By Topic

Network Science Workshop (NSW), 2011 IEEE

Date 22-24 June 2011

Filter Results

Displaying Results 1 - 25 of 34
  • Foreword

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (304 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference committee

    Publication Year: 2011, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (844 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2011, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (1027 KB)
    Freely Available from IEEE
  • Data-driven diffusion modeling to examine deterrence

    Publication Year: 2011, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1720 KB) | HTML iconHTML

    The combination of social network extraction from texts, network analytics to identify key actors, and then simulation to assess alternative interventions in terms of their impact on the network is a powerful approach for supporting crisis de-escalation activities. In this paper, we describe how researchers used this approach as part of a scenario-driven modeling effort. We demonstrate the strengt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and calibrating real world interpersonal networks

    Publication Year: 2011, Page(s):9 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2060 KB) | HTML iconHTML

    Rumors, new ideas, and attitudes spread through groups of people via interpersonal communication. One approach to simulate these diffusion processes is to generate random or stylized networks. Normally, random, small world, and scale-free network generation algorithms are used to that end. However, the structure of the network is an important parameter for the pattern of diffusion. Therefore, the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing interaction communication networks in enterprises and identifying hierarchies

    Publication Year: 2011, Page(s):17 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (575 KB) | HTML iconHTML

    With the proliferation of electronic modes of communication (e.g., e-mails, short messages), a group of people in an enterprise can form several distinct Communication Interaction Networks, or CINs for short. A CIN is essentially a graph representation of “who talks to whom” among a group of individuals. In this paper, we conduct an empirical study of two modern enterprises and focus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Noisy Naming Games, partial synchronization and coarse-graining in social networks

    Publication Year: 2011, Page(s):25 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1073 KB) | HTML iconHTML

    The Naming Games (NG) are typical agent-based models for agreement dynamics, peer pressure and herding in social networks, and protocol selection in autonomous ad-hoc sensor networks. They form a large class that includes the Voter models and many others. By introducing a rare Poisson noise term to the signaling protocol of the NG, the resulting Markov Chain model called Noisy Naming Game (NNG) is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The impact of social groups on the capacity of wireless networks

    Publication Year: 2011, Page(s):30 - 37
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB) | HTML iconHTML

    The capacity of a wireless network with n nodes is studied when nodes communicate with one another in the context of social groups. Each node is assumed to have at least one local contact in each of the four directions of the plane in which the wireless network operates, and q(n) independent long-range social contacts forming its social group, one of which it selects randomly as its destination. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using network analysis to understand the relation between cuisine and culture

    Publication Year: 2011, Page(s):38 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (762 KB) | HTML iconHTML

    Cuisine is a key cultural component in all societies. The motto “we are what we eat” is known to most people; recently it has even been argued that “we are what we cook”. This paper delves into the complicated issue of trying to establish cultural communities based on recipes. Our hypothesis is that recipes and the ingredients of a recipe can tell us the origin of the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A nested set approach for building recursive XML tree structures from relational databases

    Publication Year: 2011, Page(s):46 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    Extensible Markup Language (XML) is a popular format for the interchange of data between disparate, heterogeneous systems. However, when hierarchical data is exchanged between relational database management systems (RDBMSs), the full expressive power of XML is often ignored. A major factor is the inability of RDBMSs to manipulate hierarchical data, such as an organization chart. We address this by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network latency and packet delay variation in cyber-physical systems

    Publication Year: 2011, Page(s):51 - 58
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (703 KB) | HTML iconHTML

    The problem addressed in this paper is the limitation imposed by network elements, especially Ethernet elements, on the real-time performance of timecritical systems. Most current network elements are concerned only with data integrity, connection, and throughput with no mechanism for enforcing temporal semantics. Existing safety-critical applications and other applications in industry require var... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for near real-time event characterization within the internet

    Publication Year: 2011, Page(s):59 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3490 KB) | HTML iconHTML

    The Internet occasionally experiences large disruptions arising from both natural and manmade disturbances. It is of significant interest to develop methods to characterize these events. The characterization comes in the form of detecting disturbances early in their evolution, providing a classification of disturbances, and locating disturbances within the topology of the Internet. This paper pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource-constrained signal propagation modeling for tactical mobile ad hoc networks

    Publication Year: 2011, Page(s):67 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB) | HTML iconHTML

    Connectivity and security of tactical mobile ad hoc networks (MANETs) can be enhanced signiminimizationficantly by explicit consideration of radio propagation as this not only allows determination of route feasibility and minimization of radio frequency power, but also avoids detectability of emanations. Tactical MANETs (and increasingly general MANETs) typically have geolocation and terrain infor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualizing graphs with Krylov subspaces

    Publication Year: 2011, Page(s):75 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8543 KB) | HTML iconHTML

    Visualizing large graphs is a difficult problem, and requires balancing of the need to express global structure and the need to preserve local detail. The commute-time embedding is an attractive choice for providing a geometric embedding for graph vertices, but is high-dimensional. Dimension reduction of the commute-time embedding may be accomplished with Krylov subspace methods, which can preserv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling network technology deployment rates with different network models

    Publication Year: 2011, Page(s):82 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (555 KB) | HTML iconHTML

    To understand the factors that encourage the deployment of a new networking technology, we must be able to model how such technology gets deployed. We investigate how network structure influences deployment with a simple deployment model and different network models through computer simulations. The results indicate that a realistic model of networking technology deployment should take network str... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards supply chain excellence using network analysis

    Publication Year: 2011, Page(s):90 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1769 KB) | HTML iconHTML

    The literature suggests a growing interest in the application of network analysis in supply chain management. However this has been at the organizational rather than the process level. We believe there is value in applying such analysis to internal processes in supply chain networks. This study uses network analysis techniques to investigate the Stewart framework for excellence in supply chains wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time spring layout for visualization of dynamic social networks

    Publication Year: 2011, Page(s):98 - 104
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2000 KB) | HTML iconHTML

    Common layout techniques for dynamic networks typically either keep node positions static as the graph changes, or operate by “tweening” optimized layouts between adjacent time slices. These techniques can be problematic because (in the first case) there is significant visual “noise” caused by unnecessary edge crossings, and (in the second case) the nodes change so much... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the matter of classifying node connections

    Publication Year: 2011, Page(s):105 - 109
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1004 KB) | HTML iconHTML

    Traditional network classification has focused on four aspects; structure, node, link, and dynamics. The purpose of this paper is to consider a node individually and to base classification on the types of links it possesses. A basic network provides only three possibilities with the `Mutual, Asynchronous, Null' MAN system providing for sixteen different combinations of link patterns. This paper in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a theory of semantic communication

    Publication Year: 2011, Page(s):110 - 117
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (650 KB) | HTML iconHTML

    This paper studies methods of quantitatively measuring semantic information in communication. We review existing work on quantifying semantic information, then investigate a model-theoretical approach for semantic data compression and reliable semantic communication. We relate our approach to the statistical measurement of information by Shannon, and show that Shannon's source and channel coding t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online estimating the k central nodes of a network

    Publication Year: 2011, Page(s):118 - 122
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    The goal of this paper is to estimate the k most central nodes in a network through parsimonious sampling. Centrality determines the relative importance of a particular node within the network. Conventional measures of node centrality include degree, betweenness, and closeness. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flowing valued information based on a need to share

    Publication Year: 2011, Page(s):123 - 127
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2007 KB) | HTML iconHTML

    The ability to share information between organizations in an ad-hoc, networked environment frequently found in humanitarian assistance/disaster relief (HADR) operations, remains a challenge today. For example, US Armed Forces participating in HADR operations do not have an organic ability to share information bi-directionally with Non-Government Agencies (NGO) such as Doctors-Without-Borders. It s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prognostics and network health management for image transmission over wireless telemedicine systems

    Publication Year: 2011, Page(s):128 - 132
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1388 KB) | HTML iconHTML

    This paper applies prognostics and health management methodology to network reliability optimization, which is commonly used for condition-based monitoring of system health of electronic devices and systems. It presents simulation results and analysis to show the benefits of the proposed approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effectiveness of information retraction

    Publication Year: 2011, Page(s):133 - 137
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (394 KB) | HTML iconHTML

    In this work, we study the effectiveness of information retraction in situations where information being spread requires recipients to make a decision or take an action. Consider the scenario where information is introduced into a network, advising recipients to take an action. If at a later time, the information is found to be inaccurate and the action is unnecessary, it becomes a concern to ceas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.