석사학위논문. Master s Thesis 온라인소셜네트워크의성장. Growth in Online Social Networks: Sheer Volume vs Social Interaction. 전현우 ( 全玹佑 Chun, Hyunwoo) 전자전산학과전산학전공

Size: px
Start display at page:

Download "석사학위논문. Master s Thesis 온라인소셜네트워크의성장. Growth in Online Social Networks: Sheer Volume vs Social Interaction. 전현우 ( 全玹佑 Chun, Hyunwoo) 전자전산학과전산학전공"

Transcription

1 석사학위논문 Master s Thesis 온라인소셜네트워크의성장 Growth in Online Social Networks: Sheer Volume vs Social Interaction 전현우 ( 全玹佑 Chun, Hyunwoo) 전자전산학과전산학전공 Department of Electrical Engineering and Computer Science Division of Computer Science 한국과학기술원 Korea Advanced Institute of Science and Technology 2008

2 온라인소셜네트워크의성장 Growth in Online Social Networks: Sheer Volume vs Social Interaction 2

3 Growth in Online Social Networks: Sheer Volume vs Social Interaction Advisor : Professor Moon, Sue Bok by Chun, Hyunwoo Department of Electrical Engineering and Computer Science Division of Computer Science Korea Advanced Institute of Science and Technology A thesis submitted to the faculty of the Korea Advanced Institute of Science and Technology in partial fulfillment of the requirements for the degree of Master of Engineering in the Department of Electrical Engineering and Computer Science, Division of Computer Science. Daejeon, Korea Approved by Professor Moon, Sue Bok Advisor

4 온라인소셜네트워크의성장 전현우 위논문은한국과학기술원석사학위논문으로학위논문심사 위원회에서심사통과하였음 년 12 월 4 일 심사위원장문수복 ( 인 ) 심사위원윤현수 ( 인 ) 심사위원 Otfried Cheong ( 인 )

5 MCS 전현우. Chun, Hyunwoo. Growth in Online Social Networks: Sheer Volume vs Social Interaction. 온라인소셜네트워크의성장. Department of Electrical Engineering and Computer Science, Division of Computer Science p. Advisor Prof. Moon, Sue Bok. Text in English. Abstract i

6 Contents Abstract i Contents iii List of Tables iv List of Figures v 1 Introduction 1 2 User Interaction Captured in Cyworld Guestbook Growth of Guestbook Activity Self-Posting in Guestbook Activity Network 6 4 Factors Contributing to Activity Peer pressure Reciprocity of User Activity Steady Core Analysis Why Is Steady Core Important? Basic Statistics of Steady Core Topological Characteristics of Steady Core Compare Friendship Network with Activity Network The Impact of Power Users in Two Networks Related Work 17 8 Conclusion 18 Summary (in Korean) 19 References 20 iii

7 List of Tables 2.1 Description of Our Cyworld Data Description of Giant Connected Component in Steady Core iv

8 List of Figures 2.1 Comparison of growth in various user statistics in Cyworld Growth of the activity network in strength and degree The evolution of each user group. (a)average degree per month, (b)average strength per month (a) Node strength vs number of friends (b) Median node strength vs number of friends ALL: Node strength linearly correlated to the number of friends up to 200 or so friends Reciprocity of each user, (a) The number of receiving and writing messages, (b) The median of receiving and writing messages of each user Reciprocity of each link, (a) The number of received and writing messages (A B, A B, (b) The median of received and writing messages CDF of duration of edges last Monthly changing of top 1% hub nodes Degree distribution of steady core v

9 1. Introduction The theme of today s Internet services is social networking. Not only online social network services, Myspace and Facebook, but also other major web 2.0 services, Flickr, Del.icio.us, and YouTube, offer social networking features to their services. Users are getting used to interact each other through these features: making friend relationships, sharing their photos, and writing comments. Especially, online social networks assist users to make explicit frienship in online, and users easily make friendship with other users. These friend relations based on trust are expected to become a key to solve recommendation [], security [], search [], and personalization [] issues. Understanding friend relations is the first step to achieve them, and recent studies about social networks focus on the explicit friend relations [1, 6]. Friend relations on trust are valuable for some research area, but their characteristics are not enough to represent the status of online social networks at that time. The main reason comes from user behavior managing their friends. Once users make friend relations with others in online social network services, they tend not to break relations [1]. Consequently, the friend network is a history of all the past friend networks. The other reason is that a friend relation is the only start line of social interactions in online social network services. Making friend relations typically cannot be repeated after they are created. Looking friends photos, reading friends articles, and leaving comments to friends guestbooks are not observed in the friend relations, although these activities may come from friend relations. Macroscopically, the number of users, the number of daily visitors, and page views are three famous metrics to measure the status of online SNSs. These metrics describe overall status of online social network services, but hard to look into a part of social networks in detail. In this paper, we suggest to move the focus on analysis of online social networks from friend network to activity network for deeply understanding online social networks. The activity network is constructed from complete guestbook logs of Cyworld, the most biggest online social network service in Korea. Over two years guestbook logs give us insight to understand user activities: whether user activities transparently reflect the growth of online social networks? what affects user activities? can we find active user groups in online social networks? what charactistics do those groups have? and how much different the friend network and the activity network? 1

10 To our best knowledge, this is the first large-scale work to analyze user activities in online social network services. Although there are some literatures to anlayze user activities in different medium, call networks [] and msn messenger networks [], we present unique characteristics of activity networks in online social networks. Also, from the difference between the friend network and the activity network, we propose that we must carefully choose relevant one of both networks for different analysis or simulation goals. The remainder of this paper is structured as follows. In Chapter??, we describe the Cyworld, guestbook data of Cyworld. In Chapter 3, we define the activity network and construct it. In Chapter??, we describe factors contributing to activity network. In Chapter 5, we describe the steady core and analysis it. We compare friendship network with activity network in Chapter 6. 2

11 2. User Interaction Captured in Cyworld Guestbook In this section, we describe the social network data we use for this study. Cyworld, launched in 2001, is the largest online social network service in Korea. When a user joins Cyworld, one is given a homepage (called minihompy) that contains an avatar, a photo gallery, a public diary, a testimonial board, a guestbook, etc. A user can establish friend relationships with other users and share information only with those established relationships. As of October 2007, the number of registered Cyworld users has surpassed 20 million, that is more than a third of the entire South Korea population 1. As the huge number of registered users represents, people spend much time logged onto Cyworld and manage various aspects of social life online. Users browse through friends photos and leave comments. They read others public diaries and write testimonials for those established friends. Some of the features, such as writing a testimonial and viewing photos, are often limited to only those with established online friend relationships. The guestbook is accessible to any user and is the most used feature. Also it is a recorded two-way interaction, while viewing photos and reading public diaries are not recorded or reported to the owner of the photos and diaries. Ahn et al have analyzed Cyworld s topological characteristics of bi-directional friend relationships. Once established, a friend relationship is hardly severed and remains whether users stay in touch or not. It is an assertion that some relationship existed, currently active or not. In this work, we delve deeper into the web of social networking and study the user interaction captured in the guestbook. Unlike a friend relationship, that is bidirectional, a message on a guestbook represents a directional interaction between users. On a guestbook, people write greetings, recent news, and replies to messages. And they do not have to have an established friend relationship to use the guestbook. We have obtained the complete guestbook logs of Cyworld from June 2003 to October This period is very important in the development of Cyworld, as the number 1 Upon joining, a new user must have its personal identification number (equivalent of U.S. s social security number) verified. Foreigners have special provisions for membership. All user accounts on Cyworld map to real users, unless a user make an illicit use of other people s personal identification numbers 3

12 of users grew exponentially from 2 million to 16 million and the friend relationship network began to show a sign of densification [1]. In this work we investigate whether the growth in actual user interaction, the key aspect of social networking services, has kept up with the external growth. Our guestbook log consists of three columns: the writer, the guestbook owner, and the time. All user identifiers have been anonymized. As of October 2005, the number of Cyworld subscribers reached 16,023,307, 75.2% or 12,048,186 users have formed friend relationships with others, and 65.4% or 10,476,604 users have written or received at least once during the period of our guestbook logs. Compared to 381,602,530 friend relationships, the number of the writer and guestbook owner pairs is 537,970,431. Table 2.1 summarizes our dataset. Table 2.1: Description of Our Cyworld Data Period Number of Users Appeared in Data 17,788,870 Number of Messages (Tuples) 8,423,218,770 Number of Unique Tuples 537,970,431 Mean # of Written Msg. per User 637 (397) Mean # of Received Msg. per User 484 (297) 2.1 Growth of Guestbook Activity In the previous section, we have claimed that the guestbook is the most used feature and best represents the actual interaction among users. In this section, we quantitatively demonstrate the popularity of the guestbook feature. Figure 2.1 shows the following numbers: Registered users Registered users with friend relationships Users who have written at least one guestbook message during our dataset period Users who have written at least in that particular month We observe that the number of Cyworld users grew almost ten-fold in that short time span, and the cumulative number of guestbook users also experienced an exponential growth. However, the number of guestbook users never caught up with the total number of Cyworld users. Moreover, the monthly statistics of guestbook users started to abate in growth. 4

13 1.8e e e e+07 total users users w/ friends cum # of writers writers per month Population 1e+07 8e+06 6e+06 4e+06 2e Time Figure 2.1: Comparison of growth in various user statistics in Cyworld 2.2 Self-Posting in Guestbook When a friend write a message on a guestbook, the owner of the guestbook often replies in one s own guestbook, instead of visiting the friend s homepage and write there. This activity is captured in our guestbook log as a 3-tuple that has the same writer and owner. We call this tuple a self-post. Self-posts take up about a third or 38.9% in all posts, and they persist over time. Also 81.8% of users who have written at least once have written a self-post. For half of the users, 33.3% of their writings are self-posts. This is not negligible phenomenon. As follows, we determine how to interpret self-posts before analyzing user activities of guestbook logs. A self-post serves either of the two purposes: a message written for viewing by all others (a notice) or a reply specifically for a preceding message. We cannot distinguish a notice from a reply in the guestbook log, as they both appear as 3-tuples with the same writer and owner. The problem is that two types of self-post have no difference in guestbook logs, but influences of two types are greately different; A reply is intuitively motivating other users to interact continuously, but a notice message does not directly influence other users. However, in Cyworld a public diary serves a similar purpose as a notice, and we conjecture most self-posts are actually replies. As self-posting is an important aspect of user activity, we include it in our activity analysis in the next section. 5

14 3. Activity Network Graph representation of social networks is an apt abstraction of their connected nature and allows us to tap into the rich repository of graph and complex network theories. In this section we describe how we represent the user interaction on the guestbook as a graph and define metrics of interaction. We map a user to a node and a message to a directional weighted edge. In the rest of the paper, we refer to a user and a node interchangeably. An edge from node A to node B denotes that user A has written a message on user B s guestbook. The weight of the edge is the number of messages user A has written to user B. We include self-posting in our analysis as a reflexive edge pointing at itself. We call this directed and weighted graph the activity network. Our activity network is different from the friend network studied in [1] in the following two aspects: Edges are directional. Even represented as undirectional graph, the activity network is not a proper subset of the friend network, for users without established friend relationships can still write onto each other s guestbooks. We use the following two metrics to capture users activity quantitatively. Strength: the sum of all weights of edges originating from a node (the total number of messages a user has written) Degree: the number of edges originating from a node (the total number of unique guestbooks a user has written onto) In Figure 3.1 we plot four cumulative distribution functions (CDF): Cumulative node strength since June 2003 Monthly average of node strength Cumulative node degree since June 2003 Monthly average of node degree 6

15 Figure 3.1: Growth of the activity network in strength and degree As our guestbook data is from the period of explosive growth, a large number of users have joined and the time of membership initiation should be taken into consideration. Hence, monthly averages of node strength and degree are calculated by taking the cumulative node strength and degree by October 2006 and dividing them by the number of months since the first time a user has written a message in our dataset period. Not all users write on a guestbook as soon as they join Cyworld and there is a gap between a membership initiation and the first guestbook activity. In this sense the average node strength and degree, as we calculate, are upper bounds on actual monthly average activity of users. Half the Cyworld users with guestbook activity have written at least 170 messages in 25 different users guestbooks. Top 10% of those users have written more than 1800 messages on 100 and more guestbooks. To know whether user activity reflect the status of online social network services, at first we divide all users into three groups by the level of their activities that are top 10%, top 10 to 50%, and remain users. We compare the growth of three groups with that of Cyworld over time. Due to level of activities varies over time, we set theshold values of activity level to the monthly averages of node strength and degree from the Figure 3.1. Half the Cyworld users have written at least 16 messages in 6 different users guestbooks per month. Top 10% of those users have written more than 117 messages on 24 and more guestbooks per month. We compare the evolution of three user groups. In figure 3.2(a), we can observe that the number of top 10% users did not increase from Sep while the number of top 10 to 50% and that of under 50% users have increased steadily. We can also observe similar phenomenon in Fiugre 3.2(b). The only difference between two figures is that the number of top 10% users in Figure 3.2(b) decreases. 7

16 4e e+06 top 10% top 10-50% remains 4e e+06 top 10% top 10-50% remains 3e+06 3e+06 Number of users 2.5e+06 2e e+06 Number of users 2.5e+06 2e e+06 1e+06 1e Time Time Figure 3.2: The evolution of each user group. (a)average degree per month, (b)average strength per month 8

17 4. Factors Contributing to Activity In Section 3, we construct the activity network and observe that activity of users varies over month. In this section we investigate factors that contribute to activity in our online social network. Peer pressure and popularity are often the main causes behind our human social activities. We investigate how these two factors impact activity in the online social network. 4.1 Peer pressure We first ask the following question: "Are people socially more active, if they have many friends?" We would like to know if one s number of friends plays an encouraging role, as the more friends have joined the same online social networking service, the more peer pressure one might receive median node strength # of friends Figure 4.1: (a) Node strength vs number of friends (b) Median node strength vs number of friends ALL: Node strength linearly correlated to the number of friends up to 200 or so friends. We plot the node strength against the number of friends in Figure 4.1(a). At a first glance, the node strength does not seem to increase linearly to the number of users. When we take a closer look at the zoomed-in inset, we recognize a somewhat correlated increase in strength up to users with about 200 of friends. Then the node strength starts to di- 9

18 minish, even as the number of friends increases. In order to verify a trend in correlation, we plot the median node strength per number of friends in Figure 4.1(b). The graph shows a clear linear correlation between node strength and the number of user up to about 200, and then disperses. The Pearson correlation coefficient of the overall graph in Figure 4.1(a) is We split the users into two separate groups, those with 200 or fewer friends and with more than 200, and compute the correlation coefficients. For the first group, the Pearson correlation coefficient is , strongly positive; for the other group, only Intuitively, the more friends one has, the more active one should be socially. However, beyond 200 or so friends, one must reach a limit in one s socializing capacity. The breakoff point of 200 in our analysis is larger than predicted by Dunbar s Law [?]. From our data, we see that people in the 21st century can keep up with social activities involving 200 friends or so. Though the size of human neo-cortex has not grown since Dunbar s time, technology has assisted in our evolution into a more social creature. This outcome is in agreement with the previous work that reports a fall-out from a single scaling behavior in the node degree distribution and conjectures the emergence of online-only relationships [1]. Users with more than 200 friends are not particularly more active or at least as much compared to those with fewer friends. We suppose that the graph is another representation of Dunbar s law. Dunbar s law is that there are different limitations of the number of manageable relationships following species. In our previous work [1], we use Dunbar s law to describe the two scales in degree distribution graph of Cyworld friend networks; we find out scales change occurring at users having about 200 friends. Similarly, in Figure 4.1, changing correlation coefficient from positive to almost 0 occurs from users who having about 200 friends. Changing correlation is strongly related to the manageable limit number of relations rather than our previous work, because the load of writing messages is much harder than send or accept requests for friends. Figure 4.1 (b) clearly shows the changing trends. This graph exhibits the mean number of written messages of users who have the same number of friends; positive scale region under 200 friends and the scattering region over 200 friends. From these two graphs, we assume that 1) there is the limitation of the number of manageable friends, about 200, 2) until the limitation, more friends, more activities. 3) over the limitation, the number of friends are not related to activities. 10

19 4.2 Reciprocity of User Activity We look into the reciprocity of user activities. We show that peer pressure is exerted by not only the number of friends but also the number of exchanged messages. We compare the number of received and written messages of each user in Figure 4.2, and of each user pair in Figure 4.3. We can detect three regions: similar received and written messages, a few received but many written messages, and a few received but many written messages. The first and largest region is placed following y = x. The number of written messages by users who are included in this region is similar with that of received messages. We can assume that received messages are motivated users to write messages, vice and versa. Another two regions present opposite characteristics of two user groups. One group is that they write only a few replies, but they receive many messages. We conjecture a part of these users are originally very popular people such as celebrities. The other group is that they receive a few messages, but they write many messages. We conjecture a part of these users are spammers, or very passionate fanboys. 1e # of received messages e+06 # of written messages Figure 4.2: Reciprocity of each user, (a) The number of receiving and writing messages, (b) The median of receiving and writing messages of each user Through only the summation of written messages to all friends we cannot know the distribution of messages over friends. For example, among 100 friends, actively exchanging 100 messages with only one friends is greatly different from exchanging one message with every 100 friends. To compare peer pressure between these cases, we plot the number of exchanged messages between user pairs in Figure 4.3. The shape of user groups following y = x becomes more sharply; the number of written and received messages are almost the same in this group. Online exchanging messages are motivated each other reciprocally like 11

20 offline conversation # of B->A e+06 # of A->B Figure 4.3: Reciprocity of each link, (a) The number of received and writing messages (A B, A B, (b) The median of received and writing messages 12

21 5. Steady Core Analysis The steady core is defined as the network of users who 1) write amount of guestbook (active user) and 2) write guestbook steadily every month (steady user). In this section, we analyze steady core of networks based on user activities. 5.1 Why Is Steady Core Important? cdf duration Figure 5.1: CDF of duration of edges last # of hubs # of consecutive hubs number month Figure 5.2: Monthly changing of top 1% hub nodes 13

22 Writing a message is a repetitive activity. The number of writing and receiving messages shows how much two users are interested in or related each other. Of course, this is not an accurate but an approximate measure, because Cyworld provide another features to interact bewteen users. Both numbers are various by users in Figure 4.3, as follows, the activity network is changed extensively. To know how much the activity network changes over time, we have two points of view: one is from the edge s perspecive, and the other is from the active node s perspective. We show how long activities last in Figure 5.1 by constructing activity networks every month and compare edges among them. A half of edges do not last even two months; Each user s activity intensively changes. In addition, Over 60% of the most top 1% active users are changed monthly in Figure 5.2. In Section 4.2, we examine that active users can motivate other users to interact each other. If active users are strongly connected each other, they can be a powerful source of activities. Thus, clearly identifying the set of active users is directly related to understand online social networks. 5.2 Basic Statistics of Steady Core In order to determine active user and steady user, we use two metrics: user s overall strength and standard deviaition (SD) of strength per month. Both threshold values are set to median of each metric. In this paper, threshold value of overall strength is set to 171 according to Figure 3.1 and that of SD set to 16. We extract steady from users whose SD value is smaller than 16 and user writes messages at least 171 times. The number of these users is 499,397, and they are divided into 103,657 weakly connected components (WCC), the biggest one has 371,674 users and size of other components is smaller than 18. We choose the most giant connected component (GCC) to analyze the characteristics of steady core. Steady core consists of 371,674 users and 1,269,240 edges. These users are about 2% of entire users. They write all 67,216,193 messages and 36,288,688 messages of them to other users in steady core. These messages are about 0.43% of all messages. Considering the size of the steady core, their activities are quite high. 14

23 Table 5.1: Description of Giant Connected Component in Steady Core Number of Users 371,674 Number of Messages 36,288,688 Number of Unique Tuples 1,269,240 Mean # of Written Msg. per User Topological Characteristics of Steady Core Then, we look into topological characteristics of steady core. Topological analysis can show what basic statistics does not show. In our previous work [1], we present that Cyworld friendship network is mixed up two different types of friend relationships through topological analysis out-degree in-degree 10-2 CCDF degree of node Figure 5.3: Degree distribution of steady core Figure 5.3 is degree distribution of steady core. We can find two different scale that are abserved in the degree distribution of the friend network. Figure?? shows distribution of clustering coefficient of each node. The average clustering coefficient is Comparing XXX, the clustering coefficient of the entire activity newtork, steady core is well clustered. 15

24 6. Compare Friendship Network with Activity Network In this section, we focus on the difference between the friendship network and activity network. Both networks comes from the same Cyworld users but the different connection of users. Not only the connectivity of two users, but also dynamics is greatly different. Activity network changes much faster and intenser. This raise some interesting questions about the activity network. How long does edge last? How much do degree and strength of one node change monthly? Are hub nodes steady? How many nodes are neighbors of hubs? Is this number changed? Through answers of these questions, we deeply understand the activity network. 6.1 The Impact of Power Users in Two Networks Hub nodes in the friendship network and the activity network are representatives of the power users in viral marketing []. Whose hubs are more close to power users in information propagation is out of scope of this paper, but we investigate the characteristics of hubs in both networks as preliminary work for reasoning it. Our first focus is the proportion of overlap of hub nodes in both networks. We extract each top 1% hub nodes from both two networks, the friendship network and the activity network. The number of hub nodes who have more than 151 friends in the friendship network is 121,886 and that of hub nodes who write guestbooks on more than 207 users in the activity network is 134,490. Of two kinds of hub nodes, 63,800 users are overlaped. We also extract each top 1% hub nodes from monthly data in order to know whether hub nodes in the activity network are steady. Threshold value of top 1% degree increases until May 2004 and is kept. Hub nodes who are appeared in both consecutive two months is XX % of total nodes. 16

25 7. Related Work Social network analysis has been developed mainly from sociology and anthropology [12]. As electronically piled social network data enable observing the large-scale statistics of networks, the social network has became a hot topic also for the scientists in other fields, such as physics and computer science. World Wide Web has been giving birth to an army of social network services. SNSs have already occupied substantial portion of our relationships and they are treated as a major part of our social lives [13]. Before the emergence of large-scale online social network services, variety of other online social networks have been analyzed. Many analyses used the networks, the most basic communication medium [2, 5, 10, 11]. Valverde and Solé study the social network of open source communities [10,11]. The massive data of mobile communication was recently analyzed [8, 7]. Using mobile phone records of millions of people, they examine the communication pattern of people. They argued that the stability of communication network largely depends on the weak ties in the network. Holme et al. analyze an online dating community in detail [4]. In this work, the time evolution of activity showed the saturation of degree, power-law activity pattern, and.. Mislove et al. investigate various social network services [6]. Internet communities [9, 4, 3, 5]. 17

26 8. Conclusion 18

27 요약문 온라인소셜네트워크의성장 19

28 References [1] Y.-Y. Ahn, S. Han, H. Kwak, S. Moon, and H. Jeong. Analysis of topological characteristics of huge online social networking services. In WWW 07: Proceedings of the 16th international conference on World Wide Web, pages , New York, NY, USA, ACM Press. [2] H. Ebel, L.-I. Mielsch, and S. Bornholdt. Scale-free topology of networks. Phys. Rev. E, 66:035103, [3] K.-I. Goh, Y.-H. Eom, H. Jeong, B. Kahng, and D. Kim. Structure and evolution of online social relationships: Heterogeneity in unrestricted discussions. Phys. Rev. E, 73:066123, [4] P. Holme, C. R. Edling, and F. Liljeros. Structure and time-evolution of an internet dating community. Social Networks, 26:155, [5] G. Kossinets and D. Watts. Emprical Analysis of an Evolving Social Network. Science, 311(88), [6] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and Analysis of Online Social Networks. In ACM Internet Measurement Conference, October [7] J.-P. Onnela, J. Saramäki, J. Hyvönen, G. Szabó, M. A. de Menezes, K. Kaski, A.-L. Barabási, and J. Kertész. Analysis of a large-scale weighted network of one-to-one human communication. New Journal of Physics, 9:179, [8] J.-P. Onnela, J. Saramäki, J. Hyvönen, G. Szabó, D. Lazer, K. Kaski, J. Kertész, and A.-L. Barabási. Structure and tie strengths in mobile communication networks. Proc. Nat. Acad. Sci., 104(18):7332, [9] F. T. Rothaermel and S. Sugiyama. Virtual internet communities and commercial success: individual and community-level theory grounded in the atypical case of timezone.com. Journal of Management, 27(3):297, [10] S. Valverde and R. V. Solé. Evolving social weighted networks: Nonlocal dynamics of open source communities. arxiv:physics/ v1. 20

29 [11] S. Valverde and R. V. Solé. Self-organization versus hierarchy in open-source social networks. Phys. Rev. E, 76:046118, [12] S. Wasserman and K. Faust. Social network analysis. Cambridge University Press, Cambridge, [13] B. Wellman. Computer networks as social networks. Science, 293(5537):2031,

30 감사의글 이논문을완성하기까지주위의모든분들로부터수많은도움을받았습니다.

31 이력서 이 름 : 전현우 생년월일 : 1984년 4월 15일 출 생 지 : 부산광역시동구초량동 1247번지의 2 본 적 지 : 부산광역시중구부평동 2가 56번지 주 소 : 부산광역시동구범일 2동한양아파트 주소 : hyunwoo@an.kaist.ac.kr 학 력 부산과학고등학교 (2 년수료 ) 한국과학기술원전산학과 (B.S.) 한국과학기술원전산학과 (M.S.)

Predicting Content Virality in Social Cascade

Predicting Content Virality in Social Cascade Predicting Content Virality in Social Cascade Ming Cheung, James She, Lei Cao HKUST-NIE Social Media Lab Department of Electronic and Computer Engineering Hong Kong University of Science and Technology,

More information

Social Network Analysis in HCI

Social Network Analysis in HCI Social Network Analysis in HCI Derek L. Hansen and Marc A. Smith Marigold Bays-Muchmore (baysmuc2) Hang Cui (hangcui2) Contents Introduction ---------------- What is Social Network Analysis? How does it

More information

Data Visualisation. Jingpeng Li. Data Visualisation

Data Visualisation. Jingpeng Li. Data Visualisation Data Visualisation Jingpeng Li 1 of 28 Data Visualisation Our eyes are very good at data mining We can spot patterns, trends and clusters instantly in plotted data Problems begin when data covers more

More information

Tourism network analysis 1

Tourism network analysis 1 Tourism network analysis 1 Tourism and tourism systems can be defined in many ways, but, even if there is scarce agreement on possible definition, a tourism system, like many other economic and social

More information

Realistic Social Networks for Simulation using Network Rewiring

Realistic Social Networks for Simulation using Network Rewiring Realistic Social Networks for Simulation using Network Rewiring Dekker, A.H. Defence Science and Technology Organisation, Australia Email: dekker@acm.org Keywords: Social network, scale-free network, small-world

More information

Introduction. Article 50 million: an estimate of the number of scholarly articles in existence RESEARCH ARTICLE

Introduction. Article 50 million: an estimate of the number of scholarly articles in existence RESEARCH ARTICLE Article 50 million: an estimate of the number of scholarly articles in existence Arif E. Jinha 258 Arif E. Jinha Learned Publishing, 23:258 263 doi:10.1087/20100308 Arif E. Jinha Introduction From the

More information

An Analysis of the BBO Fans Online Social Gaming Community

An Analysis of the BBO Fans Online Social Gaming Community An Analysis of the BBO Fans Online Social Gaming Community Vlad Posea, Mihaela Balint, Alexandru Dimitriu, Alexandru Iosup Faculty of Automation and Computer Science, Politehnica University of Bucharest,

More information

Are Scale-Free Networks Functionally Robust?

Are Scale-Free Networks Functionally Robust? Are Scale-Free Networks Functionally Robust? Alon Keinan 1, Eytan Ruppin 1,2 1 School of Computer Sciences, Tel-Aviv University, Tel-Aviv, Israel {keinanak,ruppin}@post.tau.ac.il 2 School of Medicine,

More information

Techniques for Generating Sudoku Instances

Techniques for Generating Sudoku Instances Chapter Techniques for Generating Sudoku Instances Overview Sudoku puzzles become worldwide popular among many players in different intellectual levels. In this chapter, we are going to discuss different

More information

IES, Faculty of Social Sciences, Charles University in Prague

IES, Faculty of Social Sciences, Charles University in Prague IMPACT OF INTELLECTUAL PROPERTY RIGHTS AND GOVERNMENTAL POLICY ON INCOME INEQUALITY. Ing. Oksana Melikhova, Ph.D. 1, 1 IES, Faculty of Social Sciences, Charles University in Prague Faculty of Mathematics

More information

Diffusion of Innovation Across a National Local Health Department Network: A Simulation Approach to Policy Development Using Agent- Based Modeling

Diffusion of Innovation Across a National Local Health Department Network: A Simulation Approach to Policy Development Using Agent- Based Modeling Frontiers in Public Health Services and Systems Research Volume 2 Number 5 Article 3 August 2013 Diffusion of Innovation Across a National Local Health Department Network: A Simulation Approach to Policy

More information

Module Role of Software in Complex Systems

Module Role of Software in Complex Systems Module Role of Software in Complex Systems Frogs vei 41 P.O. Box 235, NO-3603 Kongsberg Norway gaudisite@gmail.com Abstract This module addresses the role of software in complex systems Distribution This

More information

Gender Swapping and User Behaviors in Online Social Games

Gender Swapping and User Behaviors in Online Social Games Gender Swapping and User Behaviors in Online Social Games Jing-Kai Lou, Kunwoo Park, Meeyoung Cha, Juyong Park, Chin-Laung Lei, Kuan-Ta Chen In proc. of the 22nd International Conference on WWW, 2013 Online

More information

UNIT-4 POWER QUALITY MONITORING

UNIT-4 POWER QUALITY MONITORING UNIT-4 POWER QUALITY MONITORING Terms and Definitions Spectrum analyzer Swept heterodyne technique FFT (or) digital technique tracking generator harmonic analyzer An instrument used for the analysis and

More information

RECOMMENDATION ITU-R M.1391 METHODOLOGY FOR THE CALCULATION OF IMT-2000 SATELLITE SPECTRUM REQUIREMENTS

RECOMMENDATION ITU-R M.1391 METHODOLOGY FOR THE CALCULATION OF IMT-2000 SATELLITE SPECTRUM REQUIREMENTS Rec. ITU-R M.1391 1 RECOMMENDATION ITU-R M.1391 METHODOLOGY FOR THE CALCULATION OF IMT-2000 SATELLITE SPECTRUM REQUIREMENTS Rec. ITU-R M.1391 (1999 1 Introduction International Mobile Telecommunications

More information

Technologists and economists both think about the future sometimes, but they each have blind spots.

Technologists and economists both think about the future sometimes, but they each have blind spots. The Economics of Brain Simulations By Robin Hanson, April 20, 2006. Introduction Technologists and economists both think about the future sometimes, but they each have blind spots. Technologists think

More information

Social Network Data and Practices: the case of Friendfeed

Social Network Data and Practices: the case of Friendfeed Social Network Data and Practices: the case of Friendfeed Fabio Celli 1, F. Marta L. Di Lascio 2, matteo magnani 3, Barbara Pacelli 4, and Luca Rossi 5 1 Language Interaction and Computation Lab, University

More information

OPINION FORMATION IN TIME-VARYING SOCIAL NETWORK: THE CASE OF NAMING GAME

OPINION FORMATION IN TIME-VARYING SOCIAL NETWORK: THE CASE OF NAMING GAME OPINION FORMATION IN TIME-VARYING SOCIAL NETWORK: THE CASE OF NAMING GAME ANIMESH MUKHERJEE DEPARTMENT OF COMPUTER SCIENCE & ENGG. INDIAN INSTITUTE OF TECHNOLOGY, KHARAGPUR Naming Game in complex networks

More information

A Qualitative Research Proposal on Emotional. Values Regarding Mobile Usability of the New. Silver Generation

A Qualitative Research Proposal on Emotional. Values Regarding Mobile Usability of the New. Silver Generation Contemporary Engineering Sciences, Vol. 7, 2014, no. 23, 1313-1320 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49162 A Qualitative Research Proposal on Emotional Values Regarding Mobile

More information

Developing Frogger Player Intelligence Using NEAT and a Score Driven Fitness Function

Developing Frogger Player Intelligence Using NEAT and a Score Driven Fitness Function Developing Frogger Player Intelligence Using NEAT and a Score Driven Fitness Function Davis Ancona and Jake Weiner Abstract In this report, we examine the plausibility of implementing a NEAT-based solution

More information

Social Network Analysis and Its Developments

Social Network Analysis and Its Developments 2013 International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2013) Social Network Analysis and Its Developments DENG Xiaoxiao 1 MAO Guojun 2 1 Macau University of Science

More information

Internal and External Behavior of a Simulated Bead Pile Rachel Mary Costello. Physics Department, The College of Wooster, Wooster, Ohio 44691

Internal and External Behavior of a Simulated Bead Pile Rachel Mary Costello. Physics Department, The College of Wooster, Wooster, Ohio 44691 Internal and External Behavior of a Simulated Bead Pile Rachel Mary Costello Physics Department, The College of Wooster, Wooster, Ohio 44691 May 5, 2000 This study deals with a computer model of a three-dimension

More information

Chapter 3 WORLDWIDE PATENTING ACTIVITY

Chapter 3 WORLDWIDE PATENTING ACTIVITY Chapter 3 WORLDWIDE PATENTING ACTIVITY Patent activity is recognized throughout the world as an indicator of innovation. This chapter examines worldwide patent activities in terms of patent applications

More information

Review. In an experiment, there is one variable that is of primary interest. There are several other factors, which may affect the measured result.

Review. In an experiment, there is one variable that is of primary interest. There are several other factors, which may affect the measured result. Review Observational study vs experiment Experimental designs In an experiment, there is one variable that is of primary interest. There are several other factors, which may affect the measured result.

More information

Social Network Theory and Applications

Social Network Theory and Applications Social Network Theory and Applications Leonid E. Zhukov School of Applied Mathematics and Information Science National Research University Higher School of Economics 13.01.2014 Leonid E. Zhukov (HSE) Lecture

More information

Infographic: Google Search Prevalence by State

Infographic: Google Search Prevalence by State Chitika Insights Infographic: Google Search Prevalence by State August 13, 2013 A publication of 1 Introduction While Google has long been the most-used search engine domestically, Chitika Insights latest

More information

Analyzing the User Inactiveness in a Mobile Social Game

Analyzing the User Inactiveness in a Mobile Social Game Analyzing the User Inactiveness in a Mobile Social Game Ming Cheung 1, James She 1, Ringo Lam 2 1 HKUST-NIE Social Media Lab., Hong Kong University of Science and Technology 2 NextMedia Limited & Tsinghua

More information

Visualizations of personal social networks on Facebook and community structure: an exploratory study

Visualizations of personal social networks on Facebook and community structure: an exploratory study European Journal of Social Behaviour 2 (1): 21-30, 2015 ISSN 2408-0292 Visualizations of personal social networks on Facebook and community structure: an exploratory study Published online: 30 June 2015

More information

Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters

Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters Scott Watson, Andrew Vardy, Wolfgang Banzhaf Department of Computer Science Memorial University of Newfoundland St John s.

More information

Revisiting the Tradespace Exploration Paradigm: Structuring the Exploration Process

Revisiting the Tradespace Exploration Paradigm: Structuring the Exploration Process Revisiting the Tradespace Exploration Paradigm: Structuring the Exploration Process Adam M. Ross, Hugh L. McManus, Donna H. Rhodes, and Daniel E. Hastings August 31, 2010 Track 40-MIL-2: Technology Transition

More information

The Uses of Big Data in Social Research. Ralph Schroeder, Professor & MSc Programme Director

The Uses of Big Data in Social Research. Ralph Schroeder, Professor & MSc Programme Director The Uses of Big Data in Social Research Ralph Schroeder, Professor & MSc Programme Director Hong Kong University of Science and Technology, March 6, 2013 Source: Leonard John Matthews, CC-BY-SA (http://www.flickr.com/photos/mythoto/3033590171)

More information

INTERNET AND SOCIETY: A PRELIMINARY REPORT

INTERNET AND SOCIETY: A PRELIMINARY REPORT IT&SOCIETY, VOLUME 1, ISSUE 1, SUMMER 2002, PP. 275-283 INTERNET AND SOCIETY: A PRELIMINARY REPORT NORMAN H. NIE LUTZ ERBRING ABSTRACT (Data Available) The revolution in information technology (IT) has

More information

Relation Formation by Medium Properties: A Multiagent Simulation

Relation Formation by Medium Properties: A Multiagent Simulation Relation Formation by Medium Properties: A Multiagent Simulation Hitoshi YAMAMOTO Science University of Tokyo Isamu OKADA Soka University Makoto IGARASHI Fuji Research Institute Toshizumi OHTA University

More information

Inequality as difference: A teaching note on the Gini coefficient

Inequality as difference: A teaching note on the Gini coefficient Inequality as difference: A teaching note on the Gini coefficient Samuel Bowles Wendy Carlin SFI WORKING PAPER: 07-0-003 SFI Working Papers contain accounts of scienti5ic work of the author(s) and do not

More information

The Small World Problem. Duncan Watts Columbia University

The Small World Problem. Duncan Watts Columbia University The Small World Problem Duncan Watts Columbia University What is The Small World Problem? Often referred to as Six degrees of Separation Six degrees of separation between us and everyone else on this planet

More information

The Credibility of Digital Identity Information on the Social Web: A User Study

The Credibility of Digital Identity Information on the Social Web: A User Study The Credibility of Digital Identity Information on the Social Web: A User Study Matthew Rowe OAK Group Department of Computer Science University of Sheffield Regent Court, 211 Portobello Street S1 4DP

More information

Using Program Slicing to Identify Faults in Software:

Using Program Slicing to Identify Faults in Software: Using Program Slicing to Identify Faults in Software: Sue Black 1, Steve Counsell 2, Tracy Hall 3, Paul Wernick 3, 1 Centre for Systems and Software Engineering, London South Bank University, 103 Borough

More information

Population Dynamics: Predator/Prey Student Version

Population Dynamics: Predator/Prey Student Version Population Dynamics: Predator/Prey Student Version In this lab students will simulate the population dynamics in the lives of bunnies and wolves. They will discover how both predator and prey interact

More information

Social Events in a Time-Varying Mobile Phone Graph

Social Events in a Time-Varying Mobile Phone Graph Social Events in a Time-Varying Mobile Phone Graph Carlos Sarraute 1, Jorge Brea 1, Javier Burroni 1, Klaus Wehmuth 2, Artur Ziviani 2, and J.I. Alvarez-Hamelin 3 1 Grandata Labs, Argentina 2 LNCC, Brazil

More information

Small World Problem. Web Science (VU) ( ) Denis Helic. Mar 16, KTI, TU Graz. Denis Helic (KTI, TU Graz) Small-World Mar 16, / 50

Small World Problem. Web Science (VU) ( ) Denis Helic. Mar 16, KTI, TU Graz. Denis Helic (KTI, TU Graz) Small-World Mar 16, / 50 Small World Problem Web Science (VU) (707.000) Denis Helic KTI, TU Graz Mar 16, 2015 Denis Helic (KTI, TU Graz) Small-World Mar 16, 2015 1 / 50 Outline 1 Introduction 2 Small World Experiment 3 Small world

More information

Fractal expressionism

Fractal expressionism 1997 2009, Millennium Mathematics Project, University of Cambridge. Permission is granted to print and copy this page on paper for non commercial use. For other uses, including electronic redistribution,

More information

Reflections on the N + k Queens Problem

Reflections on the N + k Queens Problem Integre Technical Publishing Co., Inc. College Mathematics Journal 40:3 March 12, 2009 2:02 p.m. chatham.tex page 204 Reflections on the N + k Queens Problem R. Douglas Chatham R. Douglas Chatham (d.chatham@moreheadstate.edu)

More information

Two Modeling Cultures. Marco Janssen School of Sustainability Center for Behavior, Institutions and the Environment Arizona State University

Two Modeling Cultures. Marco Janssen School of Sustainability Center for Behavior, Institutions and the Environment Arizona State University Two Modeling Cultures Marco Janssen School of Sustainability Center for Behavior, Institutions and the Environment Arizona State University Outline Background Brief history of integrated global models

More information

Local and Low-Cost White Space Detection

Local and Low-Cost White Space Detection Local and Low-Cost White Space Detection Ahmed Saeed*, Khaled A. Harras, Ellen Zegura*, and Mostafa Ammar* *Georgia Institute of Technology Carnegie Mellon University Qatar White Space Definition A vacant

More information

Heads Up! A c t i v i t y 5. The Problem. Name Date

Heads Up! A c t i v i t y 5. The Problem. Name Date . Name Date A c t i v i t y 5 Heads Up! In this activity, you will study some important concepts in a branch of mathematics known as probability. You are using probability when you say things like: It

More information

Small World Problem. Web Science (VU) ( ) Denis Helic. Mar 16, KTI, TU Graz. Denis Helic (KTI, TU Graz) Small-World Mar 16, / 51

Small World Problem. Web Science (VU) ( ) Denis Helic. Mar 16, KTI, TU Graz. Denis Helic (KTI, TU Graz) Small-World Mar 16, / 51 Small World Problem Web Science (VU) (707.000) Denis Helic KTI, TU Graz Mar 16, 2015 Denis Helic (KTI, TU Graz) Small-World Mar 16, 2015 1 / 51 Outline 1 Introduction 2 Small World Experiment 3 Small world

More information

Laboratory 1: Uncertainty Analysis

Laboratory 1: Uncertainty Analysis University of Alabama Department of Physics and Astronomy PH101 / LeClair May 26, 2014 Laboratory 1: Uncertainty Analysis Hypothesis: A statistical analysis including both mean and standard deviation can

More information

Transportation and The Small World

Transportation and The Small World Aaron Valente Transportation and The Small World Networks are the fabric that holds the very system of our lives together. From the bus we took to school as a child to the subway system we take to the

More information

Pressure vs. decibel modulation in spectrotemporal representations: How nonlinear are auditory cortical stimuli?

Pressure vs. decibel modulation in spectrotemporal representations: How nonlinear are auditory cortical stimuli? Pressure vs. decibel modulation in spectrotemporal representations: How nonlinear are auditory cortical stimuli? 1 2 1 1 David Klein, Didier Depireux, Jonathan Simon, Shihab Shamma 1 Institute for Systems

More information

Simultaneous amplitude and frequency noise analysis in Chua s circuit

Simultaneous amplitude and frequency noise analysis in Chua s circuit Typeset using jjap.cls Simultaneous amplitude and frequency noise analysis in Chua s circuit J.-M. Friedt 1, D. Gillet 2, M. Planat 2 1 : IMEC, MCP/BIO, Kapeldreef 75, 3001 Leuven, Belgium

More information

UWB Small Scale Channel Modeling and System Performance

UWB Small Scale Channel Modeling and System Performance UWB Small Scale Channel Modeling and System Performance David R. McKinstry and R. Michael Buehrer Mobile and Portable Radio Research Group Virginia Tech Blacksburg, VA, USA {dmckinst, buehrer}@vt.edu Abstract

More information

Method to Improve Location Accuracy of the GLD360

Method to Improve Location Accuracy of the GLD360 Method to Improve Location Accuracy of the GLD360 Ryan Said Vaisala, Inc. Boulder Operations 194 South Taylor Avenue, Louisville, CO, USA ryan.said@vaisala.com Amitabh Nag Vaisala, Inc. Boulder Operations

More information

Evolving High-Dimensional, Adaptive Camera-Based Speed Sensors

Evolving High-Dimensional, Adaptive Camera-Based Speed Sensors In: M.H. Hamza (ed.), Proceedings of the 21st IASTED Conference on Applied Informatics, pp. 1278-128. Held February, 1-1, 2, Insbruck, Austria Evolving High-Dimensional, Adaptive Camera-Based Speed Sensors

More information

Chameleon Coins arxiv: v1 [math.ho] 23 Dec 2015

Chameleon Coins arxiv: v1 [math.ho] 23 Dec 2015 Chameleon Coins arxiv:1512.07338v1 [math.ho] 23 Dec 2015 Tanya Khovanova Konstantin Knop Oleg Polubasov December 24, 2015 Abstract We discuss coin-weighing problems with a new type of coin: a chameleon.

More information

Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels

Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels 734 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 4, APRIL 2001 Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels Oh-Soon Shin, Student

More information

The Co-existence between Physical Space and Cyberspace

The Co-existence between Physical Space and Cyberspace The Co-existence between Physical Space and Cyberspace A Case Study WAN Peng-Hui, LIU Yung-Tung, and LEE Yuan-Zone Graduate Institute of Architecture, National Chiao Tung University, Hsinchu, Taiwan http://www.arch.nctu.edu.tw,

More information

AI Approaches to Ultimate Tic-Tac-Toe

AI Approaches to Ultimate Tic-Tac-Toe AI Approaches to Ultimate Tic-Tac-Toe Eytan Lifshitz CS Department Hebrew University of Jerusalem, Israel David Tsurel CS Department Hebrew University of Jerusalem, Israel I. INTRODUCTION This report is

More information

The influence of the amount of inventors on patent quality

The influence of the amount of inventors on patent quality April 2017 The influence of the amount of inventors on patent quality Dierk-Oliver Kiehne Benjamin Krill Introduction When measuring patent quality, different indicators are taken into account. An indicator

More information

Romantic Partnerships and the Dispersion of Social Ties

Romantic Partnerships and the Dispersion of Social Ties Introduction Embeddedness and Evaluation Combining Features Romantic Partnerships and the of Social Ties Lars Backstrom Jon Kleinberg presented by Yehonatan Cohen 2014-11-12 Introduction Embeddedness and

More information

FACTORS AFFECTING DIMINISHING RETURNS FOR SEARCHING DEEPER 1

FACTORS AFFECTING DIMINISHING RETURNS FOR SEARCHING DEEPER 1 Factors Affecting Diminishing Returns for ing Deeper 75 FACTORS AFFECTING DIMINISHING RETURNS FOR SEARCHING DEEPER 1 Matej Guid 2 and Ivan Bratko 2 Ljubljana, Slovenia ABSTRACT The phenomenon of diminishing

More information

Comment: Social Network Theory (book published last year, Alan Dali, editor/sna in educational change) / Filipa has it

Comment: Social Network Theory (book published last year, Alan Dali, editor/sna in educational change) / Filipa has it SNA Workshop, Kassel, 25-29 June, 2012 DAY 1 15 th June, 2012 LITERATURE: SNA, Wasserman and Faust (1999) Bible of SNA, the math and formulas behind it - Duality of Groups (important paper, briger, 70s)

More information

Effect of Information Exchange in a Social Network on Investment: a study of Herd Effect in Group Parrondo Games

Effect of Information Exchange in a Social Network on Investment: a study of Herd Effect in Group Parrondo Games Effect of Information Exchange in a Social Network on Investment: a study of Herd Effect in Group Parrondo Games Ho Fai MA, Ka Wai CHEUNG, Ga Ching LUI, Degang Wu, Kwok Yip Szeto 1 Department of Phyiscs,

More information

Profound TNOWAVE. The Reliability of DLTWAVE

Profound TNOWAVE. The Reliability of DLTWAVE The Reliability of DLTWAVE Introduction Whenever Profound enters a new market with its products there are two questions that are invariably posed: what is Profound and more importantly how do you know

More information

DIGITALMEETSCULTURE.NET Interactive e-zine where digital technology and culture collide

DIGITALMEETSCULTURE.NET Interactive e-zine where digital technology and culture collide DIGITALMEETSCULTURE.NET Interactive e-zine where digital technology and culture collide 1 DIGITALMEETSCULTURE.NET Interactive e-zine where digital technology and culture collide Valentina Bachi, Manuele

More information

Hardcore Classification: Identifying Play Styles in Social Games using Network Analysis

Hardcore Classification: Identifying Play Styles in Social Games using Network Analysis Hardcore Classification: Identifying Play Styles in Social Games using Network Analysis Ben Kirman and Shaun Lawson September 2009 Abstract In the social network of a web-based online game, all players

More information

Chitika Insights The Value of Google Result Positioning

Chitika Insights The Value of Google Result Positioning Chitika Insights The Value of Google Result Positioning June 7, 2013 A publication of 1 Introduction Being the top Google result for a key word or phrase is often seen as a tremendous achievement for a

More information

Web 2.0 in social science research

Web 2.0 in social science research Web 2.0 in social science research A Case Study in Blog Analysis Helene Snee, Sociology, University of Manchester Overview Two projects: Student placement at the British Library May-August 2008: How are

More information

AI 101: An Opinionated Computer Scientist s View. Ed Felten

AI 101: An Opinionated Computer Scientist s View. Ed Felten AI 101: An Opinionated Computer Scientist s View Ed Felten Robert E. Kahn Professor of Computer Science and Public Affairs Director, Center for Information Technology Policy Princeton University A Brief

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Radar measured rain attenuation with proposed Z-R relationship at a tropical location Author(s) Yeo,

More information

6. FUNDAMENTALS OF CHANNEL CODER

6. FUNDAMENTALS OF CHANNEL CODER 82 6. FUNDAMENTALS OF CHANNEL CODER 6.1 INTRODUCTION The digital information can be transmitted over the channel using different signaling schemes. The type of the signal scheme chosen mainly depends on

More information

Revised zone method R-value calculation for precast concrete. sandwich panels containing metal wythe connectors. Byoung-Jun Lee and Stephen Pessiki

Revised zone method R-value calculation for precast concrete. sandwich panels containing metal wythe connectors. Byoung-Jun Lee and Stephen Pessiki Revised zone method R calculation for precast concrete sandwich panels containing metal wythe connectors Byoung-Jun Lee and Stephen Pessiki Editor s quick points n Metal wythe connectors are used in a

More information

German Tanks: Exploring Sampling Distributions Name

German Tanks: Exploring Sampling Distributions Name Open the TI-Nspire document German_Tanks:_Exploring_Sampling_Distributions.tns. Often real life challenges indicate the importance of what we study. The following activity is based on a genuine problem

More information

Tables and Figures. Germination rates were significantly higher after 24 h in running water than in controls (Fig. 4).

Tables and Figures. Germination rates were significantly higher after 24 h in running water than in controls (Fig. 4). Tables and Figures Text: contrary to what you may have heard, not all analyses or results warrant a Table or Figure. Some simple results are best stated in a single sentence, with data summarized parenthetically:

More information

A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS

A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS Evren Terzi, Hasan B. Celebi, and Huseyin Arslan Department of Electrical Engineering, University of South Florida

More information

MULTIPLEX Foundational Research on MULTIlevel complex networks and systems

MULTIPLEX Foundational Research on MULTIlevel complex networks and systems MULTIPLEX Foundational Research on MULTIlevel complex networks and systems Guido Caldarelli IMT Alti Studi Lucca node leaders Other (not all!) Colleagues The Science of Complex Systems is regarded as

More information

A Simple Guide To Practicing English With Native Speakers

A Simple Guide To Practicing English With Native Speakers 1 English Full:Time A Simple Guide To Practicing English With Native Speakers Dear subscriber, As you know, speaking English with native speakers is one of the best ways to improve your fluency. But, talking

More information

FIBER OPTICS. Prof. R.K. Shevgaonkar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture: 37

FIBER OPTICS. Prof. R.K. Shevgaonkar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture: 37 FIBER OPTICS Prof. R.K. Shevgaonkar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture: 37 Introduction to Raman Amplifiers Fiber Optics, Prof. R.K. Shevgaonkar, Dept.

More information

Research on the Impact of R&D Investment on Firm Performance in China's Internet of Things Industry

Research on the Impact of R&D Investment on Firm Performance in China's Internet of Things Industry Journal of Advanced Management Science Vol. 4, No. 2, March 2016 Research on the Impact of R&D Investment on Firm Performance in China's Internet of Things Industry Jian Xu and Zhenji Jin School of Economics

More information

STATION NUMBER: LAB SECTION: Filters. LAB 6: Filters ELECTRICAL ENGINEERING 43/100 INTRODUCTION TO MICROELECTRONIC CIRCUITS

STATION NUMBER: LAB SECTION: Filters. LAB 6: Filters ELECTRICAL ENGINEERING 43/100 INTRODUCTION TO MICROELECTRONIC CIRCUITS Lab 6: Filters YOUR EE43/100 NAME: Spring 2013 YOUR PARTNER S NAME: YOUR SID: YOUR PARTNER S SID: STATION NUMBER: LAB SECTION: Filters LAB 6: Filters Pre- Lab GSI Sign- Off: Pre- Lab: /40 Lab: /60 Total:

More information

How Many Imputations are Really Needed? Some Practical Clarifications of Multiple Imputation Theory

How Many Imputations are Really Needed? Some Practical Clarifications of Multiple Imputation Theory Prev Sci (2007) 8:206 213 DOI 10.1007/s11121-007-0070-9 How Many Imputations are Really Needed? Some Practical Clarifications of Multiple Imputation Theory John W. Graham & Allison E. Olchowski & Tamika

More information

WORLDWIDE PATENTING ACTIVITY

WORLDWIDE PATENTING ACTIVITY WORLDWIDE PATENTING ACTIVITY IP5 Statistics Report 2011 Patent activity is recognized throughout the world as a measure of innovation. This chapter examines worldwide patent activities in terms of patent

More information

Fast and efficient randomized flooding on lattice sensor networks

Fast and efficient randomized flooding on lattice sensor networks Fast and efficient randomized flooding on lattice sensor networks Ananth Kini, Vilas Veeraraghavan, Steven Weber Department of Electrical and Computer Engineering Drexel University November 19, 2004 presentation

More information

Journal of Unconventional Oil and Gas Resources

Journal of Unconventional Oil and Gas Resources Journal of Unconventional Oil and Gas Resources 15 (2016) 146 157 Contents lists available at ScienceDirect Journal of Unconventional Oil and Gas Resources journal homepage: www.elsevier.com/locate/juogr

More information

Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications

Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications Ravi D 1,Clint.V.jeffrey 2, Manikandan.M 3 and Mathan Prasad K 4 1 Assitant professor,computer Science And Engineering,Kathir

More information

Problem 1 (15 points: Graded by Shahin) Recall the network structure of our in-class trading experiment shown in Figure 1

Problem 1 (15 points: Graded by Shahin) Recall the network structure of our in-class trading experiment shown in Figure 1 Solutions for Homework 2 Networked Life, Fall 204 Prof Michael Kearns Due as hardcopy at the start of class, Tuesday December 9 Problem (5 points: Graded by Shahin) Recall the network structure of our

More information

UNIT 3: FIELD EFFECT TRANSISTORS

UNIT 3: FIELD EFFECT TRANSISTORS FIELD EFFECT TRANSISTOR: UNIT 3: FIELD EFFECT TRANSISTORS The field effect transistor is a semiconductor device, which depends for its operation on the control of current by an electric field. There are

More information

Running an HCI Experiment in Multiple Parallel Universes

Running an HCI Experiment in Multiple Parallel Universes Author manuscript, published in "ACM CHI Conference on Human Factors in Computing Systems (alt.chi) (2014)" Running an HCI Experiment in Multiple Parallel Universes Univ. Paris Sud, CNRS, Univ. Paris Sud,

More information

Chapter 4 MASK Encryption: Results with Image Analysis

Chapter 4 MASK Encryption: Results with Image Analysis 95 Chapter 4 MASK Encryption: Results with Image Analysis This chapter discusses the tests conducted and analysis made on MASK encryption, with gray scale and colour images. Statistical analysis including

More information

Class 1: Introduction

Class 1: Introduction Japanese Trading Systems Class 1 Class 1: Introduction In This Lesson: History of Japanese Trading Candlesticks meet Clouds Introduction to Cloud Charts How to Build a Cloud PAGE 1 The Rich History of

More information

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern

More information

Online identity: A (non)propositional account. Francisco Yus University of Alicante

Online identity: A (non)propositional account. Francisco Yus University of Alicante Online identity: A (non)propositional account Francisco Yus University of Alicante francisco.yus@ua.es Seville, May 2016 The aims of my paper today is (1) To review briefly the proposal of extension of

More information

Microsoft Excel: Data Analysis & Graphing. College of Engineering Engineering Education Innovation Center

Microsoft Excel: Data Analysis & Graphing. College of Engineering Engineering Education Innovation Center Microsoft Excel: Data Analysis & Graphing College of Engineering Engineering Education Innovation Center Objectives Use relative, absolute, and mixed cell referencing Identify the types of graphs and their

More information

On uniquely k-determined permutations

On uniquely k-determined permutations On uniquely k-determined permutations Sergey Avgustinovich and Sergey Kitaev 16th March 2007 Abstract Motivated by a new point of view to study occurrences of consecutive patterns in permutations, we introduce

More information

SAMPLE. This chapter deals with the construction and interpretation of box plots. At the end of this chapter you should be able to:

SAMPLE. This chapter deals with the construction and interpretation of box plots. At the end of this chapter you should be able to: find the upper and lower extremes, the median, and the upper and lower quartiles for sets of numerical data calculate the range and interquartile range compare the relative merits of range and interquartile

More information

Exploring the New Trends of Chinese Tourists in Switzerland

Exploring the New Trends of Chinese Tourists in Switzerland Exploring the New Trends of Chinese Tourists in Switzerland Zhan Liu, HES-SO Valais-Wallis Anne Le Calvé, HES-SO Valais-Wallis Nicole Glassey Balet, HES-SO Valais-Wallis Address of corresponding author:

More information

A Kinect-based 3D hand-gesture interface for 3D databases

A Kinect-based 3D hand-gesture interface for 3D databases A Kinect-based 3D hand-gesture interface for 3D databases Abstract. The use of natural interfaces improves significantly aspects related to human-computer interaction and consequently the productivity

More information

We encourage you to print this booklet for easy reading. Blogging for Beginners 1

We encourage you to print this booklet for easy reading. Blogging for Beginners 1 We have strived to be as accurate and complete as possible in this report. Due to the rapidly changing nature of the Internet the contents are not warranted to be accurate. While all attempts have been

More information

TxDOT Project : Evaluation of Pavement Rutting and Distress Measurements

TxDOT Project : Evaluation of Pavement Rutting and Distress Measurements 0-6663-P2 RECOMMENDATIONS FOR SELECTION OF AUTOMATED DISTRESS MEASURING EQUIPMENT Pedro Serigos Maria Burton Andre Smit Jorge Prozzi MooYeon Kim Mike Murphy TxDOT Project 0-6663: Evaluation of Pavement

More information

Networked Sociability and Individualism:

Networked Sociability and Individualism: Networked Sociability and Individualism: Technology for Personal and Professional Relationships Francesca Comunello Sapienza University of Rome, Italy Managing Director: Senior Editorial Director: Book

More information

Dota2 is a very popular video game currently.

Dota2 is a very popular video game currently. Dota2 Outcome Prediction Zhengyao Li 1, Dingyue Cui 2 and Chen Li 3 1 ID: A53210709, Email: zhl380@eng.ucsd.edu 2 ID: A53211051, Email: dicui@eng.ucsd.edu 3 ID: A53218665, Email: lic055@eng.ucsd.edu March

More information