Fandom

VroniPlag Wiki

Quelle:Nm/Tsvetovat et al. 2005

< Quelle:Nm

31.360Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

Angaben zur Quelle [Bearbeiten]

Autor     Maksim Tsvetovat, Jana Diesner, Kathleen M. Carley
Titel    NetIntel: A Database for Manipulation of Rich Social Network Data
Datum    3. March 2005
Anmerkung    Carnegie Mellon University School of Computer Science ISRI - Institute for Software Research International CASOS - Center for Computational Analysis of Social and Organizational Systems: CMU-ISRI-04-135
URL    http://www.docstoc.com/docs/4199494/NetIntel-A-Database-for-Manipulation-of-Rich-Social-Network

Literaturverz.   

no
Fußnoten    no
Fragmente    2


Fragmente der Quelle:
[1.] Nm/Fragment 029 03 - Diskussion
Zuletzt bearbeitet: 2012-06-27 13:21:35 Sotho Tal Ker
Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Tsvetovat et al. 2005, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 29, Zeilen: 3-8
Quelle: Tsvetovat et al. 2005
Seite(n): cover, Zeilen: 10ff
There is a pressing need to automatically collect data of terrorist networks, analyze such networks to find hidden relations and groups, prune datasets to locate regions of interest, detect key players, characterize the structure, trace points of vulnerability, and find efficiency (how fast communication is being made) of the network. There is a pressing need to automatically collect data on social systems as rich network data, analyze such systems to find hidden relations and groups, prune the datasets to locate regions of interest, locate key actors, characterize the structure, locate points of vulnerability, and simulate change in a system as it evolves naturally or in response to strategic interventions over time or under certain impacts, including modifcation of data.
Anmerkungen

Only the last half-sentence is substantially different to the source, which is not mentioned anywhere in the thesis.

Sichter
(Hindemith), Bummelchen

[2.] Nm/Fragment 202 12 - Diskussion
Zuletzt bearbeitet: 2012-06-27 13:20:24 Sotho Tal Ker
Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Tsvetovat et al. 2005, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith, Graf Isolan
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 202, Zeilen: 12-21
Quelle: Tsvetovat et al. 2005
Seite(n): 2, Zeilen: 13ff
In the aftermath of the September 11th attacks, it was noted that comprehensible information sources were not available to the researchers (Sageman 2004). Information was either available in a disconnected form, not allowing for comparison studies across events, groups or tactics, or made available in written articles – which are not readily suitable for quantitative analysis of terrorist networks. Data collected by law enforcement agencies, while potentially better organized, are largely not available to the research community due to restrictions in distribution of sensitive information. In the aftermath of the September 11th attacks, it was noted that coherent information sources on terrorism and terrorist groups were not available to researchers[10]. Information was either available in fragmentary form, not allowing comparison studies across incidents, groups or tactics, or made available in written articles - which are not readily suitable for quantitative analysis of terrorist networks. Data collected by intelligence and law-enforcement agencies, while potentially better organized, is largely not available to the research community due to restrictions in distribution of sensitive information.

[10] Le Gruenwald, Gary McNutt, and Adrien Mercier. Using an ontology to improve search in a terrorism database system. Proceedings of the 14th International Workshop on Database and Expert System Applications (DEXA'03), 2003.

Anmerkungen

The source is not mentioned anywhere in the thesis

Sichter
(Hindemith), Bummelchen

Auch bei Fandom

Zufälliges Wiki