The display of these characteristics produce openness and availability in unique ways, and is constitutive for how Open Design activities are produced online. In this paper, we do not argue for or against specific social media representations. Instead, we argue that the specificities and differences between makerspaces’ social media presences in the same geographical region have the strength of producing different identities across spaces, allowing for a broader definition and potential participation in Open Design.  相似文献   

5.
段竹  冯宏伟 《微机发展》2004,14(9):96-98
在两个数据库间作一个简单的INNERJOIN操作,虽然在SQL中这是一个简单的任务,但是使用直接的SQL语言会产生性能问题。文中简要介绍了数据整形技术,通过实例研究为什么SQLjoin命令的效率低,并且使用数据整形技术来解决这个问题,从而提高了检索记录集的效率。  相似文献   

6.
在两个数据库间作一个简单的INNER JOIN操作,虽然在SQL中这是一个简单的任务,但是使用直接的SQL语言会产生性能问题.文中简要介绍了数据整形技术,通过实例研究为什么SQL join命令的效率低,并且使用数据整形技术来解决这个问题,从而提高了检索记录集的效率.  相似文献   

7.
This article will review the current laws of the expectations of privacy under the two-pronged Katz test, and more specifically other cases that the courts have tried to interpret the test as applicable to social media such as Facebook, Instagram, Twitter, and email. Since there seems to be ‘no light at the end of the tunnel’ with any uniform decision within the courts on the Fourth Amendment protections against search and seizure when there is a reasonable expectation of privacy with social media. This reasonable expectation standard is developed by the users themselves who will allow their rights to be infringed upon for the approval to access sites like Facebook, Twitter, and Instagram.  相似文献   

8.
文化认同以及由于文化认同感的演变结果与地理边界的不一致性在文化版图上形成的文化侵蚀现象、文化融合现象等文化安全问题是文化领域的核心问题之一.在社会计算方法引入之前,该问题是典型的不能假设、无法进行计算实验的社会科学问题.将社会计算方法引入这一核心问题,使对该问题的实验研究进入到一个无风险的实验空间;运用基于多智能体的人工社会建模技术,确定了若干可刻画跨文化交流或文化内部环境稳定性的计算因子、文化抗消解惯性因子、文化身份状态因子、异族群的智能体间地理距离因子、“安土重迁”心理特征因子及“安土重迁”行为特征因子等;在此基础上,给出了刻画文化认同及其版图边界演变过程中文化侵蚀、文化融合与文化保护等现象的社会计算模型,并进行了大量的社会计算实验.实验结果表明:所选取的各种计算因子都是影响文化认同及其版图演化过程的重要因素,但作用各不相同;文化认同感演化的诸多规律也由该模型得出.该计算模型今后可在各类文化保护方案设计和方案效果评估等实际社会工作中发挥作用.  相似文献   

9.
This paper presents a framework that captures how the social nature of agents that are situated in a multi-agent environment impacts upon their individual mental states. Roles and social relationships provide an abstraction upon which we develop the notion of social mental shaping . This allows us to extend the standard Belief-Desire-Intention model to account for how common social phenomena (e.g. cooperation, collaborative problem-solving and negotiation) can be integrated into a unified theoretical perspective that reflects a fully explicated model of the autonomous agent's mental state.  相似文献   

10.
《办公自动化》2012,(19):34
正首届英特尔全球供应商可持续发展领导力峰会在上海举行首届英特尔全球供应商可持续发展领导力峰会在上海举行,近二百位来自英特尔和英特尔供应商高层及政府机构、公益组织和学术界的专家围绕"塑造环境与社会的未来"这一主题,共同探讨了企业在员工管理、环境保护、安全生产、企业透明度等可持续发展方面的议题。英特尔在峰会上宣布将与全球供应商伙伴进一步加强创新合作,建立良好的环境、社会责任和公司治理(ESG)机制与分享平台,通过增强供应链的企业责任管理,推动产业共同实现可持续的环境和社会发展。  相似文献   

11.
Earlier, the author discussed five components of an Internet architecture (middleware; user interface; delivery system; application; and data). He completes that schema by describing the four dynamics: user processes, software development; data management; and system management. The distinction between components and dynamics can be illuminated by an analogy: if the components are features in a landscape, the dynamics are forces like wind and water currents that shape them. The components and dynamics are inseparable, and their interactions comprise the environment in which the Internet “lives”. Instead of trying to suggest the next level of detail for the four dynamics, the author gives examples of how the dynamics influence the evolution of the components and vice versa. The dynamics are susceptible to our influence (unlike the laws of gravity), so all of us have a hand in shaping the Internet by our choices as technology developers and users. The author looks at how the Internet components and dynamics affect one another  相似文献   

12.
13.
A legacy information system represents a massive, long-term business investment. Unfortunately, such systems are often brittle, slow and non-extensible. Capturing legacy system data in a way that can support organizations into the future is an important but relatively new research area. The authors offer an overview of existing research and present two promising methodologies for legacy information system migration  相似文献   

14.
E-ARK (European Archiving of Records and Knowledge Preservation) is currently introducing standardization, new tools, and infrastructure into pan-European digital archival systems. The results of this pilot project can be applied to higher education where research data centers are required to preserve data for re-use in accordance with new open policies.

We elucidate how the E-ARK best practice survey has informed the development of new information packages for ingest, preservation, and re-use, and show how these can be applied to the Arts, Humanities, and Social Sciences with practical exemplars such as census data.  相似文献   

15.
Because of the complex structures characteristic of the arts sector and creative industries, it is often thought that external network ties of leading managers are critical to the success of their cultural enterprises. Based on research into entrepreneurship and promoters' activity, this study examines the influence of social network relationships on the success of cultural establishments in Germany. The regression analysis of data from 121 private arts and culture ventures presented here clearly shows that founders as well as managers can overcome numerous barriers through their engagement and activity in social networks, and thereby exercise to a significant degree a positive influence on establishing their enterprise. As expected, this effect is even stronger in cases of low sponsorship of cultural activities on the part of cities and communities. Contrary to expectations, the positive effect of intensive networking activities is not increased by a high intensity of competition; it is worth noting that the effect is strongest in situations of low competitive pressure. The results of this study demonstrate that successful networking expertise, as postulated by research into promoters' activity, is of great importance for overcoming significant barriers in the cultural sector, but that its effectiveness also has limits.  相似文献   

16.
As everyday life is increasingly conducted online, and as the electronic world continues to move out into the physical, the privacy of information and action and the security of information systems are increasingly a focus of concern both for the research community and the public at large. Accordingly, privacy and security are active topics of investigation from a wide range of perspectives-institutional, legislative, technical, interactional, and more. In this article, we wish to contribute toward a broad understanding of privacy and security not simply as technical phenomena but as embedded in social and cultural contexts. Privacy and security are difficult concepts to manage from a technical perspective precisely because they are caught up in larger collective rhetorics and practices of risk, danger, secrecy, trust, morality, identity, and more. Reductive attempts to deal with these issues separately produce incoherent or brittle results. We argue for a move away from narrow views of privacy and security and toward a holistic view of situated and collective information practice.  相似文献   

17.
Reynolds  R.G. Ali  M. Jayyousi  T. 《Computer》2008,41(1):64-72
Applying a suite of tools from artificial intelligence and data mining to existing archaeological data from Monte Alban, a prehistoric urban center, offers the potential for building agent-based models of emergent ancient urban centers. The authors use decision trees to characterize location decisions made by early inhabitants at Monte Alban, a prehistoric urban center, and inject these rules into a socially motivated learning system based on cultural algorithms. They can then infer an emerging social fabric whose networks provide support for certain theories about urban site formation. Specifically, we examine the period of occupation associated with the emergence of this early site. Our goal is to generate a set of decision rules using data-mining techniques and then use the cultural algorithm toolkit (CAT) to express the underlying social interaction between the initial inhabitants.  相似文献   

18.
Taking Chomsky’s Syntactic Structures as a starting point, this paper explores the use of recursive techniques in contemporary linguistic theory. Specifically, it is shown that there were profound ambiguities surrounding the notion of recursion in the 1950s, and that this was partly due to the fact that influential texts such as Syntactic Structures neglected to define what exactly constituted a recursive device. As a result, uncertainties concerning the role of recursion in linguistic theory have prevailed until the present day, and some of the most common misunderstandings that have appeared in recent discussions are examined at some length. This article shows that debates about such topics are frequently undermined by fundamental misunderstandings concerning core terminology, and the full extent of the prevailing haziness is revealed. An attempt is made, for instance, to distinguish between such things as iterative constructional devices and self-similar syntactic embedding, despite the fact that these are usually both unhelpfully classified as examples of recursion. Consequently, this article effectively constitutes a plea for much greater accuracy and clarity when such important issues are addressed from a linguistic perspective.  相似文献   

19.
20.
Search engines are some of the most popular destinations on the Web—understandably so, given the vast amounts of information available to users and the need for help in sifting through online content. While the results of significant technical achievements, search engines are also embedded in social processes and institutions that influence how they function and how they are used. This special theme section of the Journal of Computer-Mediated Communication explores these non-technical aspects of search engines and their uses.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号