Results 121 to 130 of about 4,000,640 (344)

#TeamFollowBack: Detection & Analysis of Follow Back Accounts on Social Media [PDF]

open access: yesarXiv
Follow back accounts inflate their follower counts by engaging in reciprocal followings. Such accounts manipulate the public and the algorithms by appearing more popular than they really are. Despite their potential harm, no studies have analyzed such accounts at scale.
arxiv  

Accountability in Code Review: The Role of Intrinsic Drivers and the Impact of LLMs [PDF]

open access: yes
Accountability is an innate part of social systems. It maintains stability and ensures positive pressure on individuals' decision-making. As actors in a social system, software developers are accountable to their team and organization for their decisions.
arxiv   +1 more source

Formation Of Accounting Information Of Accounts Receivable And Accounts Payable

open access: yesЕкономічний вісник університету, 2018
The subject of the study is theoretical, methodological and practical aspects of accounting for accounts receivable and payables. The purpose of the study is to determine the peculiarities of management of accounts receivable and payables at Ukrainian enterprises. Methodology of work.
openaire   +3 more sources

A large‐scale retrospective study in metastatic breast cancer patients using circulating tumour DNA and machine learning to predict treatment outcome and progression‐free survival

open access: yesMolecular Oncology, EarlyView.
There is an unmet need in metastatic breast cancer patients to monitor therapy response in real time. In this study, we show how a noninvasive and affordable strategy based on sequencing of plasma samples with longitudinal tracking of tumour fraction paired with a statistical model provides valuable information on treatment response in advance of the ...
Emma J. Beddowes   +20 more
wiley   +1 more source

Mining Anonymity: Identifying Sensitive Accounts on Twitter [PDF]

open access: yesarXiv, 2017
We explore the feasibility of automatically finding accounts that publish sensitive content on Twitter. One natural approach to this problem is to first create a list of sensitive keywords, and then identify Twitter accounts that use these words in their tweets. But such an approach may overlook sensitive accounts that are not covered by the subjective
arxiv  

MET and NF2 alterations confer primary and early resistance to first‐line alectinib treatment in ALK‐positive non‐small‐cell lung cancer

open access: yesMolecular Oncology, EarlyView.
Alectinib resistance in ALK+ NSCLC depends on treatment sequence and EML4‐ALK variants. Variant 1 exhibited off‐target resistance after first‐line treatment, while variant 3 and later lines favored on‐target mutations. Early resistance involved off‐target alterations, like MET and NF2, while on‐target mutations emerged with prolonged therapy.
Jie Hu   +11 more
wiley   +1 more source

Discovering similar Twitter accounts using semantics [PDF]

open access: yesarXiv, 2015
On daily basis, millions of Twitter accounts post a vast number of tweets including numerous Twitter entities (mentions, replies, hashtags, photos, URLs). Many of these entities are used in common by many accounts. The more common entities are found in the messages of two different accounts, the more similar, in terms of content or interest, they tend ...
arxiv  

Home - About - Disclaimer - Privacy