Back to Results
First PageMeta Content
Structure / Ethology / Cybernetics / Statistical theory / Information theory / Network science / Entropy / Social network / Networks / Science / Network theory


Appeared in “Workshop on Information in Networks”, 2011 Stealing Reality: When Criminals Become Data Scientists Yaniv Altshuler,1, 2 Nadav Aharony,1 Yuval Elovici,2, 3 Alex Pentland,1 and Manuel Cebrian1, 4 1
Add to Reading List

Document Date: 2012-01-16 11:54:02


Open Document

File Size: 150,73 KB

Share Result on Facebook

City

La Jolla / Cambridge / New York / /

Company

IEEE Intelligent Systems / The Media Laboratory / USA 2 Deutsche Telekom Laboratories / /

Country

United States / Israel / /

Facility

Reality Mining Random Hall / Massachusetts Institute of Technology / University of California San Diego / Ben Gurion University / /

IndustryTerm

possible networks / even / given social network / social reality network / social networking / self-reporting network / telecommunication networks / large networks / social computing / malware integrating tools / Social networks / computing / social / real world networks / social network / heterogenous network / data-mining experts / real world social networks / personal recommendation systems / complicated networks / /

Organization

Department of Information Systems Engineering / Ben Gurion University / Massachusetts Institute of Technology / National Academy of Sciences / Department of Computer Science and Engineering / University of California San Diego / /

Person

Marshall McLuhan / /

/

ProvinceOrState

California / Massachusetts / /

PublishedMedium

Proceedings of the National Academy of Sciences / PLoS ONE / IEEE Intelligent Systems / /

Technology

cellular telephone / /

SocialTag