feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    New York :Cambridge University Press,
    UID:
    almafu_9960117548302883
    Format: 1 online resource (xii, 212 pages) : , digital, PDF file(s).
    ISBN: 1-316-69451-8 , 1-316-69465-8 , 1-316-47684-7
    Content: Social media is an invaluable source of time-critical information during a crisis. However, emergency response and humanitarian relief organizations that would like to use this information struggle with an avalanche of social media messages that exceeds human capacity to process. Emergency managers, decision makers, and affected communities can make sense of social media through a combination of machine computation and human compassion - expressed by thousands of digital volunteers who publish, process, and summarize potentially life-saving information. This book brings together computational methods from many disciplines: natural language processing, semantic technologies, data mining, machine learning, network analysis, human-computer interaction, and information visualization, focusing on methods that are commonly used for processing social media messages under time-critical constraints, and offering more than 500 references to in-depth information.
    Note: Title from publisher's bibliographic system (viewed on 04 Jul 2016). , Machine generated contents note: 1. Introduction; 2. Volume: data acquisition, storage, and retrieval; 3. Vagueness: natural language and semantics; 4. Variety: classification and clustering; 5. Virality: networks and information propagation; 6. Velocity: online methods and data streams; 7. Volunteers: humanitarian crowdsourcing; 8. Veracity: misinformation and credibility; 9. Validity: biases and pitfalls of social media data; 10. Visualization: crisis maps and beyond; 11. Values: privacy and ethics; 12. Conclusions and outlook. , English
    Additional Edition: ISBN 1-107-13576-1
    Language: English
    Keywords: Literaturbericht
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Book
    Book
    New York, NY :Cambridge University Press,
    UID:
    almafu_BV043771975
    Format: xii, 212 Seiten : , Diagramme.
    ISBN: 978-1-107-13576-5
    Content: "Social media is an invaluable source of time-critical information during a crisis. However, emergency response and humanitarian relief organizations that would like to use this information struggle with an avalanche of social media messages that exceeds human capacity to process. Emergency managers, decision makers, and affected communities can make sense of social media through a combination of machine computation and human compassion - expressed by thousands of digital volunteers who publish, process, and summarize potentially life-saving information. This book brings together computational methods from many disciplines: natural language processing, semantic technologies, data mining, machine learning, network analysis, human-computer interaction, and information visualization, focusing on methods that are commonly used for processing social media messages under time-critical constraints, and offering more than 500 references to in-depth information"...
    Language: English
    Keywords: Social Media ; Krise ; Big Data ; Social Media ; Big Data ; Katastrophenmanagement ; Datenauswertung ; Software ; Literaturbericht
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [San Rafael, California] : Morgan & Claypool Publishers
    UID:
    b3kat_BV044753925
    Format: 1 Online-Ressource (XV, 161 Seiten) , Illustrationen, Diagramme
    ISBN: 9781627051163
    Series Statement: Synthesis lectures on data management #37
    Additional Edition: Erscheint auch als Druck-Ausgabe, paperback ISBN 978-1-62705-115-6
    Language: English
    Keywords: Soziales Netzwerk ; Informationsfluss ; Gesellschaft ; Einfluss ; Berechenbarkeit
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    gbv_782056016
    Format: 1 Online-Ressource (179 Seiten) , Illustrationen
    Edition: Also available in print
    ISBN: 9781627051163
    Series Statement: Synthesis lectures on data management 37
    Content: Research on social networks has exploded over the last decade. To a large extent, this has been fueled by the spectacular growth of social media and online social networking sites, which continue growing at a very fast pace, as well as by the increasing availability of very large social network datasets for purposes of research. A rich body of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections, practices and customs through networks. Can we build models to explain the way these propagations occur? How can we validate our models against any available real datasets consisting of a social network and propagation traces that occurred in the past? These are just some questions studied by researchers in this area. Information propagation models find applications in viral marketing, outbreak detection, finding key blog posts to read in order to catch important stories, finding leaders or trendsetters, information feed ranking, etc. A number of algorithmic problems arising in these applications have been abstracted and studied extensively by researchers under the garb of influence maximization
    Content: 1. Introduction -- 1.1 Social networks and social influence -- 1.1.1 Examples of social networks -- 1.1.2 Examples of information propagation -- 1.2 Social influence examples -- 1.3 Social influence analysis applications -- 1.4 The flip side -- 1.5 Outline of this book --
    Content: 2. Stochastic diffusion models -- 2.1 Main progressive models -- 2.1.1 Independent cascade model -- 2.1.2 Linear threshold model -- 2.1.3 Submodularity and monotonicity of influence spread function -- 2.1.4 General threshold model and general cascade model -- 2.2 Other related models -- 2.2.1 Epidemic models -- 2.2.2 Voter model -- 2.2.3 Markov random field model -- 2.2.4 Percolation theory --
    Content: 3. Influence maximization -- 3.1 Complexity of influence maximization -- 3.2 Greedy approach to influence maximization -- 3.2.1 Greedy algorithm for influence maximization -- 3.2.2 Empirical evaluation of (G,k) -- 3.3 Scalable influence maximization -- 3.3.1 Reducing the number of influence spread evaluations -- 3.3.2 Speeding up influence computation -- 3.3.3 Other scalable influence maximization schemes --
    Content: 4. Extensions to diffusion modeling and influence maximization -- 4.1 A data-based approach to influence maximization -- 4.2 Competitive influence modeling and maximization -- 4.2.1 Model extensions for competitive influence diffusion -- 4.2.2 Maximization problems for competitive influence diffusion -- 4.2.3 Endogenous competition -- 4.2.4 A new frontier, the host perspective -- 4.3 Influence, adoption, and profit -- 4.3.1 Influence vs. adoption -- 4.3.2 Influence vs. profit -- 4.4 Other extensions --
    Content: 5. Learning propagation models -- 5.1 Basic models -- 5.2 IC model -- 5.3 Threshold models -- 5.3.1 Static models -- 5.3.2 Does influence remain static? -- 5.3.3 Continuous time models -- 5.3.4 Discrete time models -- 5.3.5 Are all objects equally influence prone? -- 5.3.6 Algorithms -- 5.3.7 Experimental validation -- 5.3.8 Discussion --
    Content: 6. Data and software for information/influence: propagation research -- 6.1 Types of datasets -- 6.2 Propagation of information "memes" -- 6.2.1 Microblogging -- 6.2.2 Newspapers/blogs/etc. -- 6.3 Propagation of other actions -- 6.3.1 Consumption/appraisal platforms -- 6.3.2 User-generated content sharing/voting -- 6.3.3 Community membership as action -- 6.3.4 Cross-provider data -- 6.3.5 Phone logs -- 6.4 Network-only datasets -- 6.4.1 Citation networks -- 6.4.2 Other networks -- 6.5 Other off-line datasets -- 6.6 Publishing your own datasets -- 6.7 Software tools -- 6.7.1 Graph software tools -- 6.7.2 Propagation software tools -- 6.7.3 Visualization -- 6.8 Conclusions --
    Content: 7. Conclusion and challenges -- 7.1 Application-specific challenges -- 7.1.1 Prove value for advertising/marketing -- 7.1.2 Learn to design for virality -- 7.1.3 Correct for sampling biases -- 7.1.4 Contribute to other applications -- 7.2 Technical challenges -- 7.3 Conclusions --
    Content: A. Notational conventions -- Bibliography -- Authors' biographies -- Index
    Note: Includes bibliographical references (pages 143-155) and index , 1. Introduction1.1 Social networks and social influence -- 1.1.1 Examples of social networks -- 1.1.2 Examples of information propagation -- 1.2 Social influence examples -- 1.3 Social influence analysis applications -- 1.4 The flip side -- 1.5 Outline of this book , 2. Stochastic diffusion models2.1 Main progressive models -- 2.1.1 Independent cascade model -- 2.1.2 Linear threshold model -- 2.1.3 Submodularity and monotonicity of influence spread function -- 2.1.4 General threshold model and general cascade model -- 2.2 Other related models -- 2.2.1 Epidemic models -- 2.2.2 Voter model -- 2.2.3 Markov random field model -- 2.2.4 Percolation theory , 3. Influence maximization3.1 Complexity of influence maximization -- 3.2 Greedy approach to influence maximization -- 3.2.1 Greedy algorithm for influence maximization -- 3.2.2 Empirical evaluation of (G,k) -- 3.3 Scalable influence maximization -- 3.3.1 Reducing the number of influence spread evaluations -- 3.3.2 Speeding up influence computation -- 3.3.3 Other scalable influence maximization schemes , 4. Extensions to diffusion modeling and influence maximization4.1 A data-based approach to influence maximization -- 4.2 Competitive influence modeling and maximization -- 4.2.1 Model extensions for competitive influence diffusion -- 4.2.2 Maximization problems for competitive influence diffusion -- 4.2.3 Endogenous competition -- 4.2.4 A new frontier, the host perspective -- 4.3 Influence, adoption, and profit -- 4.3.1 Influence vs. adoption -- 4.3.2 Influence vs. profit -- 4.4 Other extensions , 5. Learning propagation models5.1 Basic models -- 5.2 IC model -- 5.3 Threshold models -- 5.3.1 Static models -- 5.3.2 Does influence remain static? -- 5.3.3 Continuous time models -- 5.3.4 Discrete time models -- 5.3.5 Are all objects equally influence prone? -- 5.3.6 Algorithms -- 5.3.7 Experimental validation -- 5.3.8 Discussion , 6. Data and software for information/influence: propagation research6.1 Types of datasets -- 6.2 Propagation of information "memes" -- 6.2.1 Microblogging -- 6.2.2 Newspapers/blogs/etc. -- 6.3 Propagation of other actions -- 6.3.1 Consumption/appraisal platforms -- 6.3.2 User-generated content sharing/voting -- 6.3.3 Community membership as action -- 6.3.4 Cross-provider data -- 6.3.5 Phone logs -- 6.4 Network-only datasets -- 6.4.1 Citation networks -- 6.4.2 Other networks -- 6.5 Other off-line datasets -- 6.6 Publishing your own datasets -- 6.7 Software tools -- 6.7.1 Graph software tools -- 6.7.2 Propagation software tools -- 6.7.3 Visualization -- 6.8 Conclusions , 7. Conclusion and challenges7.1 Application-specific challenges -- 7.1.1 Prove value for advertising/marketing -- 7.1.2 Learn to design for virality -- 7.1.3 Correct for sampling biases -- 7.1.4 Contribute to other applications -- 7.2 Technical challenges -- 7.3 Conclusions , A. Notational conventionsBibliography -- Authors' biographies -- Index. , Also available in print. , System requirements: Adobe Acrobat Reader. , Mode of access: World Wide Web.
    Additional Edition: ISBN 9781627051156
    Language: English
    Keywords: Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages