Search Results

You are looking at 1 - 10 of 3,349 items for :

  • "networking" x
  • All content x
Clear All

] Replika 29 139 150 Amblard, F. (2003): Simultaning Social Networks: A Review of Three Books. JASSS

Restricted access

Social Networks: Analysis of Key Features and Prediction of Tie Strength in Facebook. Computer Communications , 36 , 1130–1144. Passarella A. Egocentric Online Social Networks

Restricted access

Ionescu C 2004: Romanian Seismic Network FDSN Report. National Institute for Earth Physics Romania Observatory Overview- http://orfeus.knmi.nl/pub/outgoing/dppi/NIEP_Romania.pdf Ionescu C

Restricted access

-based approaches in which the topics of diffusion can be tracked were discussed by Chen and Hicks ( 2004 ). Particularly, they introduced an approach that combined complex network theory, network visualization, and patent citation analysis to describe knowledge

Restricted access

Introduction Informetrics is not only the study of regularities (the so-called informetric laws) or of citation counting and its consequences; it is also the study of related algebraic structures such as graphs or networks. In

Restricted access

Hecht-Nielsen R 1989: In: Proc. Int. Joint Conf. on Neural Networks, IEEE, Washington, D.C., 1,593-605. Proc. Int. Joint Conf. on Neural Networks 1

Restricted access

2002 ). Commercial bibliometric databases and repositories of open access journals have contributed to network analyses by offering citation indexes and data on co-author relationships. Typical applications of the results of network analyses of

Restricted access

regarding the suitability of stations of the fundamental gravimetric network in Slovenia (in Slovenian) (unpublished). Faculty of Natural Sciences and Engineering, University of Ljubljana, Ljubljana Vrabec M

Restricted access
International Review of Applied Sciences and Engineering
Authors: Ahmed S. Al-Zuhairi, Alaa H. Altimimy, Ali T. Al-Aqbi, and Hazim M. Al-Kargole

, communications, battery production technology and others of power sources [ 3–6 ]. Additional subjects are involved as network management, routing, types of protocols applied. Estimating capacity of transmitted data, network lifetime, maintenance, and fault

Open access