Workload characterization: A survey revisited

MC Calzarossa, L Massari, D Tessera - ACM Computing Surveys (CSUR …, 2016 - dl.acm.org
Workload characterization is a well-established discipline that plays a key role in many
performance engineering studies. The large-scale social behavior inherent in the …

Online social networks and information diffusion: The role of ego networks

V Arnaboldi, M Conti, A Passarella… - Online Social Networks …, 2017 - Elsevier
Ego networks models describe the social relationships of an individual (ego) with its social
peers (alters). The structural properties of ego networks are known to determine many …

[HTML][HTML] The structure of online social networks mirrors those in the offline world

RIM Dunbar, V Arnaboldi, M Conti, A Passarella - Social networks, 2015 - Elsevier
We use data on frequencies of bi-directional posts to define edges (or relationships) in two
Facebook datasets and a Twitter dataset and use these to create ego-centric social …

Interactivity in online discussions and learning outcomes

C Kent, E Laslo, S Rafaeli - Computers & education, 2016 - Elsevier
The increased use of online discussions in learning environments both formal and informal,
positions the construct of interactivity as central to learning. Interactivity in learning …

The impact of digital platforms on news and journalistic content

D Wilding, P Fray, S Molitorisz… - Digital Platforms …, 2018 - opus.lib.uts.edu.au
The report was commissioned by the Australian Competition and Consumer Commission as
part of its Digital Platforms Inquiry. The inquiry has been described as a world-leading …

[BUCH][B] Cultural evolution in the digital age

A Acerbi - 2019 - books.google.com
From emails to social media, from instant messaging to political memes, the way we produce
and transmit culture is radically changing. Understanding the consequences of the massive …

Temperature-aware microarchitecture

K Skadron, MR Stan, W Huang, S Velusamy… - ACM SIGARCH …, 2003 - dl.acm.org
With power density and hence cooling costs rising exponentially, processor packaging can
no longer be designed for the worst case, and there is an urgent need for runtime processor …

Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers

G Wang, T Wang, H Zheng, BY Zhao - 23rd USENIX Security …, 2014 - usenix.org
Recent work in security and systems has embraced the use of machine learning (ML)
techniques for identifying misbehavior, eg email spam and fake (Sybil) users in social …

HeteroGraphRec: A heterogeneous graph-based neural networks for social recommendations

A Salamat, X Luo, A Jafari - Knowledge-Based Systems, 2021 - Elsevier
Recommender systems in social networks are widely used for connecting users to their
desired items from a vast catalog of available items. Learning the user's preferences from all …

[HTML][HTML] Eight social media challenges for marketing managers

CF Hofacker, D Belanche - Spanish Journal of Marketing-ESIC, 2016 - Elsevier
Consumers increasingly use social media for a variety of consumption-related tasks such as
complaining about a brand or sharing purchase experiences. Social media growth …