Social Network Analysis
|
|
|
- Myles Lindsey
- 10 years ago
- Views:
Transcription
1 A Brief Introduction to Social Network Analysis Jennifer Roberts
2 Outline Description of Social Network Analysis Sociocentric vs. Egocentric networks Estimating a social network TRANSIMS A case study
3 What is Social Network Analysis (SNA)? An analysis technique which studies Relationships between people and groups How those relationships arise Consequences of the relationships (Christopher McCarty, Director of the UF Survey Research Center) Nodes = people Ties = relationships or interactions
4 Two Types of SNA Egocentric Analysis Focuses on the individual Studies an individual s s personal network and its affects on that individual Sociocentric Analysis Focuses on large groups of people Quantifies relationships between people in a group Studies patterns of interactions and how these patterns affect the group as a whole From redwing.human.net/~mreed/ warriorshtm/ego.htm From
5 Egocentric SNA Examines local network structure Describes the network around a single node (the ego) Number of other nodes (alters) Types of connections Extracts network features Uses these factors to predict health and longevity, economic success, levels of depression, access to new opportunities From showcikk.php?scid=
6 Sociocentric SNA Quantifies relationships and interactions between a group of people Studies how interactions, patterns of interactions, and network structure affect Concentration of power and resources Spread of disease Access to new ideas Group dynamics Raines Laboratory Research Group, U. Wisconsin-Madison
7 Survey and Interview Data Collection Techniques Name generator/name interpreter questions Questions to elicit list of names: Who do you discuss important matters with? Follow-up questions: Reports about that persons attributes, type of tie, ties between pairs of contacts Inflow/outflow of resources Expensive, subject to human error, influenced by the nature of the questions asked
8 Other Data Sources Indirect measures Corporate records, event attendance, co-citations, citations, co- authorship, trading patterns, shared affiliations, , phone calls, computer conferencing Non-invasive, inexpensive Not obvious how indirect measures relate to actual interactions Small scale methods Observation, diaries Experimental
9 Accuracy Surveys accessing validity of people s reports Recall and observation do not match up -- people do not know, with any acceptable accuracy, to whom they talk over any given period of time Evidence that people are good at recalling typical interactions, bad at answering about specific time scales
10 TRANSIM A Method for Estimating Large Social Networks Assumes transportation network constrains interactions Creates a synthetic population Models large-scale human interactions through simulations Used to study transportation planning, disease propagation, mobile communications, and demand within the electric power grid From
11 Creating a Synthetic Population Data Land use and demographic census data Survey data about daily activities Information used to create a synthetic population with List of activities consistent with survey data Access to transportation consistent with survey data
12 Activity Planning and Simulation Creates schedule based on activity lists Optimizes sequential plan based on transportation mode Updates schedule based on current congestion levels Simulation Bipartite graphs contains people nodes and location nodes Simulation updates people s s locations every second
13 Graph Structure Set P of people nodes Set L of location nodes Edge (p, l) indicates p visits l on a normal day L has a power law distribution with = 2.8 Number nodes with degree i equals β P s distribution is concentrated around a small average value
14 CL-Model Theoretical Model Generates graphs based on expected degree sequences Each node is assigned a weight, d(u),, equal to its expected degree Edge probabilities are proportional to node weights and edge assignments are independent = σ σ = =
15 Projection Graphs
16 Results CL, fastgen approximation create networks with similar properties to actual data (fig 1) Also include approx algorithm description, table, graphs of results, projection graphs
Fault Analysis in Software with the Data Interaction of Classes
, pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental
An Empirical Study of Two MIS Algorithms
An Empirical Study of Two MIS Algorithms Email: Tushar Bisht and Kishore Kothapalli International Institute of Information Technology, Hyderabad Hyderabad, Andhra Pradesh, India 32. [email protected],
Borgatti, Steven, Everett, Martin, Johnson, Jeffrey (2013) Analyzing Social Networks Sage
Social Network Analysis in Cultural Anthropology Instructor: Dr. Jeffrey C. Johnson and Dr. Christopher McCarty Email: [email protected] and [email protected] Description and Objectives Social network analysis
Protein Protein Interaction Networks
Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics
Week 3. Network Data; Introduction to Graph Theory and Sociometric Notation
Wasserman, Stanley, and Katherine Faust. 2009. Social Network Analysis: Methods and Applications, Structural Analysis in the Social Sciences. New York, NY: Cambridge University Press. Chapter III: Notation
Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges. Presenter: Sancheng Peng Zhaoqing University
Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges Presenter: Sancheng Peng Zhaoqing University 1 2 3 4 35 46 7 Contents Introduction Relationship between SIA and BD
Introduction to Ego Network Analysis
Introduction to Ego Network Analysis Rich DeJordy Dan Halgin Boston College and the Winston Center for Leadership & Ethics 2008 Halgin & DeJordy Academy of Management PDW Page 1 Goals for Today 1. Introduce
CS171 Visualization. The Visualization Alphabet: Marks and Channels. Alexander Lex [email protected]. [xkcd]
CS171 Visualization Alexander Lex [email protected] The Visualization Alphabet: Marks and Channels [xkcd] This Week Thursday: Task Abstraction, Validation Homework 1 due on Friday! Any more problems
. 1/ CHAPTER- 4 SIMULATION RESULTS & DISCUSSION CHAPTER 4 SIMULATION RESULTS & DISCUSSION 4.1: ANT COLONY OPTIMIZATION BASED ON ESTIMATION OF DISTRIBUTION ACS possesses
Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits
Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique
Distance Degree Sequences for Network Analysis
Universität Konstanz Computer & Information Science Algorithmics Group 15 Mar 2005 based on Palmer, Gibbons, and Faloutsos: ANF A Fast and Scalable Tool for Data Mining in Massive Graphs, SIGKDD 02. Motivation
A Modified Elicitation of Personal Networks Using Dynamic Visualization
CONNECTIONS 26(2): 61-69 2005 INSNA http://www.insna.org/connections-web/volume26-2/6.mccarty.govind.pdf A Modified Elicitation of Personal Networks Using Dynamic Visualization Christopher McCarty 1 Bureau
THE ROLE OF SOCIOGRAMS IN SOCIAL NETWORK ANALYSIS. Maryann Durland Ph.D. EERS Conference 2012 Monday April 20, 10:30-12:00
THE ROLE OF SOCIOGRAMS IN SOCIAL NETWORK ANALYSIS Maryann Durland Ph.D. EERS Conference 2012 Monday April 20, 10:30-12:00 FORMAT OF PRESENTATION Part I SNA overview 10 minutes Part II Sociograms Example
Redesign Options for the Consumer Expenditure Survey
Redesign Options for the Consumer Expenditure Survey Presented at the Consumer Expenditure Survey Redesign Options Workshop Washington, D.C. October 26, 2011 Authors David Cantor, Sid Schneider, Brad Edwards
Social Network Analysis: Visualization Tools
Social Network Analysis: Visualization Tools Dr. oec. Ines Mergel The Program on Networked Governance Kennedy School of Government Harvard University [email protected] Content Assembling network
A Social Network perspective of Conway s Law
A Social Network perspective of Conway s Law Chintan Amrit, Jos Hillegersberg, Kuldeep Kumar Dept of Decision Sciences Erasmus University Rotterdam {camrit, jhillegersberg, kkumar}@fbk.eur.nl 1. Introduction
Graph Mining and Social Network Analysis
Graph Mining and Social Network Analysis Data Mining and Text Mining (UIC 583 @ Politecnico di Milano) References Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques", The Morgan Kaufmann
5. Binary objects labeling
Image Processing - Laboratory 5: Binary objects labeling 1 5. Binary objects labeling 5.1. Introduction In this laboratory an object labeling algorithm which allows you to label distinct objects from a
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms
Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations
Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Jurij Leskovec, CMU Jon Kleinberg, Cornell Christos Faloutsos, CMU 1 Introduction What can we do with graphs? What patterns
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
INFRASTRUCTURE COSTS, BROWNFIELDS VS. GREENFIELDS
INFRASTRUCTURE COSTS, BROWNFIELDS VS. GREENFIELDS EXCERPT, ANALYSIS OF THE ECONOMIC, FISCAL, AND ENVIRONMENTAL IMPACTS OF THE MASSACHUSETTS BROWNFIELDS TAX CREDIT PROGRAM, EVANS PAULL, REDEVELOPMENT ECONOMICS,
Big Ideas in Mathematics
Big Ideas in Mathematics which are important to all mathematics learning. (Adapted from the NCTM Curriculum Focal Points, 2006) The Mathematics Big Ideas are organized using the PA Mathematics Standards
Designing a Poster using MS-PowerPoint
Designing a Poster using MS-PowerPoint TABLE OF CONTENTS Introduction... 3 Main components of a poster... 3 Setting up your poster... 5 Setting up the document size... 5 Configuring the grid and guides...
Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints
Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Michael Bauer, Srinivasan Ravichandran University of Wisconsin-Madison Department of Computer Sciences {bauer, srini}@cs.wisc.edu
Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003
Graph models for the Web and the Internet Elias Koutsoupias University of Athens and UCLA Crete, July 2003 Outline of the lecture Small world phenomenon The shape of the Web graph Searching and navigation
Why Taking This Course? Course Introduction, Descriptive Statistics and Data Visualization. Learning Goals. GENOME 560, Spring 2012
Why Taking This Course? Course Introduction, Descriptive Statistics and Data Visualization GENOME 560, Spring 2012 Data are interesting because they help us understand the world Genomics: Massive Amounts
Max Flow, Min Cut, and Matchings (Solution)
Max Flow, Min Cut, and Matchings (Solution) 1. The figure below shows a flow network on which an s-t flow is shown. The capacity of each edge appears as a label next to the edge, and the numbers in boxes
Social Media Mining. Graph Essentials
Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures
Beginner Modeling Exercises Section 2 Mental Simulation of Simple Positive Feedback
D-4487 Beginner Modeling Exercises Section 2 Mental Simulation of Simple Positive Feedback Stock Flow Growth Factor Prepared for the MIT System Dynamics in Education Project Under the Supervision of Dr.
Integrated System Modeling for Handling Big Data in Electric Utility Systems
Integrated System Modeling for Handling Big Data in Electric Utility Systems Stephanie Hamilton Brookhaven National Laboratory Robert Broadwater EDD [email protected] 1 Finding Good Solutions for the Hard
SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis
SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: [email protected] October 17, 2015 Outline
Optimization of ETL Work Flow in Data Warehouse
Optimization of ETL Work Flow in Data Warehouse Kommineni Sivaganesh M.Tech Student, CSE Department, Anil Neerukonda Institute of Technology & Science Visakhapatnam, India. [email protected] P Srinivasu
Statistical Analysis of Complete Social Networks
Statistical Analysis of Complete Social Networks Introduction to networks Christian Steglich [email protected] median geodesic distance between groups 1.8 1.2 0.6 transitivity 0.0 0.0 0.5 1.0 1.5 2.0
Comparisons between HTCP and GridFTP over file transfer
Comparisons between HTCP and GridFTP over file transfer Andrew McNab and Yibiao Li Abstract: A comparison between GridFTP [1] and HTCP [2] protocols on file transfer speed is given here, based on experimental
COS 116 The Computational Universe Laboratory 9: Virus and Worm Propagation in Networks
COS 116 The Computational Universe Laboratory 9: Virus and Worm Propagation in Networks You learned in lecture about computer viruses and worms. In this lab you will study virus propagation at the quantitative
Feature Selection vs. Extraction
Feature Selection In many applications, we often encounter a very large number of potential features that can be used Which subset of features should be used for the best classification? Need for a small
Research on the UHF RFID Channel Coding Technology based on Simulink
Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai
SIMULATION OF LOAD BALANCING ALGORITHMS: A Comparative Study
SIMULATION OF LOAD BALANCING ALGORITHMS: A Comparative Study Milan E. Soklic Abstract This article introduces a new load balancing algorithm, called diffusive load balancing, and compares its performance
How to Design Text Mining Services for Marketing Applications
How to Design Text Mining Services for Marketing Applications Prof. Dr. Thorsten Teichert Universität Hamburg Arbeitsbereich Marketing und Innovation Von-Melle-Park 5 Raum 3078 (Sekretariat) 20146 Hamburg
NETZCOPE - a tool to analyze and display complex R&D collaboration networks
The Task Concepts from Spectral Graph Theory EU R&D Network Analysis Netzcope Screenshots NETZCOPE - a tool to analyze and display complex R&D collaboration networks L. Streit & O. Strogan BiBoS, Univ.
Quantifying Medication Adherence: Practical Challenges and an Approach to Linking Alternative Measures
Quantifying Medication Adherence: Practical Challenges and an Approach to Linking Alternative Measures Christine Poulos, PhD, RTI Health Solutions Jay P. Bae, PhD, Eli Lilly and Company Sean D. Candrilli,
Model, Analyze and Optimize the Supply Chain
Model, Analyze and Optimize the Supply Chain Optimize networks Improve product flow Right-size inventory Simulate service Balance production Optimize routes The Leading Supply Chain Design and Analysis
Eye Tracking on a Paper Survey: Implications for Design
Eye Tracking on a Paper Survey: Implications for Design Lauren Walton 1, Jennifer Romano Bergstrom 2, David Charles Hawkins 2, Christine Pierce 1 1 The Nielsen Company, Tampa, Florida {lauren.walton, christine.pierce}@nielsen.com
Evaluating Software Products - A Case Study
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATION: A CASE STUDY ON GAMES Özge Bengur 1 and Banu Günel 2 Informatics Institute, Middle East Technical University, Ankara, Turkey
Big Data Mining Services and Knowledge Discovery Applications on Clouds
Big Data Mining Services and Knowledge Discovery Applications on Clouds Domenico Talia DIMES, Università della Calabria & DtoK Lab Italy [email protected] Data Availability or Data Deluge? Some decades
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
Introduction to social network analysis
Introduction to social network analysis Paola Tubaro University of Greenwich, London 26 March 2012 Introduction to social network analysis Introduction Introducing SNA Rise of online social networking
Revenue s Business Context
Analytics and Risk Examples from Research & Analytics Branch Duncan Cleary [email protected] http://www.linkedin.com/in/duncancleary Research & Analytics Branch DATA - INFORMATION - KNOWLEDGE 1 Revenue
Evaluation of a New Method for Measuring the Internet Degree Distribution: Simulation Results
Evaluation of a New Method for Measuring the Internet Distribution: Simulation Results Christophe Crespelle and Fabien Tarissan LIP6 CNRS and Université Pierre et Marie Curie Paris 6 4 avenue du président
Experiment #1, Analyze Data using Excel, Calculator and Graphs.
Physics 182 - Fall 2014 - Experiment #1 1 Experiment #1, Analyze Data using Excel, Calculator and Graphs. 1 Purpose (5 Points, Including Title. Points apply to your lab report.) Before we start measuring
Empirical Software Engineering Introduction & Basic Concepts
Empirical Software Engineering Introduction & Basic Concepts Dietmar Winkler Vienna University of Technology Institute of Software Technology and Interactive Systems [email protected]
1.1 Difficulty in Fault Localization in Large-Scale Computing Systems
Chapter 1 Introduction System failures have been one of the biggest obstacles in operating today s largescale computing systems. Fault localization, i.e., identifying direct or indirect causes of failures,
Computer Forensics Application. ebay-uab Collaborative Research: Product Image Analysis for Authorship Identification
Computer Forensics Application ebay-uab Collaborative Research: Product Image Analysis for Authorship Identification Project Overview A new framework that provides additional clues extracted from images
In-network Monitoring and Control Policy for DVFS of CMP Networkson-Chip and Last Level Caches
In-network Monitoring and Control Policy for DVFS of CMP Networkson-Chip and Last Level Caches Xi Chen 1, Zheng Xu 1, Hyungjun Kim 1, Paul V. Gratz 1, Jiang Hu 1, Michael Kishinevsky 2 and Umit Ogras 2
On the effect of forwarding table size on SDN network utilization
IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz
Online Semi-Supervised Learning
Online Semi-Supervised Learning Andrew B. Goldberg, Ming Li, Xiaojin Zhu [email protected] Computer Sciences University of Wisconsin Madison Xiaojin Zhu (Univ. Wisconsin-Madison) Online Semi-Supervised
CSV886: Social, Economics and Business Networks. Lecture 2: Affiliation and Balance. R Ravi [email protected]
CSV886: Social, Economics and Business Networks Lecture 2: Affiliation and Balance R Ravi [email protected] Granovetter s Puzzle Resolved Strong Triadic Closure holds in most nodes in social networks
Analysis of Algorithms, I
Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications
What Is Probability?
1 What Is Probability? The idea: Uncertainty can often be "quantified" i.e., we can talk about degrees of certainty or uncertainty. This is the idea of probability: a higher probability expresses a higher
NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics
NP-complete? NP-hard? Some Foundations of Complexity Prof. Sven Hartmann Clausthal University of Technology Department of Informatics Tractability of Problems Some problems are undecidable: no computer
People centric sensing Leveraging mobile technologies to infer human activities. Applications. History of Sensing Platforms
People centric sensing People centric sensing Leveraging mobile technologies to infer human activities People centric sensing will help [ ] by enabling a different way to sense, learn, visualize, and share
Off-line Model Simplification for Interactive Rigid Body Dynamics Simulations Satyandra K. Gupta University of Maryland, College Park
NSF GRANT # 0727380 NSF PROGRAM NAME: Engineering Design Off-line Model Simplification for Interactive Rigid Body Dynamics Simulations Satyandra K. Gupta University of Maryland, College Park Atul Thakur
Practical Graph Mining with R. 5. Link Analysis
Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities
A computational model for MapReduce job flow
A computational model for MapReduce job flow Tommaso Di Noia, Marina Mongiello, Eugenio Di Sciascio Dipartimento di Ingegneria Elettrica e Dell informazione Politecnico di Bari Via E. Orabona, 4 70125
SOCIAL NETWORK ANALYSIS EVALUATING THE CUSTOMER S INFLUENCE FACTOR OVER BUSINESS EVENTS
SOCIAL NETWORK ANALYSIS EVALUATING THE CUSTOMER S INFLUENCE FACTOR OVER BUSINESS EVENTS Carlos Andre Reis Pinheiro 1 and Markus Helfert 2 1 School of Computing, Dublin City University, Dublin, Ireland
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia [email protected] Eugene Kalishenko Saint Petersburg
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Satyajeet S. Ahuja, Srinivasan Ramasubramanian, and Marwan Krunz Department of ECE, University of Arizona, Tucson,
Simulating Traffic for Incident Management and ITS Investment Decisions
1998 TRANSPORTATION CONFERENCE PROCEEDINGS 7 Simulating Traffic for Incident Management and ITS Investment Decisions MICHAEL D. ANDERSON AND REGINALD R. SOULEYRETTE UTPS-type models were designed to adequately
Numerical Calculation of Laminar Flame Propagation with Parallelism Assignment ZERO, CS 267, UC Berkeley, Spring 2015
Numerical Calculation of Laminar Flame Propagation with Parallelism Assignment ZERO, CS 267, UC Berkeley, Spring 2015 Xian Shi 1 bio I am a second-year Ph.D. student from Combustion Analysis/Modeling Lab,
Travis Goodwin & Sanda Harabagiu
Automatic Generation of a Qualified Medical Knowledge Graph and its Usage for Retrieving Patient Cohorts from Electronic Medical Records Travis Goodwin & Sanda Harabagiu Human Language Technology Research
SIGMOD RWE Review Towards Proximity Pattern Mining in Large Graphs
SIGMOD RWE Review Towards Proximity Pattern Mining in Large Graphs Fabian Hueske, TU Berlin June 26, 21 1 Review This document is a review report on the paper Towards Proximity Pattern Mining in Large
Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data
CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear
Locality Based Protocol for MultiWriter Replication systems
Locality Based Protocol for MultiWriter Replication systems Lei Gao Department of Computer Science The University of Texas at Austin [email protected] One of the challenging problems in building replication
Distributed Dynamic Load Balancing for Iterative-Stencil Applications
Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,
Exploring Sociocentric and Egocentric Approaches for Social Network Analysis
Exploring Sociocentric and Egocentric Approaches for Social Network Analysis Kenneth K S Chung School of Information Technologies University of Sydney NSW 2006, Australia +61 9351 4914 [email protected]
Effects of node buffer and capacity on network traffic
Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,
Use of Text Messaging to Increase Response Rates
Use of Text Messaging to Increase Response Rates Key words: BRFSS, response rate, cell phones, smart phones, text message Prepared by: Piper DuBray, Kristie Healey ICF International 0 Introduction Survey
Simulation of Residual Stresses in an Induction Hardened Roll
2.6.4 Simulation of Residual Stresses in an Induction Hardened Roll Ludwig Hellenthal, Clemens Groth Walzen Irle GmbH, Netphen-Deuz, Germany CADFEM GmbH, Burgdorf/Hannover, Germany Summary A heat treatment
What is SNA? A sociogram showing ties
Case Western Reserve University School of Medicine Social Network Analysis: Nuts & Bolts Papp KK 1, Zhang GQ 2 1 Director, Program Evaluation, CTSC, 2 Professor, Electrical Engineering and Computer Science,
Intrusion Log Sharing University of Wisconsin-Madison
Intrusion Log Sharing University of Wisconsin-Madison John Bethencourt ([email protected]) Jason Franklin ([email protected]) Mary Vernon ([email protected]) 1 Talk Outline Background: Blacklists,
A Comparison of General Approaches to Multiprocessor Scheduling
A Comparison of General Approaches to Multiprocessor Scheduling Jing-Chiou Liou AT&T Laboratories Middletown, NJ 0778, USA [email protected] Michael A. Palis Department of Computer Science Rutgers University
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
STEADYSUN THEnergy white paper. Energy Generation Forecasting in Solar-Diesel-Hybrid Applications
STEADYSUN THEnergy white paper Energy Generation Forecasting in Solar-Diesel-Hybrid Applications April 2016 Content 1 Introduction... 3 2 Weather forecasting for solar-diesel hybrid systems... 4 2.1 The
