Principles of social media monitoring and analysis software
Julkaistu sarjassa
Jyväskylä studies in computingTekijät
Päivämäärä
2013Oppiaine
TietojenkäsittelytiedeJulkaisija
University of JyväskyläISBN
978-951-39-5225-9ISSN Hae Julkaisufoorumista
1456-5390Asiasanat
Metadata
Näytä kaikki kuvailutiedotKokoelmat
- Väitöskirjat [3436]
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
The spanning tree based approach for solving the shortest path problem in social graphs
Eremeev, Andrei (2016)This thesis is devoted to the shortest path problem in social graphs. Social graphs represent individuals and social relationships between them. As for social networking sites, their users are represented as vertices of ... -
A comparison of dyadic and social network assessments of peer influence
DeLay, Dawn; Laursen, Brett; Kiuru, Noona; Rogers, Adam; Kindermann,Thomas; Nurmi, Jari-Erik (SAGE Publications, 2021)The present study compares two methods for assessing peer influence: the longitudinal actor–partner interdependence model (L-APIM) and the longitudinal social network analysis (L-SNA) Model. The data were drawn from 1,995 ... -
Patterns of action transitions in online collaborative problem solving : A network analysis approach
Li, Shupin; Pöysä-Tarhonen, Johanna; Häkkinen, Päivi (Springer Science and Business Media LLC, 2022)In today’s digital society, computer-supported collaborative learning (CSCL) and collaborative problem solving (CPS) have received increasing attention. CPS studies have often emphasized outcomes such as skill levels of ... -
Understanding and analyzing SQL/CLI database usage of Java software: empirical study
Laitila, Ville (2005) -
Towards Practical Cybersecurity Mapping of STRIDE and CWE : a Multi-perspective Approach
Honkaranta, Anne; Leppänen, Tiina; Costin, Andrei (FRUCT Oy, 2021)Cybersecurity practitioners seek to prevent software vulnerabilities during the whole life-cycle of systems. Threat modeling which is done on the system design phase is an efficient way for securing systems; preventing ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.