延伸阅读
1、D. Roy et al., "The Human Speech Project," Proceedings of the 28th Annual Conference of Cognitive Science Society, Vancouver, BC, Canada, 26 to 29 July 2009.
2、J. P. Eckmann et al. Proc. Natl. Acad. Sci. U.S.A. 101, 14333 (2004).
3、S. Aral, M. Van Alstyne, "Network Structure & Information Advantage," Proceedings of the Academy of Management Conference, Philadelphia, PA, 3 to 8 August 2007.
4、J.-P. Onnela et al., Proc. Natl. Acad. Sci. U.S.A. 104,7332 (2007).
5、T. Jebara, Y. Song, K. Thadani, "Spectral Clustering and Embedding with Hidden Markov Models," Proceedings of the European Conference on Machine Learning, Philadelphia, PA, 3 to 6 December 2007.
6、M. C. González et al., Nature 453, 779 (2008).
7、D. Watts, Nature 445, 489 (2007).
8、 L. Adamic, N. Glance, in Proceedings of the 3rd International Workshop on Link Discovery (LINKDD 2005), pp. 36–43; 3; http://doi.acm.org/10.1145/1134271.1134277.
9、 J. Teevan, ACM Trans. Inform. Syst. 26, 1 (2008).
10、 W. S. Bainbridge, Science 317, 472 (2007).
11、K. Lewis et al., Social Networks 30, 330 (2008).
12、C. Cardie, J. Wilkerson, J. Inf. Technol. Polit. 5, 1 (2008).
13、M. Barbarao, T. Zeller Jr., "A face is exposed for AOL searcher No. 4417749," New York Times, 9 August 2006, p. A1.
14、National Research Council, Putting People on the Map: Protecting Confidentiality with Linked Social-Spatial Data, M. P. Gutmann, P. Stern, Eds. (National Academy Press, Washington, DC, 2007).
15、J. Felch. "DNA databases blocked from the public," Los Angeles Times, 29 August 2008, p. A31.
16、N. Homer, S. Szelinger, M. Redman, D. Duggan, W. Tembe, PLoS Genet. 4, e1000167 (2008).
17、M. V. A. has applied for a patent on an algorithm for protecting privacy of communication content.
本文首发于微信公众号“集智俱乐部”(ID:swarma_org)