Mutualistic networks
In: Monographs in population biology 53
22539 Ergebnisse
Sortierung:
In: Monographs in population biology 53
Using simple language and equations, the authors provide expert, clear insight into every step of social network analysis - including basic maths principles that even a novice can follow. Focusing on NetDraw and UCINET, introducing relevant software tools step-by-step, in an easy to follow way. In addiiton to the fundamentals of network analysis and the research process, this edition emphasizes: digital data and social networks like Twitter; statistical models to use in SNA, like QAP and ERGM; the structure and centrality of networks; and methods for cohesive subgroups/community detection. (Provided by publisher)
The field of network exchange has grown over the last 20 years from a few scattered studies to substantial publications in leading journals. Today network exchange is as advanced as any area of sociology. Willer and his contributors present its most advanced theory, Network Exchange Theory, and, by assembling and supplementing formulations now spread across leading journals, provide scholars with a unique collection.||Contributors examine basic issues in theory as well as research. The end product is a well-tested theory which relates social structure to social action under a wide range of con
In: Quantitative applications in the social sciences 154
"David Knoke and Song Yang's Social Network Analysis, Third Edition provides a concise introduction to the concepts and tools of social network analysis. The authors convey key material while at the same time minimizing technical complexities. The examples are simple: sets of 5 or 6 entities such as individuals, positions in a hierarchy, political offices, and nation-states, and the relations between them include friendship, communication, supervision, donations, and trade. The new edition reflects developments and changes in practice over the past decade. The authors also describe important recent developments in network analysis, especially in the fifth chapter. Exponential random graph models (ERGMs) are a prime example: when the second edition was published, P* models were the recommended approach for this, but they have been replaced by ERGMs. Finally, throughout the volume, the authors comment on the challenges and opportunities offered by internet and social media data"--
In: The Single market review
In: Subseries 2, Impact on services 11
In: Cambridge manuals in archaeology
"Network Science in Archaeology The Cambridge Manual to Archaeological Network Science provides the first comprehensive guide to a field of research that has firmly established itself within archaeological practice in recent years. Network science methods are commonly used to explore big archaeological datasets and are essential for the formal study of past relational phenomena: social networks, transport systems, communication, and exchange. The volume offers a step-by-step description of network science methods and explores its theoretical foundations and applications in archaeological research, which are elaborately illustrated with archaeological examples. It also covers a vast range of network science techniques that can enhance archaeological research, including network data collection and management, exploratory network analysis, sampling issues and sensitivity analysis, spatial networks, and network visualisation. An essential reference handbook for both beginning and experienced archaeological network researchers, the volume includes boxes with definitions, boxed examples, exercises, and online supplementary learning and teaching materials. Tom Brughmans is Associate Professor of Classical Archaeology at the Centre for Urban Network Evolutions, Aarhus University. His research explores how social networks connected people throughout history, how large integrated economies like the Roman Empire could function for centuries, and how expansive communication systems using fire and smoke signaling worked. Matthew A. Peeples is Associate Professor of Anthropology in the School of Human Evolution and Social Change, and Director of the Center for Archaeology and Society at Arizona State University. His research focuses on integrating archaeological data with methods and models from the broader social sciences to address questions regarding the nature of human social networks over the long term"--
In the era of network attacks and malware threat, it becomes important to have skills to investigate the attack evidence and vulnerabilities prevailing in the network. This book focuses on how to acquire and analyze the evidence, write a report and use the common tools in network forensics.
In: Wrox programmer to programmer
In: Wrox guides
OpenSocial network programming -- Introduction to OpenSocial -- Gadget XML and Gadget API -- JavaScript API -- OpenSocial RESTful API -- Programming fundamentals -- Sample applications -- Performance, scalability, and monetization -- OpenSocial templates, markup, and emerging technolgies
"This book covers the modeling, analysis and mining of systems made of multilayer social networks, from groups of individuals connected through different types of relationships to large systems of multiple online social network sites. A range of practical and theoretical topics are covered, from data collection, pre-processing, measuring and mining to theoretical models behind the evolution of interconnected social networks and dynamical processes like information spreading"--
In: Digital research in the arts and humanities
The main target of this book is to raise the awareness about social networking systems design, implementation, security requirements, and approaches. The book entails related issues including computing, engineering, security, management, and organization policy. It interprets the design, implementation and security threats in the social networks and offers some solutions in this concern. It clarifies the authentication concept between servers to identity users. Most of the models that focus on protecting users' information are also included. This book introduces the Human-Interactive Security Protocols (HISPs) efficiently. Presenting different types of the social networking systems including the internet and mobile devices is one of the main targets of this book. This book includes the social network performance evaluation metrics. It compares various models and approaches used in the design of the social networks. This book includes various applications for the use of the social networks in the healthcare, e-commerce, crisis management, and academic applications. The book provides an extensive background for the development of social network science and its challenges. This book discusses the social networks integration to offer online services, such as instant messaging, email, file sharing, transferring patients' medical reports/images, location-based recommendations and many other functions. This book provides users, designers, engineers and managers with the valuable knowledge to build a better secured information transfer over the social networks. The book gathers remarkable materials from an international experts' panel to guide the readers during the analysis, design, implementation and security achievement for the social network systems. In this book, theories, practical guidance, and challenges are included to inspire designers and researchers. The book guides the engineers, designers, and researchers to exploit the intrinsic design of the social network systems.