
Analyzing the Facebook Friendship Graph
... acquired from OSN, trying to answer to these problems. In this work, we analyze connections among almost a million of Facebook users, data collected through some developed ad hoc Information Extraction techniques. This paper is organized as follows: in Section 2 we consider related works on social ...
... acquired from OSN, trying to answer to these problems. In this work, we analyze connections among almost a million of Facebook users, data collected through some developed ad hoc Information Extraction techniques. This paper is organized as follows: in Section 2 we consider related works on social ...
10 Tips for Website Safety
... 4. Do not use your web space for generic file storage. Private network file shares are available at no cost to faculty for network storage and backups of files that should not be publicly accessible. Department/group shares are also available for files that need to be shared between members of a tea ...
... 4. Do not use your web space for generic file storage. Private network file shares are available at no cost to faculty for network storage and backups of files that should not be publicly accessible. Department/group shares are also available for files that need to be shared between members of a tea ...
Philosophical Aspects of Science
... and laws as do physics and chemistry. Some believe that all scientific disciplines can be reduced to physics, which is regarded as the most basic. But can we use physical theories to explain biological phenomena? The point is that even within science there are differences. ...
... and laws as do physics and chemistry. Some believe that all scientific disciplines can be reduced to physics, which is regarded as the most basic. But can we use physical theories to explain biological phenomena? The point is that even within science there are differences. ...
test 1, April 3, 2009 and solutions
... that groups of 10 employees is acceptable. In this exercise we will try to check this assumption. Based on experience of the computer department we have: N = “the number of present employees within an arbitrary group of 10, sharing one internet connection”. N is homogeneously distributed on {6, 7, ...
... that groups of 10 employees is acceptable. In this exercise we will try to check this assumption. Based on experience of the computer department we have: N = “the number of present employees within an arbitrary group of 10, sharing one internet connection”. N is homogeneously distributed on {6, 7, ...
Software Engineering
... others are used only for experimentation and may eventually be replaced by the production system. ...
... others are used only for experimentation and may eventually be replaced by the production system. ...
Mathematical Research and Modeling for the Army
... coverage of a broader range of parameters, operating conditions and design alternatives. ...
... coverage of a broader range of parameters, operating conditions and design alternatives. ...
The Epistemology of Performance
... such as the theory of knowledge itself. Some have done so because it interests them, others because they are in the process of developing ideas and theories which cannot but take into account these very basic issues. It has been pointed out that none of the three methods of thought given above, it ...
... such as the theory of knowledge itself. Some have done so because it interests them, others because they are in the process of developing ideas and theories which cannot but take into account these very basic issues. It has been pointed out that none of the three methods of thought given above, it ...
Oct 1982 WHAT DO MATHEMATICIANS DO? by George W. Mackey
... around at random so have the mathematicians built a marvelously articulated body of abstract concepts by following their individual instincts with an eye to what their colleagues are doing. An interesting example occured during the first two decades of the twentieth century. While the physicists wer ...
... around at random so have the mathematicians built a marvelously articulated body of abstract concepts by following their individual instincts with an eye to what their colleagues are doing. An interesting example occured during the first two decades of the twentieth century. While the physicists wer ...
Theoretical computer science

Theoretical computer science is a division or subset of general computer science and mathematics that focuses on more abstract or mathematical aspects of computing and includes the theory of computation.It is not easy to circumscribe the theory areas precisely and the ACM's Special Interest Group on Algorithms and Computation Theory (SIGACT) describes its mission as the promotion of theoretical computer science and notes:Template:""To this list, the ACM's journal Transactions on Computation Theory adds coding theory, computational learning theory and theoretical computer science aspects of areas such as databases, information retrieval, economic models and networks. Despite this broad scope, the ""theory people"" in computer science self-identify as different from the ""applied people."" Some characterize themselves as doing the ""(more fundamental) 'science(s)' underlying the field of computing."" Other ""theory-applied people"" suggest that it is impossible to separate theory and application. This means that the so-called ""theory people"" regularly use experimental science(s) done in less-theoretical areas such as software system research. It also means that there is more cooperation than mutually exclusive competition between theory and application.