Sciweavers

HICSS
2016
IEEE
85views Biometrics» more  HICSS 2016»
8 years 14 days ago
Strategic Network Formation in a Location-Based Social Network: A Topic Modeling Approach
This paper studies the strategic network formation in a location-based social network. We build a structural model of social link creation that incorporates individual characteris...
Gene Moo Lee, Liangfei Qiu, Andrew B. Whinston
HICSS
2016
IEEE
76views Biometrics» more  HICSS 2016»
8 years 14 days ago
Convex Optimization for Joint Expansion Planning of Natural Gas and Power Systems
Within the energy sector, two of the most tightly coupled systems are natural gas and electric power. The recent advent of cheap gas extraction technologies have only driven these...
Conrado Borraz-Sánchez, Russell Bent, Scott...
HICSS
2016
IEEE
74views Biometrics» more  HICSS 2016»
8 years 14 days ago
Perverse Effects in Defense of Computer Systems: When More is Less
With computer security spending on the rise, organizations seem to have accepted the notion that buying more—and more expensive—defenses allows them to better protect their co...
Josephine Wolff
HICSS
2016
IEEE
70views Biometrics» more  HICSS 2016»
8 years 14 days ago
Collective Intelligence in Law Reforms: When the Logic of the Crowds and the Logic of Policymaking Collide
This paper shows how the two virtues of collective intelligence – cognitive diversity and large crowds – turn into perils in crowdsourced policymaking. That is because of a co...
Tanja Aitamurto
HICSS
2016
IEEE
70views Biometrics» more  HICSS 2016»
8 years 14 days ago
A Systematic Literature Review of Twitter Research from a Socio-Political Revolution Perspective
From a socio-political revolution perspective we review Twitter-related literature included in top peerreviewed journals and conferences, and build up a comprehensive picture. Bas...
Ricardo Buettner, Katharina Buettner
Biometrics
Top of PageReset Settings