[go: up one dir, main page]

Rheingold, 2004 - Google Patents

Smart mobs

Rheingold, 2004

View PDF
Document ID
17345167337599775620
Author
Rheingold H
Publication year
Publication venue
DEMOS COLLECTION

External Links

Snippet

Smart mobs consist of people who are able to act in concert even if they don't know each other. The people who make up smart mobs cooperate in ways never before possible because they carry devices that possess both communication and computing capabilities …
Continue reading at www.presnick.people.si.umich.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
    • G06F15/163Interprocessor communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/22Tracking the activity of the user

Similar Documents

Publication Publication Date Title
Caren et al. Contemporary social movements in a hybrid media environment
Johnson The self-radicalization of white men:“Fake news” and the affective networking of paranoia
Qin et al. Why does China allow freer social media? Protests versus surveillance and propaganda
Agarwal et al. A model of crowd enabled organization: Theory and methods for understanding the role of twitter in the occupy protests
Nhan et al. Digilantism: An analysis of crowdsourcing and the Boston marathon bombings
Beskow et al. Bot conversations are different: leveraging network metrics for bot detection in twitter
Mason et al. Surveillance studies and violence against women
Baeth et al. An approach to custom privacy policy violation detection problems using big social provenance data
Gerdes Illuminating dark networks: The study of clandestine groups and organizations
Al-Khateeb et al. UNDERSTANDING STRATEGIC INFORMATION MANOEUVRES IN NETWORK MEDIA TO ADVANCE CYBER OPERATIONS: A CASE STUDY ANALYSING PRO-RUSSIAN SEPARATISTS'CYBER INFORMATION OPERATIONS IN CRIMEAN WATER CRISIS.
Al-Khateeb et al. Flash mob: a multidisciplinary review
Mirbabaie et al. Examining convergence behaviour during crisis situations in social media-a case study on the manchester bombing 2017
Johnson et al. Modeling insurgent dynamics including heterogeneity: A statistical physics approach
Rheingold Smart mobs
Bruns Towards distributed citizen participation: lessons from WikiLeaks and the Queensland Floods
CN104111964A (en) User-read community application data processing method
Dwyer et al. Understanding viral news sharing
Benter et al. The role of social media as a catalyst to insurgency
Grindrod et al. From grievance to martyrdom: A mathematical perspective on the journey of radicalisation
Pashentsev The malicious use of artificial intelligence through agenda setting
Xu et al. Exploiting the spam correlations in scalable online social spam detection
Li et al. Research on network public opinion dissemination and risk management in the blockchain environment
Bunnik Countering and understanding terrorism, extremism, and radicalisation in a big data age
Zhang et al. Decoding activist public opinion in decentralized self-organized protests using llm
Chivers Investigating the dynamics of surveillance and resistance in the information society