The new social media such as Twitter and Sina Weibo has become an increasingly popular channel for spreading influence, challenging traditional media such as TVs and news-papers. The most influential and verified user...
详细信息
ISBN:
(纸本)9781467364300
The new social media such as Twitter and Sina Weibo has become an increasingly popular channel for spreading influence, challenging traditional media such as TVs and news-papers. The most influential and verified users, also called big-V accounts on Sina Weibo often attract million of followers and fans, creating massive "celebrity-centric" social networks on the social media, which play a key role in disseminating breaking news, latest events, and controversial opinions on social issues. Given the importance of these accounts, it is very crucial to understand social networks and user influence of these accounts and profile their followers' behaviors. Towards this end, this paper monitors a selected group of influential users on Sina Weibo and collects their tweet streams as well as retweeting and commenting activities on these tweets from their followers. Our analysis on tweet data streams from Sina Weibo reveals when and what the followers comment on the tweets of these influential users, and discovers different temporal patterns and word diversity in the comments. Based on the insight gained from follower characteristics, we further develop simple and intuitive algorithms for classifying the followers into spammers and normal fans. Our experimental results demonstrate that the proposed algorithms are able to achieve an average accuracy of 95.20% in detecting spammers from the followers who have commented on the tweets of these influential accounts.
Switching units and networks have been analyzed as extensible fabrics,mostly in terms of their scheduling *** traditional literature on switching extensibility has provided complexity theory only relating to the total...
详细信息
Switching units and networks have been analyzed as extensible fabrics,mostly in terms of their scheduling *** traditional literature on switching extensibility has provided complexity theory only relating to the total numbers of inputs(or outputs)and exchange *** paper analyzes switching extensibility in terms of not only the scheduling algorithm and also the fabric *** is found that determining extensibility from soft complexity related to the number of inputs(or outputs)of the scheduling algorithm and the fabric extensibility in previous studies without quantization is a flawed conception.A method is thus proposed to express the spatial extensibility of a switching unit or network in terms of the connections of a switching resource and *** method calculates parameter ES(the efciency of switching)of an m×n switching unit and obtains two functions of the switching unit to describe spatial extensibility along with the number of unilateral inputs or *** is found that the range of ES is(0,1]and three types of switching unit and two types of crosspoint networks have ES=*** is calculated for banyan,Clos,parallel packet,fully interconnected and recirculation switching *** ES value for the banyan switching network is larger than that for other networks,and switching networks are classified into three types that have absolute/linear/denied spatial extensibility according to the limES *** is demonstrated that a switching network has the largest ES value when it contains only the five types of switching unit for which ES=***,a group-switching-first self-routing banyan switching network with lower blocking probability and time delay is deduced,and the ES method is contrasted with two other methods of evaluating spatial extensibility in terms of their mathematical expressions and intuitive graphics,for the five types of switching network listed above.
Today’s Internet architecture was designed and proposed in the 60s and 70s with the intention to interconnect several computing resources across a geographically distributed user group. With the advent of substantial...
详细信息
There are more and more emerging problems in today’s Internet, indicating today’s Internet architecture can not meet the quality requirement of various applications and service. With conventional Internet under moun...
详细信息
Dedicated to overcoming weakness of current Internet architecture, some novel internet architectures have been proposed recently. Examples of these architectures contain Information Centric Networking (ICN), Name Data...
详细信息
In order to ensure high quality of service for Next Generation Network, we focus our study on the Wide-Sense Circuit proposed in Flexible Architecture of Reconfigurable Infrastructure. First we construct the functiona...
详细信息
In order to ensure high quality of service (QoS) for Next Generation Network (NGN), we construct an innovative Load-Balanced Multipath Self-routing Switching Structure which consists of the same two multipath self-rou...
详细信息
ISBN:
(纸本)9789881925336
In order to ensure high quality of service (QoS) for Next Generation Network (NGN), we construct an innovative Load-Balanced Multipath Self-routing Switching Structure which consists of the same two multipath self-routing fabrics. The result of simulation is inspiring for achieving 100% throughput and no delay or jitter. For this reason, we start on the implementation on an Altera StratixIV FPGA. And the whole FPGA system is designed into two collaborative components: the UDP system and the register system. With two algorithms around input and output two stages, incoming traffic is transformed into uniformity and then to their final destinations. During the later period debugging, software simulation platform and automated test platform are built, which contribute to our work very much. At last, we carry out several experiments to test and verify our system. The report of the test result accords with what we expected.
The traditional multicast switch fabrics, which were mainly developed from the unicast switch fabrics, currently are not able to achieve high efficiency and flexible large-scale scalability. In the light of lattice th...
详细信息
With the rise of social networking in the web2.0 era, the Internet gradually evolves to be community-based [1]. The process of obtaining information via the Internet reflects certain social characteristics. In order t...
详细信息
With the rise of social networking in the web2.0 era, the Internet gradually evolves to be community-based [1]. The process of obtaining information via the Internet reflects certain social characteristics. In order to adapt recommendation technology to such changes, a trust-based recommendation algorithm is approached in this paper. The research is conducted in a practical application environment, a P2 P file-sharing system named Maze [2]. The algorithm is designed as follows: 1) digging download logs and friendship logs, 2) establishing trust-net social model. The empirical results show that the algorithm has improved recommendation quality significantly compared with the original content-based recommendation algorithm used in Maze.
暂无评论