Diffusion occurs in various contexts and generally involves a network of entities that interact in some way. Through these interactions, some property, e.g. information, idea, innovation, disease, etc., is diffused th...
详细信息
ISBN:
(纸本)9781615671090
Diffusion occurs in various contexts and generally involves a network of entities that interact in some way. Through these interactions, some property, e.g. information, idea, innovation, disease, etc., is diffused through the network. The flow of these information, ideas, etc. may in turn have an effect on how the entities interact. The network becomes dynamic as a result of the diffusion process. This paper presents a general model of diffusive processes in dynamic networks. The model is based on a small number of parameterized diffusion axioms. We use the model to explore how social network structure, population inhomogeneity, and seed set selection affects the diffusion process. Simulation experiments were performed on three simulated networks: grid;Erdos-Renyi;scale free;and one LiveJournal blog comment network. The context of the experiments reflect on an evacuation scenario where a warning message is diffused through the network and the goals are to propagate the message and perform evacuation. The network dynamics observed in this study are the results of the diffusion process, where nodes may leave the network some time after receiving a warning message. The simulation results indicate that inhomogeneities in the population help with the spread of the warning and leads to largest evacuation. The network structure and the seeding mechanism used in delivering the initial broadcast also have drastic impact on the efficiency of the diffusion.
Evolving software products is a tricky business, especially when the domain is complex and changing rapidly. Like other fields of engineering, softwareengineering productivity advances have come about largely through...
详细信息
This paper describes an efficient implementation of RSA cryptographic operations that can be used through a wide range of processors starting from 8 bit low cost microprocessor up to 64 bit expensive processor. The pr...
详细信息
As density doubles with the rapidly dropping price each year for the past seven years (currently 32 Gbits/chip), NAND flash memory has virtually replaced HDDs (hard disk drives) in battery-operated consumer devices su...
详细信息
Recently, a number of documents are published on the web. One of the crucial techniques to access to such information is sentiment sentence retrieval. It is very useful to retrieve positive or negative opinions to a s...
详细信息
ISBN:
(纸本)9781605588056
Recently, a number of documents are published on the web. One of the crucial techniques to access to such information is sentiment sentence retrieval. It is very useful to retrieve positive or negative opinions to a specific topic at sentence level. Considering the property that sentiment polarities are often locally consistent in a document, we focus on using local context information for retrieving sentiment-bearing sentences. For this objective, we propose a new smoothing method, extending Dirichlet prior smoothing, to improve effectiveness of the retrieval. We demonstrate through experiments that our proposed smoothing method achieves statistically significant improvements in sentiment sentence retrieval, compared with a conventional smoothing method without local context. Copyright 2009 ACM.
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and peer-to-peer manner. The basis of the pro...
详细信息
ISBN:
(纸本)9781605585697
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and peer-to-peer manner. The basis of the protocol is a node-tonode security handshake using a network-wide key that every node is preconfigured with. This way a security association is established between the involved nodes. The information regarding such an association is propagated to the rest of the trusted nodes, resulting in the formation of a secure network overlay. The protocol is dynamic in the sense that the nodes keying material is periodically renewed by a set of leader nodes in order to enhance the system security. Although generic, our protocol is best suited to emergency ad hoc networks, where the aforementioned assumptions about the node preconfiguration and the reliability of the leader nodes are applicable. The proposed protocol extends previous work on authority-based trust establishment schemes by using a renewal process of the nodes' keying material and by being independent of the underlying routing protocol and the nodes' communication capabilities. Simulation results show that the performance of the protocol depends directly on the network connectivity, the number of leader nodes and the node mobility level. Copyright 2009 ACM.
Event processing systems are a promising technology for enterprise-scale applications. However, achieving scalability yet maintaining high performance is a challenging problem. This work introduces a parallel matching...
详细信息
This study is concerned with the influence of computer monitors on office productivity. A monitor is a kind of bottleneck in an office workstation that limits the exchange of information between a worker and the compu...
详细信息
This study is concerned with the influence of computer monitors on office productivity. A monitor is a kind of bottleneck in an office workstation that limits the exchange of information between a worker and the computer. This study uses experiments to show that the effect of the monitor on productivity is serious, especially for creative types of work. The amount of information a worker actually needs is small compared with all of the information displayed on the monitor, and software called HiDi is proposed here to enable the user to display the contents of an application that the worker needs. HiDi is application independent free form and compatible with existing task management systems and visualization techniques.
We investigate the problem of video multicast in lossy networks using network coding and multiple description codes. The rate allocation for multiple descriptions can be optimized at the source to generate a scalable ...
详细信息
The current Internet did not define any inherent management constructs and mechanisms;such concepts were added after networking standards and architectures were constructed. This also influenced network management for...
详细信息
ISBN:
(纸本)9781424443376
The current Internet did not define any inherent management constructs and mechanisms;such concepts were added after networking standards and architectures were constructed. This also influenced network management for other types of networks. This paper is the first in a series that explores concepts for a new autonomic approach to network management that can be used for current and next generation networks as well as for the Future Internet.
暂无评论