Visualization of Communication Patterns in Collaborative Innovation Networks. Analysis of some W3C working groups
|
|
|
- Silvia Nash
- 9 years ago
- Views:
Transcription
1 Visualization of Communication Patterns in Collaborative Innovation Networks Analysis of some W3C working groups Peter A. Gloor 1,2, Rob Laubacher 1, Scott B.C. Dynes 2, Yan Zhao 3 1 MIT Center for Coordination Science, 2 Dartmouth Tuck Center for Digital Strategies, 3 Dartmouth College Dept. of Computer Science Abstract Collaborative Innovation Networks (COINs) are groups of self-motivated individuals from various parts of an organization or from multiple organizations, empowered by the Internet, who work together on a new idea, driven by a common vision. In this paper we report first results of a project that examines innovation networks by analyzing the archives of some W3C (WWW consortium) working groups. These groups exhibit ideal characteristics for our purpose, as they form truly global networks working together over the Internet to develop next generation technologies. We first describe the software tools we developed to visualize the temporal communication flow, which represent communication patterns as directed acyclic graphs. We then show initial results, which revealed significant variations between the communication patterns and network structures of the different groups. We were also able to identify distinctive communication patterns among group leaders, both those who were officially appointed and other who were assuming unofficial coordinating roles. Keywords: collaborative innovation network, social network analysis, information visualization, knowledge management, collaborative applications. 1. Introduction Collaborative Innovation Networks (COINs) are groups of self-motivated individuals from various parts of an organization or from multiple organizations, empowered by the Internet, who work together on a new idea, driven by a common vision. The COIN diagnostic project is a research effort co-located at the MIT Sloan Center for Coordination Science and the Dartmouth Tuck Center for Digital Strategies in collaboration with other research centers. The mission of the COIN diagnostic project is to understand the ways people join COINs, how COINs function and what COINs contribute to enterprises by: 1. Analyzing electronic interaction logs such as to find COINs within organizations; 2. Identifying structural properties and parameters of successful COINs; 3. Finding the people that make a COIN successful by identifying the role profiles crucial for the success of COINs; 4. Defining a metric to measure the success of COINs; 5. Developing a framework and set of organizational guidelines that can help nurture and foster COINs within and across organizations and make them more effective. 2. Algorithm and System Architecture Just as Google is very effective at finding pertinent documents based on linking patterns, we believe analysis of and other interaction logs of organizations will enable one to discern the structure of networks and identify core contributors. We propose a new methodology: mining computer logs such as
2 05/28/03-2 archives to trace the emergence of COINs and their development over time. Our system computes and visualizes the structure of existing COINs by automatically generating a directed graph of communication flows. of nodes is driven by the number of messages they have exchanged. The most active senders and receivers are depicted in the center of the graph. Figure 1. COIN analysis system architecture We are implementing a flexible three-level architecture (figure 1): In the first step, the e- mail messages are parsed and stored in decomposed format in a SQL database. In the second step the database is queried to select messages sent and/or received by a group in a time period. In the third step the selected communication flows are visualized using SNA visualization tools such as Pajek (Batagelj & Mrvar, 1998) and ucinet (Borgatti et al., 1992) or our own communication flow visualization applets. This architecture provides a testbed with high scalability and flexibility: the number of messages to be analyzed is only limited by the size of the database, and temporal queries can be run in an ad hoc way. We are also able to experiment with different visualizations of the retrieved structure. Figure 2 contains our community visualization applet in the generic mode, where all relationships are visualized. Each node on the screen represents a person, and s exchanged are visualized as arcs. The proximity Figure 2. COIN visualization applet The visualizations in figures 2 employ the Fruchterman-Reingold graph drawing algorithm (Fruchterman & Reingold, 1991) commonly used to visualize social networks. This method compares a graph to a mechanical collection of electrically charged rings (the vertices) and connecting springs (the edges). Every two
3 05/28/03-3 vertices reject each other by a repulsive force and adjacent vertices (connected by an edge) are pulled together by an attractive force. Over a number of iterations the forces modeled by the springs are calculated and the nodes are moved to minimize the forces felt. In our visualizations, the attraction between connected nodes is scaled to the number of messages exchanged. of the message) can be visualized. Messages can be further sub-selected by person and by month. Figure 5. COIN animation applet Figure 3. COIN visualization applet in personalized mode Figure 3 illustrates the COIN visualization applet in personalized mode. Clicking on a node displays all the links going to or originating from a particular person. To, Cc, and From links can be filtered separately. Figure 5 illustrates the COIN animation applet view. This applet displays a movie of the communication flow over time, where all active links in an adjustable time-window, ranging from 5 to 100 days, are shown. The user can single-step through the time-windows using a slider, or play back the communication activity of the whole year as a movie. Figure 4. COIN visualization applet in subject mode Figure 4 illustrates the COIN visualization applet in subject mode, where the message flow on a certain subject (as indicated in the Subject line 3. Selection of the Communities We compared three similar communities, exhibiting strong COIN characteristics. They share the goal of furthering the development of the Web under the auspices of the WWW consortium (W3C, W3C activities are generally organized into working groups. These groups, made up of representatives from W3C member organizations, the W3C core team, and invited experts, produce the bulk of W3C's results: technical reports, open source software, and services such as validation services. These groups also ensure coordination with other standards bodies and technical communities. There are currently over thirty W3C working groups. W3C is keeping a public archive of the communication of the ongoing discussions of the working groups at In our work
4 05/28/03-4 we analyzed the mailing list archives of three W3C working groups: Group A Group A is made up of Web enthusiasts, who contribute to the group because they are interested into the further development of the Web. There is little encouragement by large companies for their employees to participate in this group, so it is made up of academics and company researchers working on their own time and representing their own opinion. The motivation to participate is the recognition of their work by peers. We were able to analyze data from Group A for 1999 to Group B The goal of Group B is to develop a Web standard with high commercial value to large software companies. There are two sets of people active in this group. The first consists of software company representatives, who are usually appointed by their firm and have to represent the viewpoint of their employer. This means that firm management has a close eye on the ongoing communication of this group, as there are diverging interests of the companies sending their representatives. The second set of people in this group are consultants and academics, who participate out of personal interest or to create consulting opportunities by making a name for themselves. The standard covered by this group is fairly new, so we could only obtain data for Group B from 2002 to Group C Group C is also composed of two sets of people. One set consists of a core group selected by the W3C and its member firms to to discuss and further develop the technical architecture of the Web. The second set are academics and consultants who participate either because they are genuinely interested or because they want to build a reputation. The goal of the group is of somewhat lesser commercial impact than that of Group B. This group has been active from 2002 to Analysis of Networks One initial finding is that each group had between 150 and 200 members when fully active. This finding corresponds to results from past work by ethnologists that is the largest sized group that can work together productively before fragmenting (Gladwell 2002). We used several metrics developed by social network analysts to compare the three W3C working groups: density, betweenness centrality, and group degree centrality. Density (Wassermann & Faust, 1994) is the proportion of potential arcs in the graph that are actually connected, a measure which can range between 0 and 1. Centrality of an actor is a measure for its importance. The simplest measure of centrality is the number of arcs one node has to other nodes (known as the node s degree). Group degree centrality measures the similarity in the communication pattern among different group members. It is 1 for a group where one actor communicates with all others in a star configuration, and 0 for a circle where everybody communicates with everybody. Betweenness of actors is a measure for the interpersonal influence they have on others, by being between other actors. Freeman (1979) defines group betweenness centrality as a measure for the homogeneity of betweenness of different actors. Betweenness centrality is 1 in a star configuration, and 0 if all actors have the same degree of betweenness. Lower betweeness centrality means the communication behavior of the group members is more egalitarian. For our three groups, we obtained the following results for 2002: 2002 Density Group Degree Centrality Group A Group B Group C Group Betweenness Centrality We notice that Group A exhibits significantly lower betweenness centrality and group degree centrality than the other two groups.
5 05/28/03-5 We can speculate that these differences may be due to the nature of the tasks being carried out by the different groups. The more focused tasks of Group B and C, for example development and gaining agreement on standards, could mean more hierarchical group interactions. Another possible reason for different group communication patterns might be the characteristics of the groups members. The corporate researchers in Groups B and C may be more accustomed to hierarchical interactions than the university researchers in Group A, who are more used to interacting with other university researchers as peers. Our animations suggested further differences between the groups communication patterns. For example, the animation for one group showed the emergence of a core that communicated with high frequency among themselves, while outlying members contributed only sporadically. It appeared that a large group of peripheral members were only weakly connected to the core group. Another group exhibited more egalitarian behavior, where everybody was talking to everybody. We plan to undertake future work which will allow us to analyze such differences in greater detail. 5. Analysis of Individual Communication Behavior From the communication patterns, it was possible to identify a group of leaders in the COINs we analyzed. We were also able to identify contributors who had assumed leadership roles without having been officially appointed. For Group C we looked at the message pattern of the 9 appointed leaders. We only analyzed threads that contain more than five messages. This allowed us to filter out requests for information and other insignificant exchanges. As was expected, the leaders showed up in the center of the graph (indicated as large nodes), together with other significant contributors (figure 6). We also noticed a difference within the leadership group along two dimensions: contribution frequency (measured in the numbers of messages sent), and the extent to which their communication was balanced between sending and receiving messages, which we measured via a simple contribution index: messages sent messages received total of messages sent and received This index is 1 for somebody who only receives messages, 0 for somebody who sends and receives the same number of messages, and +1 for somebody who only sends messages. Figure 6. Group C in 2003 with 9 leaders (leaders indicated with large squares) Figure 7 illustrates communication patterns for leaders in Group C. The dark rectangles in the center are the W3C leaders. The large company representatives are the lightly shaded rectangles. The leaders appointed by the W3C were among the most active contributors and also exhibited balanced communication behavior, with a contribution index close to 0. The representatives of the large IT companies participated much less in absolute numbers, and some of them sent substantially more messages than they received. There were also some participants who were even more active than the officially appointed leaders. These members appeared to be assuming a self-appointed leadership role. Preliminary analysis indicated that such unofficial leaders also emerged in other groups. We intend to undertake further analysis to identify how these unofficial leaders come to assume this role.
6 05/28/03-6. contribution index Contribution Frequency # messages sent Figure 7. Contribution Frequency of Group C members in Related Work Other researchers have analyzed communication flow to study network structure. In an early study, undertaken well before usage of the Internet became widespread, Freeman (1979) looked at how the use of assisted in the development of acquaintanceships and friendships between thirty-two SNA researchers. Guimera et al. (2002) mapped the structure of a university network by automatically analyzing the log and found that the network exhibited a self-similar structure. Ebel et al. (2002) also analyzed the logs of Kiel Unversity and found it to exhibit a scale-free topology. Tyler, Wilkinson, et al (2002) describe a project which mined the archive of 485 employees at HP Labs. By partitioning the total graph with a clustering algorithm proposed by Girvan and Newman (2001), the HP Labs researchers were able to identify 66 distinct communities, based on the frequency of the message exchange between individuals. Correlation between actual teams and organizational units and the clusters derived by analysis was surprisingly high. The HP Labs team also identified leaders from the traffic, which mostly corresponded to widely recognized leaders within the organization. 7. Conclusions and Further Work We have identified four areas where our work can be applied 1. By locating COINs, organizations can learn about innovations which are underway. This enables them to spot hidden business opportunities and also cut the time to market for new inventions. 2. By supporting hidden COINs and making them transparent, organizations can become more efficient in working together. They can better identify their knowledge sources and streamline communication processes. 3. Because key contributors can be identified through transparent COINs, organizations have a better chance to identify and reward leaders and important collaborators. 4. By making the communication flow transparent, a more open working environment can be created, generating additional trust among its members. The next step in our work will be to improve the temporal visualization and analytic capabilities of our tools. We will then undertake further analysis of these W3C and gather date from other kinds of networks as well. We hope to gain new insights into network evolution and examine member roles in more detail. Acknowledgements We are grateful to Tom Allen, Thomas W. Malone, John Quimby, Hans Brechbuehl, M. Eric Johnson, JoAnne Yates, and Fillia Makedon for their help and encouragement. References Batagelj, V. Mrvar, A Pajek - Program for Large Network Analysis. Connections 21, 2, Borgatti, S., Everett, M. Freeman, L.C UCINET IV, Version 1.0, Columbia: Analytic Technologies.
7 05/28/03-7 Ebel, H. Mielsch, L. Bornholdt, S. Scalefree topology of networks. arxiv:condmat/ v2 12 Feb Freeman, L.C. Centrality in social networks: I. Conceptual clarification. Social Networks, 1979, 1, Freeman, L.C. Freeman, S.C A semivisible college: Structural effects of seven months of EIES participation by a social networks community. In Henderson, M.M. MacNaughton, M.J. (eds) Electronic Communication: Technology and Impacts, AAAS Symposium 52. Washington DC: American Association for the Advancement of Science. Gloor, P. Laubacher, R. Dynes, S. Zhao, Y. Visualizing Interaction Patterns in Collaborative Knowledge Networks in Medical Applications. Proc HCII 2003, Crete, June 25-27, Girvan, M. Newman, M.E.J Community structure in social and biological networks. arxiv:cond-mat/ v1, 7 Dec Gladwell, Malcolm The Tipping Point: How Little Things Can Make a Big Difference. Back Bay Books Guimera, R., Danon, L., Diaz-Guilera, A. Giralt, F., Arenas, A Self-similar community structure in organizations. ArXiv:condmat/ v1, 22 Nov Wasserman, S., Faust, K Social Network Analysis : Methods and Applications. Cambridge University Press. Thomas M. J. Fruchterman and Edward M. Reingold. Graph drawing by force directed placement. Software: Practice and Experience, 21(11), Tyler, J. Wilkinson, D. Huberman, B as Spectroscopy: Automated Discovery of Community Structure within Organizations" ml Wasserman, S., Faust, K Social Network Analysis: Methods and Applications. Cambridge University Press.
Temporal Visualization and Analysis of Social Networks
Temporal Visualization and Analysis of Social Networks Peter A. Gloor*, Rob Laubacher MIT {pgloor,rjl}@mit.edu Yan Zhao, Scott B.C. Dynes *Dartmouth {yan.zhao,sdynes}@dartmouth.edu Abstract This paper
A comparative study of social network analysis tools
Membre de Membre de A comparative study of social network analysis tools David Combe, Christine Largeron, Előd Egyed-Zsigmond and Mathias Géry International Workshop on Web Intelligence and Virtual Enterprises
Leading Group of Collaborative Knowledge Network - CKN Readiness
MIT CCS/Dartmouth Center for Digital Strategies Peter A. Gloor, [email protected] 28.2.2003 www.ickn.org Contents 1. Are Collaborative Knowledge Networks (CKNs( CKNs) ) the organization of the future? 2.
Cluster detection algorithm in neural networks
Cluster detection algorithm in neural networks David Meunier and Hélène Paugam-Moisy Institute for Cognitive Science, UMR CNRS 5015 67, boulevard Pinel F-69675 BRON - France E-mail: {dmeunier,hpaugam}@isc.cnrs.fr
Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics
Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Zhao Wenbin 1, Zhao Zhengxu 2 1 School of Instrument Science and Engineering, Southeast University, Nanjing, Jiangsu
Project Knowledge Management Based on Social Networks
DOI: 10.7763/IPEDR. 2014. V70. 10 Project Knowledge Management Based on Social Networks Panos Fitsilis 1+, Vassilis Gerogiannis 1, and Leonidas Anthopoulos 1 1 Business Administration Dep., Technological
HISTORICAL DEVELOPMENTS AND THEORETICAL APPROACHES IN SOCIOLOGY Vol. I - Social Network Analysis - Wouter de Nooy
SOCIAL NETWORK ANALYSIS University of Amsterdam, Netherlands Keywords: Social networks, structuralism, cohesion, brokerage, stratification, network analysis, methods, graph theory, statistical models Contents
Equivalence Concepts for Social Networks
Equivalence Concepts for Social Networks Tom A.B. Snijders University of Oxford March 26, 2009 c Tom A.B. Snijders (University of Oxford) Equivalences in networks March 26, 2009 1 / 40 Outline Structural
Visualizing Data from Government Census and Surveys: Plans for the Future
Censuses and Surveys of Governments: A Workshop on the Research and Methodology behind the Estimates Visualizing Data from Government Census and Surveys: Plans for the Future Kerstin Edwards March 15,
Visualizing Complexity in Networks: Seeing Both the Forest and the Trees
CONNECTIONS 25(1): 37-47 2003 INSNA Visualizing Complexity in Networks: Seeing Both the Forest and the Trees Cathleen McGrath Loyola Marymount University, USA David Krackhardt The Heinz School, Carnegie
Open Source Software Developer and Project Networks
Open Source Software Developer and Project Networks Matthew Van Antwerp and Greg Madey University of Notre Dame {mvanantw,gmadey}@cse.nd.edu Abstract. This paper outlines complex network concepts and how
KAIST Business School
KAIST Business School BA763 Social Network Analysis for Business Fall, 011 (Version 1.1, 9/6/11) Instructor : Professor Sung Joo Park( 朴 成 柱 ) Office (Phone): Supex Bldg. S84 (Tel. 3646, Mobile 010-5405-831)
Visualization of Social Networks in Stata by Multi-dimensional Scaling
Visualization of Social Networks in Stata by Multi-dimensional Scaling Rense Corten Department of Sociology/ICS Utrecht University The Netherlands [email protected] April 12, 2010 1 Introduction Social network
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION
A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University [email protected] [email protected] ABSTRACT Depending
Exploration and Visualization of Post-Market Data
Exploration and Visualization of Post-Market Data Jianying Hu, PhD Joint work with David Gotz, Shahram Ebadollahi, Jimeng Sun, Fei Wang, Marianthi Markatou Healthcare Analytics Research IBM T.J. Watson
How to do a Business Network Analysis
How to do a Business Network Analysis by Graham Durant-Law Copyright HolisTech 2006-2007 Information and Knowledge Management Society 1 Format for the Evening Presentation (7:00 pm to 7:40 pm) Essential
What is SNA? A sociogram showing ties
Case Western Reserve University School of Medicine Social Network Analysis: Nuts & Bolts Papp KK 1, Zhang GQ 2 1 Director, Program Evaluation, CTSC, 2 Professor, Electrical Engineering and Computer Science,
Course 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Oman College of Management and Technology Course 803401 DSS Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization CS/MIS Department Information Sharing
Most Effective Communication Management Techniques for Geographically Distributed Project Team Members
Most Effective Communication Management Techniques for Geographically Distributed Project Team Members Jawairia Rasheed, Farooque Azam and M. Aqeel Iqbal Department of Computer Engineering College of Electrical
Visual Analysis Tool for Bipartite Networks
Visual Analysis Tool for Bipartite Networks Kazuo Misue Department of Computer Science, University of Tsukuba, 1-1-1 Tennoudai, Tsukuba, 305-8573 Japan [email protected] Abstract. To find hidden features
Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Turban, Aronson, and Liang Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Information Management course
Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli ([email protected])
Chapter 5. Warehousing, Data Acquisition, Data. Visualization
Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization 5-1 Learning Objectives
IC05 Introduction on Networks &Visualization Nov. 2009. <[email protected]>
IC05 Introduction on Networks &Visualization Nov. 2009 Overview 1. Networks Introduction Networks across disciplines Properties Models 2. Visualization InfoVis Data exploration
Course 6234A: Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services
Course 6234A: Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services Length: Delivery Method: 3 Days Instructor-led (classroom) About this Course Elements of this syllabus are subject
How To Analyze The Social Interaction Between Students Of Ou
Using Social Networking Analysis (SNA) to Analyze Collaboration between Students (Case Study: Students of Open University in Kupang) Bonie Empy Giri Faculty of Information Technology Satya Wacana Christian
ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM
ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM IRANDOC CASE STUDY Ammar Jalalimanesh a,*, Elaheh Homayounvala a a Information engineering department, Iranian Research Institute for
Examining graduate committee faculty compositions- A social network analysis example. Kathryn Shirley and Kelly D. Bradley. University of Kentucky
Examining graduate committee faculty compositions- A social network analysis example Kathryn Shirley and Kelly D. Bradley University of Kentucky Graduate committee social network analysis 1 Abstract Social
DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE
DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE INTRODUCTION RESEARCH IN PRACTICE PAPER SERIES, FALL 2011. BUSINESS INTELLIGENCE AND PREDICTIVE ANALYTICS
How To Find Influence Between Two Concepts In A Network
2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation Influence Discovery in Semantic Networks: An Initial Approach Marcello Trovati and Ovidiu Bagdasar School of Computing
Local Government Records Management Benchmarking Report
Local Government Records Management Benchmarking Report January 2014 An independent, comparative assessment of records management services in Local Government. Executive Summary Votar Partners were engaged
POLAR IT SERVICES. Business Intelligence Project Methodology
POLAR IT SERVICES Business Intelligence Project Methodology Table of Contents 1. Overview... 2 2. Visualize... 3 3. Planning and Architecture... 4 3.1 Define Requirements... 4 3.1.1 Define Attributes...
Semantic Analysis of Business Process Executions
Semantic Analysis of Business Process Executions Fabio Casati, Ming-Chien Shan Software Technology Laboratory HP Laboratories Palo Alto HPL-2001-328 December 17 th, 2001* E-mail: [casati, shan] @hpl.hp.com
3D Interactive Information Visualization: Guidelines from experience and analysis of applications
3D Interactive Information Visualization: Guidelines from experience and analysis of applications Richard Brath Visible Decisions Inc., 200 Front St. W. #2203, Toronto, Canada, [email protected] 1. EXPERT
Galaxy Morphological Classification
Galaxy Morphological Classification Jordan Duprey and James Kolano Abstract To solve the issue of galaxy morphological classification according to a classification scheme modelled off of the Hubble Sequence,
Teradata s Big Data Technology Strategy & Roadmap
Teradata s Big Data Technology Strategy & Roadmap Artur Borycki, Director International Solutions Marketing 18 March 2014 Agenda > Introduction and level-set > Enabling the Logical Data Warehouse > Any
BIG DATA: FROM HYPE TO REALITY. Leandro Ruiz Presales Partner for C&LA Teradata
BIG DATA: FROM HYPE TO REALITY Leandro Ruiz Presales Partner for C&LA Teradata Evolution in The Use of Information Action s ACTIVATING MAKE it happen! Insights OPERATIONALIZING WHAT IS happening now? PREDICTING
Anatomy of an Enterprise Software Delivery Project
Chapter 2 Anatomy of an Enterprise Software Delivery Project Chapter Summary I present an example of a typical enterprise software delivery project. I examine its key characteristics and analyze specific
An overview of Software Applications for Social Network Analysis
IRSR INTERNATIONAL REVIEW of SOCIAL RESEARCH Volume 3, Issue 3, October 2013, 71-77 International Review of Social Research An overview of Software Applications for Social Network Analysis Ioana-Alexandra
Microsoft Enterprise Search for IT Professionals Course 10802A; 3 Days, Instructor-led
Microsoft Enterprise Search for IT Professionals Course 10802A; 3 Days, Instructor-led Course Description This three day course prepares IT Professionals to administer enterprise search solutions using
Unleash your intuition
Introducing Qlik Sense Unleash your intuition Qlik Sense is a next-generation self-service data visualization application that empowers everyone to easily create a range of flexible, interactive visualizations
Intelligent Analysis of User Interactions in a Collaborative Software Engineering Context
Intelligent Analysis of User Interactions in a Collaborative Software Engineering Context Alejandro Corbellini 1,2, Silvia Schiaffino 1,2, Daniela Godoy 1,2 1 ISISTAN Research Institute, UNICEN University,
Information Flow and the Locus of Influence in Online User Networks: The Case of ios Jailbreak *
Information Flow and the Locus of Influence in Online User Networks: The Case of ios Jailbreak * Nitin Mayande & Charles Weber Department of Engineering and Technology Management Portland State University
Complexity and Scalability in Semantic Graph Analysis Semantic Days 2013
Complexity and Scalability in Semantic Graph Analysis Semantic Days 2013 James Maltby, Ph.D 1 Outline of Presentation Semantic Graph Analytics Database Architectures In-memory Semantic Database Formulation
2015 Analyst and Advisor Summit. Advanced Data Analytics Dr. Rod Fontecilla Vice President, Application Services, Chief Data Scientist
2015 Analyst and Advisor Summit Advanced Data Analytics Dr. Rod Fontecilla Vice President, Application Services, Chief Data Scientist Agenda Key Facts Offerings and Capabilities Case Studies When to Engage
There are a number of factors that increase the risk of performance problems in complex computer and software systems, such as e-commerce systems.
ASSURING PERFORMANCE IN E-COMMERCE SYSTEMS Dr. John Murphy Abstract Performance Assurance is a methodology that, when applied during the design and development cycle, will greatly increase the chances
Freehand Sketching. Sections
3 Freehand Sketching Sections 3.1 Why Freehand Sketches? 3.2 Freehand Sketching Fundamentals 3.3 Basic Freehand Sketching 3.4 Advanced Freehand Sketching Key Terms Objectives Explain why freehand sketching
InfiniteGraph: The Distributed Graph Database
A Performance and Distributed Performance Benchmark of InfiniteGraph and a Leading Open Source Graph Database Using Synthetic Data Objectivity, Inc. 640 West California Ave. Suite 240 Sunnyvale, CA 94086
Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence
Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.
A Platform for Supporting Data Analytics on Twitter: Challenges and Objectives 1
A Platform for Supporting Data Analytics on Twitter: Challenges and Objectives 1 Yannis Stavrakas Vassilis Plachouras IMIS / RC ATHENA Athens, Greece {yannis, vplachouras}@imis.athena-innovation.gr Abstract.
Course 20462: Administering Microsoft SQL Server Databases
Course 20462: Administering Microsoft SQL Server Databases Type:Course Audience(s):IT Professionals Technology:Microsoft SQL Server Level:300 This Revision:C Delivery method: Instructor-led (classroom)
ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION
ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION K.Vinodkumar 1, Kathiresan.V 2, Divya.K 3 1 MPhil scholar, RVS College of Arts and Science, Coimbatore, India. 2 HOD, Dr.SNS
Graph/Network Visualization
Graph/Network Visualization Data model: graph structures (relations, knowledge) and networks. Applications: Telecommunication systems, Internet and WWW, Retailers distribution networks knowledge representation
Tools and Techniques for Social Network Analysis
Tools and Techniques for Social Network Analysis Pajek Program for Analysis and Visualization of Large Networks Pajek: What is it Pajek is a program, for Windows and Linux (via Wine) Developers: Vladimir
Implementing and Maintaining Microsoft SQL Server 2005 Reporting Services COURSE OVERVIEW AUDIENCE OUTLINE OBJECTIVES PREREQUISITES
COURSE OVERVIEW This three-day instructor-led course teaches students how to implement a ing Services solution in their organizations. The course discusses how to use the ing Services development tools
BUZZMONITOR: A TOOL FOR MEASURING WORD OF MOUTH LEVEL IN ON-LINE COMMUNITIES
BUZZMONITOR: A TOOL FOR MEASURING WORD OF MOUTH LEVEL IN ON-LINE COMMUNITIES Alessandro Barbosa Lima Jairson Vitorino Henrique Rebêlo ABSTRACT This paper describes an application to monitor on-line Word
Enterprise Organization and Communication Network
Enterprise Organization and Communication Network Hideyuki Mizuta IBM Tokyo Research Laboratory 1623-14, Shimotsuruma, Yamato-shi Kanagawa-ken 242-8502, Japan E-mail: [email protected] Fusashi Nakamura
MOOCdb: Developing Data Standards for MOOC Data Science
MOOCdb: Developing Data Standards for MOOC Data Science Kalyan Veeramachaneni, Franck Dernoncourt, Colin Taylor, Zachary Pardos, and Una-May O Reilly Massachusetts Institute of Technology, USA. {kalyan,francky,colin
Time-Dependent Complex Networks:
Time-Dependent Complex Networks: Dynamic Centrality, Dynamic Motifs, and Cycles of Social Interaction* Dan Braha 1, 2 and Yaneer Bar-Yam 2 1 University of Massachusetts Dartmouth, MA 02747, USA http://necsi.edu/affiliates/braha/dan_braha-description.htm
Data Isn't Everything
June 17, 2015 Innovate Forward Data Isn't Everything The Challenges of Big Data, Advanced Analytics, and Advance Computation Devices for Transportation Agencies. Using Data to Support Mission, Administration,
Data Exploration with GIS Viewsheds and Social Network Analysis
Data Exploration with GIS Viewsheds and Social Network Analysis Giles Oatley 1, Tom Crick 1 and Ray Howell 2 1 Department of Computing, Cardiff Metropolitan University, UK 2 Faculty of Business and Society,
Social Network Discovery based on Sensitivity Analysis
Social Network Discovery based on Sensitivity Analysis Tarik Crnovrsanin, Carlos D. Correa and Kwan-Liu Ma Department of Computer Science University of California, Davis [email protected], {correac,ma}@cs.ucdavis.edu
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA [email protected]
TIBCO Spotfire Network Analytics 1.1. User s Manual
TIBCO Spotfire Network Analytics 1.1 User s Manual Revision date: 26 January 2009 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
Evaluating Software Products - A Case Study
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATION: A CASE STUDY ON GAMES Özge Bengur 1 and Banu Günel 2 Informatics Institute, Middle East Technical University, Ankara, Turkey
Implementing Data Models and Reports with Microsoft SQL Server 2012 MOC 10778
Implementing Data Models and Reports with Microsoft SQL Server 2012 MOC 10778 Course Outline Module 1: Introduction to Business Intelligence and Data Modeling This module provides an introduction to Business
Introduction to Networks and Business Intelligence
Introduction to Networks and Business Intelligence Prof. Dr. Daning Hu Department of Informatics University of Zurich Sep 17th, 2015 Outline Network Science A Random History Network Analysis Network Topological
MINFS544: Business Network Data Analytics and Applications
MINFS544: Business Network Data Analytics and Applications March 30 th, 2015 Daning Hu, Ph.D., Department of Informatics University of Zurich F Schweitzer et al. Science 2009 Stop Contagious Failures in
An Agile Methodology Based Model for Change- Oriented Software Engineering
An Agile Methodology Based Model for Change- Oriented Software Engineering Naresh Kumar Nagwani, Pradeep Singh Department of Computer Sc. & Engg. National Institute of Technology, Raipur [email protected],
Oracle Database 11g: SQL Tuning Workshop
Oracle University Contact Us: + 38516306373 Oracle Database 11g: SQL Tuning Workshop Duration: 3 Days What you will learn This Oracle Database 11g: SQL Tuning Workshop Release 2 training assists database
Foundations of Business Intelligence: Databases and Information Management
Foundations of Business Intelligence: Databases and Information Management Problem: HP s numerous systems unable to deliver the information needed for a complete picture of business operations, lack of
A Capability Model for Business Analytics: Part 2 Assessing Analytic Capabilities
A Capability Model for Business Analytics: Part 2 Assessing Analytic Capabilities The first article of this series presented the capability model for business analytics that is illustrated in Figure One.
Deltek Vision 5.1 Analysis and Reporting
WHITE PAPER Deltek Vision 5.1 Analysis and Reporting Using Microsoft SQL Server 2005 Analysis Services and Microsoft Excel Contents Overview of Analysis Cubes...1 Learning How to Configure and Use Vision
Sonatype CLM Server - Dashboard. Sonatype CLM Server - Dashboard
Sonatype CLM Server - Dashboard i Sonatype CLM Server - Dashboard Sonatype CLM Server - Dashboard ii Contents 1 Introduction 1 2 Accessing the Dashboard 3 3 Viewing CLM Data in the Dashboard 4 3.1 Filters............................................
SuperViz: An Interactive Visualization of Super-Peer P2P Network
SuperViz: An Interactive Visualization of Super-Peer P2P Network Anthony (Peiqun) Yu [email protected] Abstract: The Efficient Clustered Super-Peer P2P network is a novel P2P architecture, which overcomes
11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures
Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is
A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks
A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks Text Analytics World, Boston, 2013 Lars Hard, CTO Agenda Difficult text analytics tasks Feature extraction Bio-inspired
So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
SAS Fraud Framework for Banking
SAS Fraud Framework for Banking Including Social Network Analysis John C. Brocklebank, Ph.D. Vice President, SAS Solutions OnDemand Advanced Analytics Lab SAS Fraud Framework for Banking Agenda Introduction
Effects of node buffer and capacity on network traffic
Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,
A Survey on Web Mining From Web Server Log
A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering
PAID SEARCH + INSIGHTS = 276% ROI
PAID SEARCH + INSIGHTS = 276% ROI SEARCH ENGINE MARKETING GOLD KEY 2012 ENTRY Context. Level 3 is implementing a corporate strategy to gain traction in the mid-market telecommunications arena. By restructuring
Intelligent Process Management & Process Visualization. TAProViz 2014 workshop. Presenter: Dafna Levy
Intelligent Process Management & Process Visualization TAProViz 2014 workshop Presenter: Dafna Levy The Topics Process Visualization in Priority ERP Planning Execution BI analysis (Built-in) Discovering
Discover the best keywords for your online marketing campaign
Discover the best keywords for your online marketing campaign Index n... 3 Keyword discovery using manual methodology... 5 Step 1: Keyword analysis and search... 6 Step 2... 10 Additional tools... 11 Competitors...
