Social Network Analysis

Size: px
Start display at page:

Download "Social Network Analysis"

Transcription

1 A Brief Introduction to Social Network Analysis Jennifer Roberts

2 Outline Description of Social Network Analysis Sociocentric vs. Egocentric networks Estimating a social network TRANSIMS A case study

3 What is Social Network Analysis (SNA)? An analysis technique which studies Relationships between people and groups How those relationships arise Consequences of the relationships (Christopher McCarty, Director of the UF Survey Research Center) Nodes = people Ties = relationships or interactions

4 Two Types of SNA Egocentric Analysis Focuses on the individual Studies an individual s s personal network and its affects on that individual Sociocentric Analysis Focuses on large groups of people Quantifies relationships between people in a group Studies patterns of interactions and how these patterns affect the group as a whole From redwing.human.net/~mreed/ warriorshtm/ego.htm From

5 Egocentric SNA Examines local network structure Describes the network around a single node (the ego) Number of other nodes (alters) Types of connections Extracts network features Uses these factors to predict health and longevity, economic success, levels of depression, access to new opportunities From showcikk.php?scid=

6 Sociocentric SNA Quantifies relationships and interactions between a group of people Studies how interactions, patterns of interactions, and network structure affect Concentration of power and resources Spread of disease Access to new ideas Group dynamics Raines Laboratory Research Group, U. Wisconsin-Madison

7 Survey and Interview Data Collection Techniques Name generator/name interpreter questions Questions to elicit list of names: Who do you discuss important matters with? Follow-up questions: Reports about that persons attributes, type of tie, ties between pairs of contacts Inflow/outflow of resources Expensive, subject to human error, influenced by the nature of the questions asked

8 Other Data Sources Indirect measures Corporate records, event attendance, co-citations, citations, co- authorship, trading patterns, shared affiliations, , phone calls, computer conferencing Non-invasive, inexpensive Not obvious how indirect measures relate to actual interactions Small scale methods Observation, diaries Experimental

9 Accuracy Surveys accessing validity of people s reports Recall and observation do not match up -- people do not know, with any acceptable accuracy, to whom they talk over any given period of time Evidence that people are good at recalling typical interactions, bad at answering about specific time scales

10 TRANSIM A Method for Estimating Large Social Networks Assumes transportation network constrains interactions Creates a synthetic population Models large-scale human interactions through simulations Used to study transportation planning, disease propagation, mobile communications, and demand within the electric power grid From

11 Creating a Synthetic Population Data Land use and demographic census data Survey data about daily activities Information used to create a synthetic population with List of activities consistent with survey data Access to transportation consistent with survey data

12 Activity Planning and Simulation Creates schedule based on activity lists Optimizes sequential plan based on transportation mode Updates schedule based on current congestion levels Simulation Bipartite graphs contains people nodes and location nodes Simulation updates people s s locations every second

13 Graph Structure Set P of people nodes Set L of location nodes Edge (p, l) indicates p visits l on a normal day L has a power law distribution with = 2.8 Number nodes with degree i equals β P s distribution is concentrated around a small average value

14 CL-Model Theoretical Model Generates graphs based on expected degree sequences Each node is assigned a weight, d(u),, equal to its expected degree Edge probabilities are proportional to node weights and edge assignments are independent = σ σ = =

15 Projection Graphs

16 Results CL, fastgen approximation create networks with similar properties to actual data (fig 1) Also include approx algorithm description, table, graphs of results, projection graphs

Fault Analysis in Software with the Data Interaction of Classes

Fault Analysis in Software with the Data Interaction of Classes , pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental

More information

An Empirical Study of Two MIS Algorithms

An Empirical Study of Two MIS Algorithms An Empirical Study of Two MIS Algorithms Email: Tushar Bisht and Kishore Kothapalli International Institute of Information Technology, Hyderabad Hyderabad, Andhra Pradesh, India 32. [email protected],

More information

Borgatti, Steven, Everett, Martin, Johnson, Jeffrey (2013) Analyzing Social Networks Sage

Borgatti, Steven, Everett, Martin, Johnson, Jeffrey (2013) Analyzing Social Networks Sage Social Network Analysis in Cultural Anthropology Instructor: Dr. Jeffrey C. Johnson and Dr. Christopher McCarty Email: [email protected] and [email protected] Description and Objectives Social network analysis

More information

Protein Protein Interaction Networks

Protein Protein Interaction Networks Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics

More information

Week 3. Network Data; Introduction to Graph Theory and Sociometric Notation

Week 3. Network Data; Introduction to Graph Theory and Sociometric Notation Wasserman, Stanley, and Katherine Faust. 2009. Social Network Analysis: Methods and Applications, Structural Analysis in the Social Sciences. New York, NY: Cambridge University Press. Chapter III: Notation

More information

Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges. Presenter: Sancheng Peng Zhaoqing University

Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges. Presenter: Sancheng Peng Zhaoqing University Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges Presenter: Sancheng Peng Zhaoqing University 1 2 3 4 35 46 7 Contents Introduction Relationship between SIA and BD

More information

Introduction to Ego Network Analysis

Introduction to Ego Network Analysis Introduction to Ego Network Analysis Rich DeJordy Dan Halgin Boston College and the Winston Center for Leadership & Ethics 2008 Halgin & DeJordy Academy of Management PDW Page 1 Goals for Today 1. Introduce

More information

CS171 Visualization. The Visualization Alphabet: Marks and Channels. Alexander Lex [email protected]. [xkcd]

CS171 Visualization. The Visualization Alphabet: Marks and Channels. Alexander Lex alex@seas.harvard.edu. [xkcd] CS171 Visualization Alexander Lex [email protected] The Visualization Alphabet: Marks and Channels [xkcd] This Week Thursday: Task Abstraction, Validation Homework 1 due on Friday! Any more problems

More information

. 1/ CHAPTER- 4 SIMULATION RESULTS & DISCUSSION CHAPTER 4 SIMULATION RESULTS & DISCUSSION 4.1: ANT COLONY OPTIMIZATION BASED ON ESTIMATION OF DISTRIBUTION ACS possesses

More information

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique

More information

Distance Degree Sequences for Network Analysis

Distance Degree Sequences for Network Analysis Universität Konstanz Computer & Information Science Algorithmics Group 15 Mar 2005 based on Palmer, Gibbons, and Faloutsos: ANF A Fast and Scalable Tool for Data Mining in Massive Graphs, SIGKDD 02. Motivation

More information

A Modified Elicitation of Personal Networks Using Dynamic Visualization

A Modified Elicitation of Personal Networks Using Dynamic Visualization CONNECTIONS 26(2): 61-69 2005 INSNA http://www.insna.org/connections-web/volume26-2/6.mccarty.govind.pdf A Modified Elicitation of Personal Networks Using Dynamic Visualization Christopher McCarty 1 Bureau

More information

THE ROLE OF SOCIOGRAMS IN SOCIAL NETWORK ANALYSIS. Maryann Durland Ph.D. EERS Conference 2012 Monday April 20, 10:30-12:00

THE ROLE OF SOCIOGRAMS IN SOCIAL NETWORK ANALYSIS. Maryann Durland Ph.D. EERS Conference 2012 Monday April 20, 10:30-12:00 THE ROLE OF SOCIOGRAMS IN SOCIAL NETWORK ANALYSIS Maryann Durland Ph.D. EERS Conference 2012 Monday April 20, 10:30-12:00 FORMAT OF PRESENTATION Part I SNA overview 10 minutes Part II Sociograms Example

More information

Redesign Options for the Consumer Expenditure Survey

Redesign Options for the Consumer Expenditure Survey Redesign Options for the Consumer Expenditure Survey Presented at the Consumer Expenditure Survey Redesign Options Workshop Washington, D.C. October 26, 2011 Authors David Cantor, Sid Schneider, Brad Edwards

More information

Social Network Analysis: Visualization Tools

Social Network Analysis: Visualization Tools Social Network Analysis: Visualization Tools Dr. oec. Ines Mergel The Program on Networked Governance Kennedy School of Government Harvard University [email protected] Content Assembling network

More information

A Social Network perspective of Conway s Law

A Social Network perspective of Conway s Law A Social Network perspective of Conway s Law Chintan Amrit, Jos Hillegersberg, Kuldeep Kumar Dept of Decision Sciences Erasmus University Rotterdam {camrit, jhillegersberg, kkumar}@fbk.eur.nl 1. Introduction

More information

Graph Mining and Social Network Analysis

Graph Mining and Social Network Analysis Graph Mining and Social Network Analysis Data Mining and Text Mining (UIC 583 @ Politecnico di Milano) References Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques", The Morgan Kaufmann

More information

5. Binary objects labeling

5. Binary objects labeling Image Processing - Laboratory 5: Binary objects labeling 1 5. Binary objects labeling 5.1. Introduction In this laboratory an object labeling algorithm which allows you to label distinct objects from a

More information

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms

More information

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Jurij Leskovec, CMU Jon Kleinberg, Cornell Christos Faloutsos, CMU 1 Introduction What can we do with graphs? What patterns

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

INFRASTRUCTURE COSTS, BROWNFIELDS VS. GREENFIELDS

INFRASTRUCTURE COSTS, BROWNFIELDS VS. GREENFIELDS INFRASTRUCTURE COSTS, BROWNFIELDS VS. GREENFIELDS EXCERPT, ANALYSIS OF THE ECONOMIC, FISCAL, AND ENVIRONMENTAL IMPACTS OF THE MASSACHUSETTS BROWNFIELDS TAX CREDIT PROGRAM, EVANS PAULL, REDEVELOPMENT ECONOMICS,

More information

Big Ideas in Mathematics

Big Ideas in Mathematics Big Ideas in Mathematics which are important to all mathematics learning. (Adapted from the NCTM Curriculum Focal Points, 2006) The Mathematics Big Ideas are organized using the PA Mathematics Standards

More information

Designing a Poster using MS-PowerPoint

Designing a Poster using MS-PowerPoint Designing a Poster using MS-PowerPoint TABLE OF CONTENTS Introduction... 3 Main components of a poster... 3 Setting up your poster... 5 Setting up the document size... 5 Configuring the grid and guides...

More information

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Michael Bauer, Srinivasan Ravichandran University of Wisconsin-Madison Department of Computer Sciences {bauer, srini}@cs.wisc.edu

More information

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003 Graph models for the Web and the Internet Elias Koutsoupias University of Athens and UCLA Crete, July 2003 Outline of the lecture Small world phenomenon The shape of the Web graph Searching and navigation

More information

Why Taking This Course? Course Introduction, Descriptive Statistics and Data Visualization. Learning Goals. GENOME 560, Spring 2012

Why Taking This Course? Course Introduction, Descriptive Statistics and Data Visualization. Learning Goals. GENOME 560, Spring 2012 Why Taking This Course? Course Introduction, Descriptive Statistics and Data Visualization GENOME 560, Spring 2012 Data are interesting because they help us understand the world Genomics: Massive Amounts

More information

Max Flow, Min Cut, and Matchings (Solution)

Max Flow, Min Cut, and Matchings (Solution) Max Flow, Min Cut, and Matchings (Solution) 1. The figure below shows a flow network on which an s-t flow is shown. The capacity of each edge appears as a label next to the edge, and the numbers in boxes

More information

Social Media Mining. Graph Essentials

Social Media Mining. Graph Essentials Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures

More information

Beginner Modeling Exercises Section 2 Mental Simulation of Simple Positive Feedback

Beginner Modeling Exercises Section 2 Mental Simulation of Simple Positive Feedback D-4487 Beginner Modeling Exercises Section 2 Mental Simulation of Simple Positive Feedback Stock Flow Growth Factor Prepared for the MIT System Dynamics in Education Project Under the Supervision of Dr.

More information

Integrated System Modeling for Handling Big Data in Electric Utility Systems

Integrated System Modeling for Handling Big Data in Electric Utility Systems Integrated System Modeling for Handling Big Data in Electric Utility Systems Stephanie Hamilton Brookhaven National Laboratory Robert Broadwater EDD [email protected] 1 Finding Good Solutions for the Hard

More information

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: [email protected] October 17, 2015 Outline

More information

Optimization of ETL Work Flow in Data Warehouse

Optimization of ETL Work Flow in Data Warehouse Optimization of ETL Work Flow in Data Warehouse Kommineni Sivaganesh M.Tech Student, CSE Department, Anil Neerukonda Institute of Technology & Science Visakhapatnam, India. [email protected] P Srinivasu

More information

Statistical Analysis of Complete Social Networks

Statistical Analysis of Complete Social Networks Statistical Analysis of Complete Social Networks Introduction to networks Christian Steglich [email protected] median geodesic distance between groups 1.8 1.2 0.6 transitivity 0.0 0.0 0.5 1.0 1.5 2.0

More information

Comparisons between HTCP and GridFTP over file transfer

Comparisons between HTCP and GridFTP over file transfer Comparisons between HTCP and GridFTP over file transfer Andrew McNab and Yibiao Li Abstract: A comparison between GridFTP [1] and HTCP [2] protocols on file transfer speed is given here, based on experimental

More information

COS 116 The Computational Universe Laboratory 9: Virus and Worm Propagation in Networks

COS 116 The Computational Universe Laboratory 9: Virus and Worm Propagation in Networks COS 116 The Computational Universe Laboratory 9: Virus and Worm Propagation in Networks You learned in lecture about computer viruses and worms. In this lab you will study virus propagation at the quantitative

More information

Feature Selection vs. Extraction

Feature Selection vs. Extraction Feature Selection In many applications, we often encounter a very large number of potential features that can be used Which subset of features should be used for the best classification? Need for a small

More information

Research on the UHF RFID Channel Coding Technology based on Simulink

Research on the UHF RFID Channel Coding Technology based on Simulink Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai

More information

SIMULATION OF LOAD BALANCING ALGORITHMS: A Comparative Study

SIMULATION OF LOAD BALANCING ALGORITHMS: A Comparative Study SIMULATION OF LOAD BALANCING ALGORITHMS: A Comparative Study Milan E. Soklic Abstract This article introduces a new load balancing algorithm, called diffusive load balancing, and compares its performance

More information

How to Design Text Mining Services for Marketing Applications

How to Design Text Mining Services for Marketing Applications How to Design Text Mining Services for Marketing Applications Prof. Dr. Thorsten Teichert Universität Hamburg Arbeitsbereich Marketing und Innovation Von-Melle-Park 5 Raum 3078 (Sekretariat) 20146 Hamburg

More information

NETZCOPE - a tool to analyze and display complex R&D collaboration networks

NETZCOPE - a tool to analyze and display complex R&D collaboration networks The Task Concepts from Spectral Graph Theory EU R&D Network Analysis Netzcope Screenshots NETZCOPE - a tool to analyze and display complex R&D collaboration networks L. Streit & O. Strogan BiBoS, Univ.

More information

Quantifying Medication Adherence: Practical Challenges and an Approach to Linking Alternative Measures

Quantifying Medication Adherence: Practical Challenges and an Approach to Linking Alternative Measures Quantifying Medication Adherence: Practical Challenges and an Approach to Linking Alternative Measures Christine Poulos, PhD, RTI Health Solutions Jay P. Bae, PhD, Eli Lilly and Company Sean D. Candrilli,

More information

Model, Analyze and Optimize the Supply Chain

Model, Analyze and Optimize the Supply Chain Model, Analyze and Optimize the Supply Chain Optimize networks Improve product flow Right-size inventory Simulate service Balance production Optimize routes The Leading Supply Chain Design and Analysis

More information

Eye Tracking on a Paper Survey: Implications for Design

Eye Tracking on a Paper Survey: Implications for Design Eye Tracking on a Paper Survey: Implications for Design Lauren Walton 1, Jennifer Romano Bergstrom 2, David Charles Hawkins 2, Christine Pierce 1 1 The Nielsen Company, Tampa, Florida {lauren.walton, christine.pierce}@nielsen.com

More information

Evaluating Software Products - A Case Study

Evaluating Software Products - A Case Study LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATION: A CASE STUDY ON GAMES Özge Bengur 1 and Banu Günel 2 Informatics Institute, Middle East Technical University, Ankara, Turkey

More information

Big Data Mining Services and Knowledge Discovery Applications on Clouds

Big Data Mining Services and Knowledge Discovery Applications on Clouds Big Data Mining Services and Knowledge Discovery Applications on Clouds Domenico Talia DIMES, Università della Calabria & DtoK Lab Italy [email protected] Data Availability or Data Deluge? Some decades

More information

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually

More information

Introduction to social network analysis

Introduction to social network analysis Introduction to social network analysis Paola Tubaro University of Greenwich, London 26 March 2012 Introduction to social network analysis Introduction Introducing SNA Rise of online social networking

More information

Revenue s Business Context

Revenue s Business Context Analytics and Risk Examples from Research & Analytics Branch Duncan Cleary [email protected] http://www.linkedin.com/in/duncancleary Research & Analytics Branch DATA - INFORMATION - KNOWLEDGE 1 Revenue

More information

Evaluation of a New Method for Measuring the Internet Degree Distribution: Simulation Results

Evaluation of a New Method for Measuring the Internet Degree Distribution: Simulation Results Evaluation of a New Method for Measuring the Internet Distribution: Simulation Results Christophe Crespelle and Fabien Tarissan LIP6 CNRS and Université Pierre et Marie Curie Paris 6 4 avenue du président

More information

Experiment #1, Analyze Data using Excel, Calculator and Graphs.

Experiment #1, Analyze Data using Excel, Calculator and Graphs. Physics 182 - Fall 2014 - Experiment #1 1 Experiment #1, Analyze Data using Excel, Calculator and Graphs. 1 Purpose (5 Points, Including Title. Points apply to your lab report.) Before we start measuring

More information

Empirical Software Engineering Introduction & Basic Concepts

Empirical Software Engineering Introduction & Basic Concepts Empirical Software Engineering Introduction & Basic Concepts Dietmar Winkler Vienna University of Technology Institute of Software Technology and Interactive Systems [email protected]

More information

1.1 Difficulty in Fault Localization in Large-Scale Computing Systems

1.1 Difficulty in Fault Localization in Large-Scale Computing Systems Chapter 1 Introduction System failures have been one of the biggest obstacles in operating today s largescale computing systems. Fault localization, i.e., identifying direct or indirect causes of failures,

More information

Computer Forensics Application. ebay-uab Collaborative Research: Product Image Analysis for Authorship Identification

Computer Forensics Application. ebay-uab Collaborative Research: Product Image Analysis for Authorship Identification Computer Forensics Application ebay-uab Collaborative Research: Product Image Analysis for Authorship Identification Project Overview A new framework that provides additional clues extracted from images

More information

In-network Monitoring and Control Policy for DVFS of CMP Networkson-Chip and Last Level Caches

In-network Monitoring and Control Policy for DVFS of CMP Networkson-Chip and Last Level Caches In-network Monitoring and Control Policy for DVFS of CMP Networkson-Chip and Last Level Caches Xi Chen 1, Zheng Xu 1, Hyungjun Kim 1, Paul V. Gratz 1, Jiang Hu 1, Michael Kishinevsky 2 and Umit Ogras 2

More information

On the effect of forwarding table size on SDN network utilization

On the effect of forwarding table size on SDN network utilization IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz

More information

Online Semi-Supervised Learning

Online Semi-Supervised Learning Online Semi-Supervised Learning Andrew B. Goldberg, Ming Li, Xiaojin Zhu [email protected] Computer Sciences University of Wisconsin Madison Xiaojin Zhu (Univ. Wisconsin-Madison) Online Semi-Supervised

More information

CSV886: Social, Economics and Business Networks. Lecture 2: Affiliation and Balance. R Ravi [email protected]

CSV886: Social, Economics and Business Networks. Lecture 2: Affiliation and Balance. R Ravi ravi+iitd@andrew.cmu.edu CSV886: Social, Economics and Business Networks Lecture 2: Affiliation and Balance R Ravi [email protected] Granovetter s Puzzle Resolved Strong Triadic Closure holds in most nodes in social networks

More information

Analysis of Algorithms, I

Analysis of Algorithms, I Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications

More information

What Is Probability?

What Is Probability? 1 What Is Probability? The idea: Uncertainty can often be "quantified" i.e., we can talk about degrees of certainty or uncertainty. This is the idea of probability: a higher probability expresses a higher

More information

NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics

NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics NP-complete? NP-hard? Some Foundations of Complexity Prof. Sven Hartmann Clausthal University of Technology Department of Informatics Tractability of Problems Some problems are undecidable: no computer

More information

People centric sensing Leveraging mobile technologies to infer human activities. Applications. History of Sensing Platforms

People centric sensing Leveraging mobile technologies to infer human activities. Applications. History of Sensing Platforms People centric sensing People centric sensing Leveraging mobile technologies to infer human activities People centric sensing will help [ ] by enabling a different way to sense, learn, visualize, and share

More information

Off-line Model Simplification for Interactive Rigid Body Dynamics Simulations Satyandra K. Gupta University of Maryland, College Park

Off-line Model Simplification for Interactive Rigid Body Dynamics Simulations Satyandra K. Gupta University of Maryland, College Park NSF GRANT # 0727380 NSF PROGRAM NAME: Engineering Design Off-line Model Simplification for Interactive Rigid Body Dynamics Simulations Satyandra K. Gupta University of Maryland, College Park Atul Thakur

More information

Practical Graph Mining with R. 5. Link Analysis

Practical Graph Mining with R. 5. Link Analysis Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities

More information

A computational model for MapReduce job flow

A computational model for MapReduce job flow A computational model for MapReduce job flow Tommaso Di Noia, Marina Mongiello, Eugenio Di Sciascio Dipartimento di Ingegneria Elettrica e Dell informazione Politecnico di Bari Via E. Orabona, 4 70125

More information

SOCIAL NETWORK ANALYSIS EVALUATING THE CUSTOMER S INFLUENCE FACTOR OVER BUSINESS EVENTS

SOCIAL NETWORK ANALYSIS EVALUATING THE CUSTOMER S INFLUENCE FACTOR OVER BUSINESS EVENTS SOCIAL NETWORK ANALYSIS EVALUATING THE CUSTOMER S INFLUENCE FACTOR OVER BUSINESS EVENTS Carlos Andre Reis Pinheiro 1 and Markus Helfert 2 1 School of Computing, Dublin City University, Dublin, Ireland

More information

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia [email protected] Eugene Kalishenko Saint Petersburg

More information

Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths

Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Satyajeet S. Ahuja, Srinivasan Ramasubramanian, and Marwan Krunz Department of ECE, University of Arizona, Tucson,

More information

Simulating Traffic for Incident Management and ITS Investment Decisions

Simulating Traffic for Incident Management and ITS Investment Decisions 1998 TRANSPORTATION CONFERENCE PROCEEDINGS 7 Simulating Traffic for Incident Management and ITS Investment Decisions MICHAEL D. ANDERSON AND REGINALD R. SOULEYRETTE UTPS-type models were designed to adequately

More information

Numerical Calculation of Laminar Flame Propagation with Parallelism Assignment ZERO, CS 267, UC Berkeley, Spring 2015

Numerical Calculation of Laminar Flame Propagation with Parallelism Assignment ZERO, CS 267, UC Berkeley, Spring 2015 Numerical Calculation of Laminar Flame Propagation with Parallelism Assignment ZERO, CS 267, UC Berkeley, Spring 2015 Xian Shi 1 bio I am a second-year Ph.D. student from Combustion Analysis/Modeling Lab,

More information

Travis Goodwin & Sanda Harabagiu

Travis Goodwin & Sanda Harabagiu Automatic Generation of a Qualified Medical Knowledge Graph and its Usage for Retrieving Patient Cohorts from Electronic Medical Records Travis Goodwin & Sanda Harabagiu Human Language Technology Research

More information

SIGMOD RWE Review Towards Proximity Pattern Mining in Large Graphs

SIGMOD RWE Review Towards Proximity Pattern Mining in Large Graphs SIGMOD RWE Review Towards Proximity Pattern Mining in Large Graphs Fabian Hueske, TU Berlin June 26, 21 1 Review This document is a review report on the paper Towards Proximity Pattern Mining in Large

More information

Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data

Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear

More information

Locality Based Protocol for MultiWriter Replication systems

Locality Based Protocol for MultiWriter Replication systems Locality Based Protocol for MultiWriter Replication systems Lei Gao Department of Computer Science The University of Texas at Austin [email protected] One of the challenging problems in building replication

More information

Distributed Dynamic Load Balancing for Iterative-Stencil Applications

Distributed Dynamic Load Balancing for Iterative-Stencil Applications Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,

More information

Exploring Sociocentric and Egocentric Approaches for Social Network Analysis

Exploring Sociocentric and Egocentric Approaches for Social Network Analysis Exploring Sociocentric and Egocentric Approaches for Social Network Analysis Kenneth K S Chung School of Information Technologies University of Sydney NSW 2006, Australia +61 9351 4914 [email protected]

More information

Effects of node buffer and capacity on network traffic

Effects of node buffer and capacity on network traffic Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,

More information

Use of Text Messaging to Increase Response Rates

Use of Text Messaging to Increase Response Rates Use of Text Messaging to Increase Response Rates Key words: BRFSS, response rate, cell phones, smart phones, text message Prepared by: Piper DuBray, Kristie Healey ICF International 0 Introduction Survey

More information

Simulation of Residual Stresses in an Induction Hardened Roll

Simulation of Residual Stresses in an Induction Hardened Roll 2.6.4 Simulation of Residual Stresses in an Induction Hardened Roll Ludwig Hellenthal, Clemens Groth Walzen Irle GmbH, Netphen-Deuz, Germany CADFEM GmbH, Burgdorf/Hannover, Germany Summary A heat treatment

More information

What is SNA? A sociogram showing ties

What is SNA? A sociogram showing ties Case Western Reserve University School of Medicine Social Network Analysis: Nuts & Bolts Papp KK 1, Zhang GQ 2 1 Director, Program Evaluation, CTSC, 2 Professor, Electrical Engineering and Computer Science,

More information

Intrusion Log Sharing University of Wisconsin-Madison

Intrusion Log Sharing University of Wisconsin-Madison Intrusion Log Sharing University of Wisconsin-Madison John Bethencourt ([email protected]) Jason Franklin ([email protected]) Mary Vernon ([email protected]) 1 Talk Outline Background: Blacklists,

More information

A Comparison of General Approaches to Multiprocessor Scheduling

A Comparison of General Approaches to Multiprocessor Scheduling A Comparison of General Approaches to Multiprocessor Scheduling Jing-Chiou Liou AT&T Laboratories Middletown, NJ 0778, USA [email protected] Michael A. Palis Department of Computer Science Rutgers University

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

STEADYSUN THEnergy white paper. Energy Generation Forecasting in Solar-Diesel-Hybrid Applications

STEADYSUN THEnergy white paper. Energy Generation Forecasting in Solar-Diesel-Hybrid Applications STEADYSUN THEnergy white paper Energy Generation Forecasting in Solar-Diesel-Hybrid Applications April 2016 Content 1 Introduction... 3 2 Weather forecasting for solar-diesel hybrid systems... 4 2.1 The

More information