Rheingold, 2004 - Google Patents
Smart mobsRheingold, 2004
View PDF- Document ID
- 17345167337599775620
- Author
- Rheingold H
- Publication year
- Publication venue
- DEMOS COLLECTION
External Links
Snippet
Smart mobs consist of people who are able to act in concert even if they don't know each other. The people who make up smart mobs cooperate in ways never before possible because they carry devices that possess both communication and computing capabilities …
- 230000009471 action 0 abstract description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
- G06F15/163—Interprocessor communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/22—Tracking the activity of the user
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Caren et al. | Contemporary social movements in a hybrid media environment | |
Johnson | The self-radicalization of white men:“Fake news” and the affective networking of paranoia | |
Qin et al. | Why does China allow freer social media? Protests versus surveillance and propaganda | |
Agarwal et al. | A model of crowd enabled organization: Theory and methods for understanding the role of twitter in the occupy protests | |
Nhan et al. | Digilantism: An analysis of crowdsourcing and the Boston marathon bombings | |
Beskow et al. | Bot conversations are different: leveraging network metrics for bot detection in twitter | |
Mason et al. | Surveillance studies and violence against women | |
Baeth et al. | An approach to custom privacy policy violation detection problems using big social provenance data | |
Gerdes | Illuminating dark networks: The study of clandestine groups and organizations | |
Al-Khateeb et al. | UNDERSTANDING STRATEGIC INFORMATION MANOEUVRES IN NETWORK MEDIA TO ADVANCE CYBER OPERATIONS: A CASE STUDY ANALYSING PRO-RUSSIAN SEPARATISTS'CYBER INFORMATION OPERATIONS IN CRIMEAN WATER CRISIS. | |
Al-Khateeb et al. | Flash mob: a multidisciplinary review | |
Mirbabaie et al. | Examining convergence behaviour during crisis situations in social media-a case study on the manchester bombing 2017 | |
Johnson et al. | Modeling insurgent dynamics including heterogeneity: A statistical physics approach | |
Rheingold | Smart mobs | |
Bruns | Towards distributed citizen participation: lessons from WikiLeaks and the Queensland Floods | |
CN104111964A (en) | User-read community application data processing method | |
Dwyer et al. | Understanding viral news sharing | |
Benter et al. | The role of social media as a catalyst to insurgency | |
Grindrod et al. | From grievance to martyrdom: A mathematical perspective on the journey of radicalisation | |
Pashentsev | The malicious use of artificial intelligence through agenda setting | |
Xu et al. | Exploiting the spam correlations in scalable online social spam detection | |
Li et al. | Research on network public opinion dissemination and risk management in the blockchain environment | |
Bunnik | Countering and understanding terrorism, extremism, and radicalisation in a big data age | |
Zhang et al. | Decoding activist public opinion in decentralized self-organized protests using llm | |
Chivers | Investigating the dynamics of surveillance and resistance in the information society |