Moozonian

About 0 results
AI Overview
Generating...
Sponsored • AdSense Integration Active
Corrected by Entity Network
www.bing.com Bing
bing.com › ck › a?!&am...QvYWxlcnRz&ntb=1
Novel Updates Forum
We would like to show you a description here but the site won’t allow us.
arxiv.org arXiv
arxiv.org › abs › 2307.09634v1
Power to the teens? A model of parents' and teens' collective labor supply
Teens make life-changing decisions while constrained by the needs and resources of the households they grow up in. Household behavior models frequently delegate decision-making to the teen or their pa...
arxiv.org arXiv
arxiv.org › abs › cond-mat › 0009020v1
The Thermodynamics of Social Processes: The Teen Birth Phenomenon
We argue that a process of social interest is a balance of order and randomness, thereby producing a departure from a stationary diffusion process. The strength of this effect vanishes if the order to...
arxiv.org arXiv
arxiv.org › abs › physics › 0301058v1
Scaling in Non-stationary Time Series II: Teen Birth Phenomenon
This paper is devoted to the problem of statistical mechanics raised by the analysis of an issue of sociological interest: the teen birth phenomenon. It is expected that these data are characterized b...
arxiv.org arXiv
arxiv.org › abs › 2210.12269v1
Variations on the Missionaries and Cannibals Problem
We explore both automated and human approaches to the generalized Missionaries and Cannibals problem....
arxiv.org arXiv
arxiv.org › abs › cond-mat › 0205524v1
Non-extensive diffusion entropy analysis: non-stationarity in teen birth phenomena
A complex process is often a balance between non-stationary and stationary components. We show how the non-extensive Tsallis q-entropy indicator may be interpreted as a measure of non-stationarity in ...
arxiv.org arXiv
arxiv.org › abs › 2410.22967v4
Adaptive NAD: Online and Self-adaptive Unsupervised Network Anomaly Detector
The widespread usage of the Internet of Things (IoT) has raised the risks of cyber threats, thus developing Anomaly Detection Systems (ADSs) that can adapt to evolving or new attacks is critical. Prev...
arxiv.org arXiv
arxiv.org › abs › 2601.13516v1
From "Fail Fast" to "Mature Safely:" Expert Perspectives as Secondary Stakeholders on Teen-Centered Social Media Risk Detection
In addressing various risks on social media, the HCI community has advocated for teen-centered risk detection technologies over platform-based, parent-centered features. However, their real-world viab...
arxiv.org arXiv
arxiv.org › abs › 2502.06985v1
"It's Great Because It's Ran By Us": Empowering Teen Volunteer Discord Moderators to Design Healthy and Engaging Youth-Led Online Communities
Online communities can offer many benefits for youth including peer learning, cultural expression, and skill development. However, most HCI research on youth-focused online communities has centered co...
arxiv.org arXiv
arxiv.org › abs › 2601.21518v2
From Vulnerable to Resilient: Examining Parent and Teen Perceptions on How to Respond to Unwanted Cybergrooming Advances
Cybergrooming is a form of online abuse that threatens teens' mental health and physical safety. Yet, most prior work has focused on detecting perpetrators' behaviors, leaving a limited understanding ...
arxiv.org arXiv
arxiv.org › abs › 1510.05192v1
Three Hours a Day: Understanding Current Teen Practices of Smartphone Application Use
Teens are using mobile devices for an increasing number of activities. Smartphones and a variety of mobile apps for communication, entertainment, and productivity have become an integral part of their...