首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7篇
  免费   0篇
管理学   4篇
理论方法论   1篇
社会学   2篇
  2020年   1篇
  2019年   1篇
  2014年   1篇
  2011年   1篇
  2009年   1篇
  2007年   1篇
  1976年   1篇
排序方式: 共有7条查询结果,搜索用时 78 毫秒
1
1.
2.
The growing volumes of information available today provide opportunities but also challenges for social scientists. This paper presents textual network analysis—a network analysis procedure that transforms any given text into a visual map of words co‐occurring together. It aims at scholars and students who are not familiar with network analysis, showing step‐by‐step how to use this approach and highlighting its advantages and applications. It demonstrates how to identify the main themes appearing in the text as well as to detect its biases and frames. Researchers can use this procedure as a grounded content analysis to formulate theories or as a basis to test existing hypotheses. The second part of the paper presents two studies that applied textual network analysis: (a) to identify the main themes raised by elite newspapers on the “fake news” discourse and (b) to map the topics related to China on Twitter. Both examples show how textual network analysis can be relevant for communication, international relations, and political science scholars as well as for practitioners, wishing to understand the prevailing discourses and tailor their messages more effectively.  相似文献   
3.
Let G=(V,E) be a connected multigraph, whose edges are associated with labels specified by an integer-valued function ℒ:E→ℕ. In addition, each label ∈ℕ has a non-negative cost c(). The minimum label spanning tree problem (MinLST) asks to find a spanning tree in G that minimizes the overall cost of the labels used by its edges. Equivalently, we aim at finding a minimum cost subset of labels I⊆ℕ such that the edge set {eE:ℒ(e)∈I} forms a connected subgraph spanning all vertices. Similarly, in the minimum label s t path problem (MinLP) the goal is to identify an st path minimizing the combined cost of its labels. The main contributions of this paper are improved approximation algorithms and hardness results for MinLST and MinLP.  相似文献   
4.
Horizons for strategic planning   总被引:1,自引:0,他引:1  
In this paper we present a normative model for setting time horizons for planning. Provided that certain conditions are met, we can state that only part of the future is relevant for present strategic planning, and a study of the future beyond that time horizons is a waste of resources.Following the introduction the impact of predetermined planning horizon on planning is discussed. Next, the model is presented: the problem is defined, developed and solved. The discussion of the model is designed to incorporate—and to show its implication on—existing views and methods for setting time horizons for strategic planning. Thus, simplifying assumptions which facilitate the mathematical solution of the problem, are discussed and relaxed in order to show how realistic situations are illuminated by the model.  相似文献   
5.
Aggregation of binary evaluations for truth-functional agendas   总被引:1,自引:1,他引:0  
In the problem of judgment aggregation, a panel of judges has to evaluate each proposition in a given agenda as true or false, based on their individual evaluations and subject to the constraint of logical consistency. We elaborate on the relation between this and the problem of aggregating abstract binary evaluations. For the special case of truth-functional agendas we have the following main contributions: (1) a syntactical characterization of agendas for which the analogs of Arrow’s aggregation conditions force dictatorship; (2) a complete classification of all aggregators that satisfy those conditions; (3) an analysis of the effect of weakening the Pareto condition to surjectivity. This is a sequel to the paper “Aggregation of binary evaluations.” The contents of both papers were presented, under the title “An Arrovian impossibility theorem for social truth functions,” at the Second World Congress of the Game Theory Society, Marseille, July 2004. The first version of “Aggregation of binary evaluations” was completed in June 2005. That working paper was subsequently split into two parts, of which this is the second. The comments of an anonymous referee are gratefully acknowledged. Part of R. Holzman’s work was done while he was a Fellow of the Institute for Advanced Studies at the Hebrew University of Jerusalem.  相似文献   
6.
An instance of the k -generalized connectivity problem consists of an undirected graph G=(V,E), whose edges are associated with non-negative costs, and a collection \({\mathcal{D}}=\{(S_{1},T_{1}),\ldots,(S_{d},T_{d})\}\) of distinct demands, each of which comprises a pair of disjoint vertex sets. We say that a subgraph ??G connects a demand (S i ,T i ) when it contains a path with one endpoint in S i and the other in T i . Given an integer parameter k, the goal is to identify a minimum cost subgraph that connects at least k demands in \({\mathcal{D}}\).Alon, Awerbuch, Azar, Buchbinder and Naor (SODA ’04) seem to have been the first to consider the generalized connectivity paradigm as a unified machinery for incorporating multiple-choice decisions into network formation settings. Their main contribution in this context was to devise a multiplicative-update online algorithm for computing log-competitive fractional solutions, and to propose provably-good rounding procedures for important special cases. Nevertheless, approximating the generalized connectivity problem in its unconfined form, where one makes no structural assumptions about the underlying graph and collection of demands, has remained an open question up until a recent O(log?2 nlog?2 d) approximation due to Chekuri, Even, Gupta and Segev (SODA ’08). Unfortunately, the latter result does not extend to connecting a pre-specified number of demands. Furthermore, even the simpler case of singleton demands has been established as a challenging computational task, when Hajiaghayi and Jain (SODA ’06) related its inapproximability to that of dense k -subgraph.In this paper, we present the first non-trivial approximation algorithm for k-generalized connectivity, which is derived by synthesizing several techniques originating in probabilistic embeddings of finite metrics, network design, and randomization. Specifically, our algorithm constructs, with constant probability, a feasible subgraph whose cost is within a factor of O(n 2/3?polylog(n,k)) of optimal. We believe that the fundamental approach illustrated in the current writing is of independent interest, and may be applicable in other settings as well.  相似文献   
7.
An instance of the mobile facility location problem consists of a complete directed graph \(G = (V, E)\) , in which each arc \((u, v) \in E\) is associated with a numerical attribute \(\mathcal M (u,v)\) , representing the cost of moving any object from \(u\) to \(v\) . An additional ingredient of the input is a collection of servers \(S = \{ s_1, \ldots , s_k \}\) and a set of clients \(C = \{ c_1, \ldots , c_\ell \}\) , which are located at nodes of the underlying graph. With this setting in mind, a movement scheme is a function \(\psi : S \rightarrow V\) that relocates each server \(s_i\) to a new position, \(\psi ( s_i )\) . We refer to \(\mathcal M ( s_i, \psi ( s_i ) )\) as the relocation cost of \(s_i\) , and to \(\min _{i \in [k]} \mathcal M (c_j, \psi ( s_i ) )\) , the cost of assigning client \(c_j\) to the nearest final server location, as the service cost of \(c_j\) . The objective is to compute a movement scheme that minimizes the sum of relocation and service costs. In this paper, we resolve an open question posed by Demaine et al. (SODA ’07) by characterizing the approximability of mobile facility location through LP-based methods. We also develop a more efficient algorithm, which is based on a combinatorial filtering approach. The latter technique is of independent interest, as it may be applicable in other settings as well. In this context, we introduce a weighted version of the occupancy problem, for which we establish interesting tail bounds, not before demonstrating that existing bounds cannot be extended.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号