Romantic Partnerships and the Dispersion of Social Ties

Size: px
Start display at page:

Download "Romantic Partnerships and the Dispersion of Social Ties"

Transcription

1 Introduction Embeddedness and Evaluation Combining Features Romantic Partnerships and the of Social Ties Lars Backstrom Jon Kleinberg presented by Yehonatan Cohen

2 Introduction Embeddedness and Evaluation Combining Features 1 Introduction Problem Statement Dataset 2 Embeddedness and Embeddedness 3 Evaluation Take 1 Take 2 Time and Space 4 Combining Features Machine Learning Performance Over Time

3 Introduction Embeddedness and Evaluation Combining Problem Features Statement Problem Statement Dataset Consider a social network user, a

4 Introduction Embeddedness and Evaluation Combining Problem Features Statement Problem Statement Dataset Consider a social network user, a, and its neighborhood...

5 Introduction Embeddedness and Evaluation Combining Problem Features Statement Problem Statement Dataset Consider a social network user, a, and its neighborhood... Also, let us assume that a is married. Can we identify his wife?

6 Introduction Embeddedness and Evaluation Combining Problem Features Statement Problem Statement Dataset Formally, our problem is defined as follows: Spouse Detection Let a an ego Facebook node and denote by G a its set of all friends and the links among them. Given a declared a relationship partner ( married, engaged or in a relationship ). Can we identify a s spouse?

7 Introduction Embeddedness and Evaluation Combining Problem Features Statement Motivation Dataset Such relationships detection is important for several reasons: Romantic relationships are singular type of social ties that play powerful roles in social processes over a person s whole life course. They also form an important aspect of the everyday practices and uses of social media. They are among the very strongest ties, but is has not been clear whether standard structural features are sufficient to characterize them.

8 Introduction Embeddedness and Evaluation Combining Problem Features Statement Facebook Semantcis Dataset Facebook is the most popular on-line social network.

9 Introduction Embeddedness and Evaluation Combining Problem Features Statement Facebook Semantcis Dataset Facebook is the most popular on-line social network. A user is represented by a node.

10 Introduction Embeddedness and Evaluation Combining Problem Features Statement Facebook Semantcis Dataset Facebook is the most popular on-line social network. A user is represented by a node. Facebook s friendship relation is undirected.

11 Introduction Embeddedness and Evaluation Combining Problem Features Statement Facebook Semantcis Dataset Facebook is the most popular on-line social network. A user is represented by a node. Facebook s friendship relation is undirected. An edge between two nodes represents a friendship between the corresponding users.

12 Introduction Embeddedness and Evaluation Combining Problem Features Statement Facebook Semantics Dataset

13 Introduction Embeddedness and Evaluation Combining Problem Features Statement Datasets Description Dataset Two datasets were used by the authors: The first consists of the network neighborhoods of approximately 1.3 million Facebook users. Users were selected uniformly at random from among: Users of age at least 20. Users with between 50 and 2000 friends. Users who list a spouse or relationship partner in their profile.

14 Introduction Embeddedness and Evaluation Combining Problem Features Statement Datasets Description Dataset The second is a sample of approximately 73,000 neighborhoods from the first dataset selected uniformly at random from among all neighborhoods with at most 25,000 links.

15 Introduction Embeddedness and Evaluation Combining Problem Features Statement Datasets Dimensions Dataset The datasets contains 379 million nodes. Overall there are 8.6 billion links. An average of 291 nodes and 6652 links per node s neighborhood.

16 Introduction Embeddedness and Evaluation Combining Problem Features Statement Dataset 1 Introduction Problem Statement Dataset 2 Embeddedness and Embeddedness 3 Evaluation Take 1 Take 2 Time and Space 4 Combining Features Machine Learning Performance Over Time

17 Introduction Embeddedness and Evaluation Combining Embeddedness Features Embeddedness Embeddedness Given an edge (u, v), its embeddedness is the number of mutual friends shared by its endpoints. Traditionally, embeddedness is associated with tie strength, and will be used as a baseline predictor.

18 Introduction Embeddedness and Evaluation Combining Embeddedness Features Embeddedness What is the embeddedness of (b, c)?

19 Introduction Embeddedness and Evaluation Combining Embeddedness Features Embeddedness What is the embeddedness of (b, c)?

20 Introduction Embeddedness and Evaluation Combining Embeddedness Features Embeddedness Can you determine the strongest tie in the network below?

21 Introduction Embeddedness and Evaluation Combining Embeddedness Features Embeddedness Can you determine the strongest tie in the network below?

22 Introduction Embeddedness and Evaluation Combining Embeddedness Features Many individuals have large clusters of friends corresponding to well-defined foci of interaction in their lives: Co-workers. People with whom they attended college. Family members. Etc. Since many people within these clusters know each other, the clusters contain links of very high embeddedness even though they do not necessarily correspond to particularly strong ties.

23 Introduction Embeddedness and Evaluation Combining Embeddedness Features In contrast, the links to a person s relationship partner may have lower embeddedness, but they will often involve mutual neighbors from several different foci, reflecting the fact that the social orbits of these friends are not bounded within any one focus.

24 Introduction Embeddedness and Evaluation Combining Embeddedness Features Consider the following example: A husband who knows several of his wife s co-workers, family members, and former classmates, even though these people belong to different foci and do not know each other.

25 Introduction Embeddedness and Evaluation Combining Embeddedness Features The mutual neighbors of a married couple are not well-connected to one another.

26 Introduction Embeddedness and Evaluation Combining Embeddedness Features We take the subgraph G u induced on u and all neighbors of u, and for a node v in G u we define C uv to be the set of common neighbors of u and v. Then disp(u, v) = Σ s,t Cuv d v (s, t)

27 Introduction Embeddedness and Evaluation Combining Embeddedness Features We take the subgraph G u induced on u and all neighbors of u, and for a node v in G u we define C uv to be the set of common neighbors of u and v. Then disp(u, v) = Σ s,t Cuv d v (s, t) d v is a distance function on the nodes of C uv.

28 Introduction Embeddedness and Evaluation Combining Embeddedness Features We take the subgraph G u induced on u and all neighbors of u, and for a node v in G u we define C uv to be the set of common neighbors of u and v. Then disp(u, v) = Σ s,t Cuv d v (s, t) d v is a distance function on the nodes of C uv. We do not consider the two-step paths through u and v themselves.

29 Introduction Embeddedness and Evaluation Combining Embeddedness Features The function d v need not be the standard graph-theoretic distance.

30 Introduction Embeddedness and Evaluation Combining Embeddedness Features The function d v need not be the standard graph-theoretic distance. A function equal to 1 when s and t are not directly linked and also have no common neighbors in G u other than u and v.

31 Introduction Embeddedness and Evaluation Combining Embeddedness Features The function d v need not be the standard graph-theoretic distance. A function equal to 1 when s and t are not directly linked and also have no common neighbors in G u other than u and v. A function equal to 1 when the distance between s and t is greater than a pre-defined threshold T.

32 Introduction Embeddedness and Evaluation Combining Embeddedness Features The function d v need not be the standard graph-theoretic distance. A function equal to 1 when s and t are not directly linked and also have no common neighbors in G u other than u and v. A function equal to 1 when the distance between s and t is greater than a pre-defined threshold T. A function equal to 1 when there are less than T disjoint paths between s and t.

33 Introduction Embeddedness and Evaluation Combining Embeddedness Features Let us practice dispersion under the assumption that d v (s, t) equal to 1 when s and t are not directly linked and also have no common neighbors in G u...

34 Introduction Embeddedness and Evaluation Combining Embeddedness Features disp(u, b) =?

35 Introduction Embeddedness and Evaluation Combining Embeddedness Features disp(u, b) =?

36 Introduction Embeddedness and Evaluation Combining Embeddedness Features disp(u, b) =?

37 Introduction Embeddedness and Evaluation Combining Embeddedness Features disp(u, h) =?

38 Introduction Embeddedness and Evaluation Combining Embeddedness Features disp(u, h) =?

39 Introduction Embeddedness and Evaluation Combining Embeddedness Features Strengthenings of We can detect a s romantic partner based of the two functions (dispersion and embeddedness). It has been empirically found that performance is highest for functions that are monotonically increasing in dispersion and monotonically decreasing in embeddedness. E.g. disp(u, v)/emb(u, v). Can you find the logic behind this finding?

40 Introduction Embeddedness and Evaluation Combining Embeddedness Features One can strengthen performance by applying the idea of dispersion recursively as follows: We initially define X v = 1 for all neighbors v of u, and then iteratively update each X v to be: Recursive X v = Xw 2 +2 d v (s,t)x sx t w Cuv s,t Cuv emb(u,v) The authors found that the highest performance is achieved when they rank nodes by the values of X v after the third iteration.

41 Introduction Embeddedness and Evaluation Combining Embeddedness Features 1 Introduction Problem Statement Dataset 2 Embeddedness and Embeddedness 3 Evaluation Take 1 Take 2 Time and Space 4 Combining Features Machine Learning Performance Over Time

42 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Take 1 Accuracy is defined as the fraction of instances on which the highest-ranked node under the examined measure is in fact the partner. Results can be compared to other standard measures: The number of photos in which u appear with v. The total number of times that u has viewed v s profile page in the previous 90 days.

43 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Take 1

44 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Take 1 When the user v who scores highest under one of these measures is not the partner of u, what role does v play among u s network neighbors?

45 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Take 1 When the user v who scores highest under one of these measures is not the partner of u, what role does v play among u s network neighbors? v is often a family member of u.

46 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Take 2 Let us consider dispersion measures based on other definitions of d v : d v (s, t) = 1 when s and t are at least r hops apart in G u \ {u, v}, and d v (s, t) = 0 otherwise.

47 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Take 2 Let us consider dispersion measures based on other definitions of d v : d v (s, t) = 1 when s and t are at least r hops apart in G u \ {u, v}, and d v (s, t) = 0 otherwise. d v (s, t) = 1 if s and t belong to different connected components of G u \ {u, v}, and d v (s, t) = 0 otherwise.

48 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Take 2 Let us consider dispersion measures based on other definitions of d v : d v (s, t) = 1 when s and t are at least r hops apart in G u \ {u, v}, and d v (s, t) = 0 otherwise. d v (s, t) = 1 if s and t belong to different connected components of G u \ {u, v}, and d v (s, t) = 0 otherwise. d v (s, t) = 1 if and only if s and t belong to different communities based on Louvain method.

49 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Take 2

50 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Time and Space An important source of variation among users is in the size of their network neighborhoods and the amount of time since they joined Facebook. Time effects: The neighborhood s complexity. The extent to which the network reflects the user s off-line relationships.

51 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Time and Space

52 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Time and Space Why the interaction features performance increases as a function of neighborhood size?

53 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space 1 Introduction Problem Statement Dataset 2 Embeddedness and Embeddedness 3 Evaluation Take 1 Take 2 Time and Space 4 Combining Features Machine Learning Performance Over Time

54 Introduction Embeddedness and Evaluation Combining Machine Features Learning Machine Learning Performance Over Time Why focus on one aspect of the user s neighborhood? Let s combine information! Structural features: Absolute and normalized dispersion based on six distinct distance functions. Recursive versions using iterations 2 through 7. Interaction features: Number of common photos. Number of profile views over the last 30, 60 and 90 days. Number of messages sent. Etc.

55 Introduction Embeddedness and Evaluation Combining Machine Features Learning Machine Learning Performance Over Time The combination of structural and interaction features improves the accuracy.

56 Introduction Embeddedness and Evaluation Combining Machine Features Learning Machine Learning Performance Over Time Recall our focus is on partner detection, given the user is in a romantic relation. Can we determine whether or not a user is single? Learn demographic features (age, gender and country). Include structural features. Train a classifier.

57 Introduction Embeddedness and Evaluation Combining Machine Features Learning Time Dependency Performance Over Time Notice the decrease of profile viewing...

58 Introduction Embeddedness and Evaluation Combining Machine Features Learning Time Dependency Performance Over Time Say a s romantic partner is b. Is the dispersion of their link correlated with their transition probability over a 60 day period?

59 Introduction Embeddedness and Evaluation Combining Machine Features Learning Time Dependency Performance Over Time Relationships on which recursive dispersion fails to correctly identify the partner are significantly more likely to transition to single status over a 60 day period.

60 Introduction Embeddedness and Evaluation Combining Machine Features Learning Conclusions Performance Over Time Understanding the structural roles of significant people in on-line social network neighborhoods is a broad question that requires a combination of different approaches.

61 Introduction Embeddedness and Evaluation Combining Machine Features Learning Conclusions Performance Over Time Understanding the structural roles of significant people in on-line social network neighborhoods is a broad question that requires a combination of different approaches. provides a powerful method for recognizing the structural positions occupied by romantic partners from network data alone.

62 Introduction Embeddedness and Evaluation Combining Machine Features Learning Conclusions Performance Over Time Understanding the structural roles of significant people in on-line social network neighborhoods is a broad question that requires a combination of different approaches. provides a powerful method for recognizing the structural positions occupied by romantic partners from network data alone. Romantic relations connect us to people who belong to multiple parts of our social neighborhood, producing a set of shared friends that is not simply large but also diverse.

63 Introduction Embeddedness and Evaluation Combining Machine Features Learning Performance Over Time

Social Network Analysis in HCI

Social Network Analysis in HCI Social Network Analysis in HCI Derek L. Hansen and Marc A. Smith Marigold Bays-Muchmore (baysmuc2) Hang Cui (hangcui2) Contents Introduction ---------------- What is Social Network Analysis? How does it

More information

Recommender Systems TIETS43 Collaborative Filtering

Recommender Systems TIETS43 Collaborative Filtering + Recommender Systems TIETS43 Collaborative Filtering Fall 2017 Kostas Stefanidis kostas.stefanidis@uta.fi https://coursepages.uta.fi/tiets43/ selection Amazon generates 35% of their sales through recommendations

More information

Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between Energy, Congestion and Delay

Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between Energy, Congestion and Delay Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between Energy, Congestion and Delay 5th Week 14.05.-18.05.2007 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Unit Disk Graphs

More information

Laboratory 1: Uncertainty Analysis

Laboratory 1: Uncertainty Analysis University of Alabama Department of Physics and Astronomy PH101 / LeClair May 26, 2014 Laboratory 1: Uncertainty Analysis Hypothesis: A statistical analysis including both mean and standard deviation can

More information

3D-Assisted Image Feature Synthesis for Novel Views of an Object

3D-Assisted Image Feature Synthesis for Novel Views of an Object 3D-Assisted Image Feature Synthesis for Novel Views of an Object Hao Su* Fan Wang* Li Yi Leonidas Guibas * Equal contribution View-agnostic Image Retrieval Retrieval using AlexNet features Query Cross-view

More information

Vesselin K. Vassilev South Bank University London Dominic Job Napier University Edinburgh Julian F. Miller The University of Birmingham Birmingham

Vesselin K. Vassilev South Bank University London Dominic Job Napier University Edinburgh Julian F. Miller The University of Birmingham Birmingham Towards the Automatic Design of More Efficient Digital Circuits Vesselin K. Vassilev South Bank University London Dominic Job Napier University Edinburgh Julian F. Miller The University of Birmingham Birmingham

More information

UNIVERSITY OF CAGLIARI

UNIVERSITY OF CAGLIARI UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Can the Wearable be Social? Michele Nitti michele.nitti@diee.unica.it At MCLab http://mclab.diee.unica.it/ 1 Outline How

More information

Connected Identifying Codes

Connected Identifying Codes Connected Identifying Codes Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email: {nfazl,staro,trachten}@bu.edu

More information

Topology Control. Chapter 3. Ad Hoc and Sensor Networks. Roger Wattenhofer 3/1

Topology Control. Chapter 3. Ad Hoc and Sensor Networks. Roger Wattenhofer 3/1 Topology Control Chapter 3 Ad Hoc and Sensor Networks Roger Wattenhofer 3/1 Inventory Tracking (Cargo Tracking) Current tracking systems require lineof-sight to satellite. Count and locate containers Search

More information

User Modeling on Demographic Attributes in Big Mobile Social Networks

User Modeling on Demographic Attributes in Big Mobile Social Networks User Modeling on Demographic Attributes in Big Mobile Social Networks YUXIAO DONG, University of Notre Dame NITESH V. CHAWLA, University of Notre Dame JIE TANG, Tsinghua University YANG YANG, Zhejiang

More information

Predicting when seam carved images become. unrecognizable. Sam Cunningham

Predicting when seam carved images become. unrecognizable. Sam Cunningham Predicting when seam carved images become unrecognizable Sam Cunningham April 29, 2008 Acknowledgements I would like to thank my advisors, Shriram Krishnamurthi and Michael Tarr for all of their help along

More information

CS534 Introduction to Computer Vision. Linear Filters. Ahmed Elgammal Dept. of Computer Science Rutgers University

CS534 Introduction to Computer Vision. Linear Filters. Ahmed Elgammal Dept. of Computer Science Rutgers University CS534 Introduction to Computer Vision Linear Filters Ahmed Elgammal Dept. of Computer Science Rutgers University Outlines What are Filters Linear Filters Convolution operation Properties of Linear Filters

More information

Diffusion of Networking Technologies

Diffusion of Networking Technologies Diffusion of Networking Technologies ISP Bellairs Workshop on Algorithmic Game Theory Barbados April 2012 Sharon Goldberg Boston University Princeton University Zhenming Liu Harvard University Diffusion

More information

TICRec: A Probabilistic Framework to Utilize Temporal Influence Correlations for Time-aware Location Recommendations

TICRec: A Probabilistic Framework to Utilize Temporal Influence Correlations for Time-aware Location Recommendations : A Probabilistic Framework to Utilize Temporal Influence Correlations for Time-aware Location Recommendations Jia-Dong Zhang, Chi-Yin Chow, Member, IEEE Abstract In location-based social networks (LBSNs),

More information

MATH 17, Winter 2017 COMPLEX NETWORKS. An Introduction to Mathematics Beyond Calculus. Nishant Malik Department of Mathematics Dartmouth College

MATH 17, Winter 2017 COMPLEX NETWORKS. An Introduction to Mathematics Beyond Calculus. Nishant Malik Department of Mathematics Dartmouth College MATH 17, Winter 2017 COMPLEX NETWORKS An Introduction to Mathematics Beyond Calculus Nishant Malik Department of Mathematics Dartmouth College February 15, 2017 Membership Closure LiveJournal Tracking

More information

Paper Presentation. Steve Jan. March 5, Virginia Tech. Steve Jan (Virginia Tech) Paper Presentation March 5, / 28

Paper Presentation. Steve Jan. March 5, Virginia Tech. Steve Jan (Virginia Tech) Paper Presentation March 5, / 28 Paper Presentation Steve Jan Virginia Tech March 5, 2015 Steve Jan (Virginia Tech) Paper Presentation March 5, 2015 1 / 28 2 paper to present Nonparametric Multi-group Membership Model for Dynamic Networks,

More information

AIMA 3.5. Smarter Search. David Cline

AIMA 3.5. Smarter Search. David Cline AIMA 3.5 Smarter Search David Cline Uninformed search Depth-first Depth-limited Iterative deepening Breadth-first Bidirectional search None of these searches take into account how close you are to the

More information

Foundations of Artificial Intelligence

Foundations of Artificial Intelligence Foundations of Artificial Intelligence 20. Combinatorial Optimization: Introduction and Hill-Climbing Malte Helmert Universität Basel April 8, 2016 Combinatorial Optimization Introduction previous chapters:

More information

Chapter 20. The Small-World Phenomenon Six Degrees of Separation

Chapter 20. The Small-World Phenomenon Six Degrees of Separation Chapter 20 The Small-World Phenomenon 20.1 Six Degrees of Separation In the previous chapter, we considered how social networks can serve as conduits by which ideas and innovations flow through groups

More information

Diffusion of Innovation Across a National Local Health Department Network: A Simulation Approach to Policy Development Using Agent- Based Modeling

Diffusion of Innovation Across a National Local Health Department Network: A Simulation Approach to Policy Development Using Agent- Based Modeling Frontiers in Public Health Services and Systems Research Volume 2 Number 5 Article 3 August 2013 Diffusion of Innovation Across a National Local Health Department Network: A Simulation Approach to Policy

More information

SOLITAIRE CLOBBER AS AN OPTIMIZATION PROBLEM ON WORDS

SOLITAIRE CLOBBER AS AN OPTIMIZATION PROBLEM ON WORDS INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 8 (2008), #G04 SOLITAIRE CLOBBER AS AN OPTIMIZATION PROBLEM ON WORDS Vincent D. Blondel Department of Mathematical Engineering, Université catholique

More information

Social network Analysis: small world phenomenon and decentralized search

Social network Analysis: small world phenomenon and decentralized search Social network Analysis: small world phenomenon and decentralized search Donglei Du Faculty of Business Administration, University of New Brunswick, NB Canada Fredericton E3B 9Y2 (ddu@unb.ca) Du (UNB)

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information

Distinguishing Photographs and Graphics on the World Wide Web

Distinguishing Photographs and Graphics on the World Wide Web Distinguishing Photographs and Graphics on the World Wide Web Vassilis Athitsos, Michael J. Swain and Charles Frankel Department of Computer Science The University of Chicago Chicago, Illinois 60637 vassilis,

More information

p-percent Coverage in Wireless Sensor Networks

p-percent Coverage in Wireless Sensor Networks p-percent Coverage in Wireless Sensor Networks Yiwei Wu, Chunyu Ai, Shan Gao and Yingshu Li Department of Computer Science Georgia State University October 28, 2008 1 Introduction 2 p-percent Coverage

More information

Comment: Social Network Theory (book published last year, Alan Dali, editor/sna in educational change) / Filipa has it

Comment: Social Network Theory (book published last year, Alan Dali, editor/sna in educational change) / Filipa has it SNA Workshop, Kassel, 25-29 June, 2012 DAY 1 15 th June, 2012 LITERATURE: SNA, Wasserman and Faust (1999) Bible of SNA, the math and formulas behind it - Duality of Groups (important paper, briger, 70s)

More information

Localization in Wireless Sensor Networks

Localization in Wireless Sensor Networks Localization in Wireless Sensor Networks Part 2: Localization techniques Department of Informatics University of Oslo Cyber Physical Systems, 11.10.2011 Localization problem in WSN In a localization problem

More information

A Machine Learning Based Approach for Predicting Undisclosed Attributes in Social Networks

A Machine Learning Based Approach for Predicting Undisclosed Attributes in Social Networks A Machine Learning Based Approach for Predicting Undisclosed Attributes in Social Networks Gergely Kótyuk Laboratory of Cryptography and Systems Security (CrySyS) Budapest University of Technology and

More information

Chapter 5 - Elementary Probability Theory

Chapter 5 - Elementary Probability Theory Chapter 5 - Elementary Probability Theory Historical Background Much of the early work in probability concerned games and gambling. One of the first to apply probability to matters other than gambling

More information

Social Events in a Time-Varying Mobile Phone Graph

Social Events in a Time-Varying Mobile Phone Graph Social Events in a Time-Varying Mobile Phone Graph Carlos Sarraute 1, Jorge Brea 1, Javier Burroni 1, Klaus Wehmuth 2, Artur Ziviani 2, and J.I. Alvarez-Hamelin 3 1 Grandata Labs, Argentina 2 LNCC, Brazil

More information

Selective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks. Andrea E.F. Clementi Angelo Monti Riccardo Silvestri

Selective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks. Andrea E.F. Clementi Angelo Monti Riccardo Silvestri Selective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks Andrea E.F. Clementi Angelo Monti Riccardo Silvestri Introduction A radio network is a set of radio stations that are able

More information

Association Rule Mining. Entscheidungsunterstützungssysteme SS 18

Association Rule Mining. Entscheidungsunterstützungssysteme SS 18 Association Rule Mining Entscheidungsunterstützungssysteme SS 18 Frequent Pattern Analysis Frequent pattern: a pattern (a set of items, subsequences, substructures, etc.) that occurs frequently in a data

More information

AUTOMATED MUSIC TRACK GENERATION

AUTOMATED MUSIC TRACK GENERATION AUTOMATED MUSIC TRACK GENERATION LOUIS EUGENE Stanford University leugene@stanford.edu GUILLAUME ROSTAING Stanford University rostaing@stanford.edu Abstract: This paper aims at presenting our method to

More information

Skip Lists S 3 S 2 S 1. 2/6/2016 7:04 AM Skip Lists 1

Skip Lists S 3 S 2 S 1. 2/6/2016 7:04 AM Skip Lists 1 Skip Lists S 3 15 15 23 10 15 23 36 2/6/2016 7:04 AM Skip Lists 1 Outline and Reading What is a skip list Operations Search Insertion Deletion Implementation Analysis Space usage Search and update times

More information

On Availability-Performability Trade-off in Wireless Mesh Networks

On Availability-Performability Trade-off in Wireless Mesh Networks 1 On Availability-Performability Trade-off in Wireless Mesh Networks Parth H. Pathak, Rudra Dutta, Prasant Mohapatra Computer Science Department, University of California, Davis, CA, USA Computer Science

More information

Genbby Technical Paper

Genbby Technical Paper Genbby Team January 24, 2018 Genbby Technical Paper Rating System and Matchmaking 1. Introduction The rating system estimates the level of players skills involved in the game. This allows the teams to

More information

Drum Transcription Based on Independent Subspace Analysis

Drum Transcription Based on Independent Subspace Analysis Report for EE 391 Special Studies and Reports for Electrical Engineering Drum Transcription Based on Independent Subspace Analysis Yinyi Guo Center for Computer Research in Music and Acoustics, Stanford,

More information

CSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25. Homework #1. ( Due: Oct 10 ) Figure 1: The laser game.

CSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25. Homework #1. ( Due: Oct 10 ) Figure 1: The laser game. CSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25 Homework #1 ( Due: Oct 10 ) Figure 1: The laser game. Task 1. [ 60 Points ] Laser Game Consider the following game played on an n n board,

More information

Yale University Department of Computer Science

Yale University Department of Computer Science LUX ETVERITAS Yale University Department of Computer Science Secret Bit Transmission Using a Random Deal of Cards Michael J. Fischer Michael S. Paterson Charles Rackoff YALEU/DCS/TR-792 May 1990 This work

More information

Asynchronous Best-Reply Dynamics

Asynchronous Best-Reply Dynamics Asynchronous Best-Reply Dynamics Noam Nisan 1, Michael Schapira 2, and Aviv Zohar 2 1 Google Tel-Aviv and The School of Computer Science and Engineering, The Hebrew University of Jerusalem, Israel. 2 The

More information

Dominant and Dominated Strategies

Dominant and Dominated Strategies Dominant and Dominated Strategies Carlos Hurtado Department of Economics University of Illinois at Urbana-Champaign hrtdmrt2@illinois.edu Junel 8th, 2016 C. Hurtado (UIUC - Economics) Game Theory On the

More information

Small World Problem. Web Science (VU) ( ) Denis Helic. Mar 16, KTI, TU Graz. Denis Helic (KTI, TU Graz) Small-World Mar 16, / 51

Small World Problem. Web Science (VU) ( ) Denis Helic. Mar 16, KTI, TU Graz. Denis Helic (KTI, TU Graz) Small-World Mar 16, / 51 Small World Problem Web Science (VU) (707.000) Denis Helic KTI, TU Graz Mar 16, 2015 Denis Helic (KTI, TU Graz) Small-World Mar 16, 2015 1 / 51 Outline 1 Introduction 2 Small World Experiment 3 Small world

More information

Couple Intake Interview

Couple Intake Interview Name: 1 1. What is the issue that led you to decide to come to therapy? 2. How long have you and your partner been together? In what form? (i.e., dating, living together, married, other) 3. What initially

More information

WIRELESS COMMUNICATION TECHNOLOGIES (16:332:546) LECTURE 5 SMALL SCALE FADING

WIRELESS COMMUNICATION TECHNOLOGIES (16:332:546) LECTURE 5 SMALL SCALE FADING WIRELESS COMMUNICATION TECHNOLOGIES (16:332:546) LECTURE 5 SMALL SCALE FADING Instructor: Dr. Narayan Mandayam Slides: SabarishVivek Sarathy A QUICK RECAP Why is there poor signal reception in urban clutters?

More information

Introduction to Coding Theory

Introduction to Coding Theory Coding Theory Massoud Malek Introduction to Coding Theory Introduction. Coding theory originated with the advent of computers. Early computers were huge mechanical monsters whose reliability was low compared

More information

Transportation and The Small World

Transportation and The Small World Aaron Valente Transportation and The Small World Networks are the fabric that holds the very system of our lives together. From the bus we took to school as a child to the subway system we take to the

More information

Data Storage Using a Non-integer Number of Bits per Cell

Data Storage Using a Non-integer Number of Bits per Cell Data Storage Using a Non-integer Number of Bits per Cell Naftali Sommer June 21st, 2017 The Conventional Scheme Information is stored in a memory cell by setting its threshold voltage 1 bit/cell - Many

More information

MAC Theory Chapter 7. Standby Energy [digitalstrom.org] Rating. Overview. No apps Mission critical

MAC Theory Chapter 7. Standby Energy [digitalstrom.org] Rating. Overview. No apps Mission critical Standby Energy [digitalstrom.org] MAC Theory Chapter 7 0 billion electrical devices in Europe 9.5 billion are not networked 6 billion euro per year energy lost Make electricity smart cheap networking (over

More information

MAC Theory. Chapter 7

MAC Theory. Chapter 7 MAC Theory Chapter 7 Ad Hoc and Sensor Networks Roger Wattenhofer 7/1 Standby Energy [digitalstrom.org] 10 billion electrical devices in Europe 9.5 billion are not networked 6 billion euro per year energy

More information

On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission

On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission Ravi Kishore Ashutosh Kumar Chiranjeevi Vanarasa Kannan Srinathan Abstract In a network of n nodes (modelled as a digraph),

More information

Wireless Network Coding with Local Network Views: Coded Layer Scheduling

Wireless Network Coding with Local Network Views: Coded Layer Scheduling Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the

More information

Predicting Win/Loss Records using Starcraft 2 Replay Data

Predicting Win/Loss Records using Starcraft 2 Replay Data Predicting Win/Loss Records using Starcraft 2 Replay Data Final Project, Team 31 Evan Cox Stanford University evancox@stanford.edu Snir Kodesh Stanford University snirk@stanford.edu Dan Preston Stanford

More information

A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model

A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model Abstract In wireless networks, mutual interference prevents wireless devices from correctly receiving packages from others

More information

SSB Debate: Model-based Inference vs. Machine Learning

SSB Debate: Model-based Inference vs. Machine Learning SSB Debate: Model-based nference vs. Machine Learning June 3, 2018 SSB 2018 June 3, 2018 1 / 20 Machine learning in the biological sciences SSB 2018 June 3, 2018 2 / 20 Machine learning in the biological

More information

Grundlagen der Rechnernetze. Introduction

Grundlagen der Rechnernetze. Introduction Grundlagen der Rechnernetze Introduction Overview Building blocks and terms Basics of communication Addressing Protocols and Layers Performance Historical development Grundlagen der Rechnernetze Introduction

More information

UMLEmb: UML for Embedded Systems. II. Modeling in SysML. Eurecom

UMLEmb: UML for Embedded Systems. II. Modeling in SysML. Eurecom UMLEmb: UML for Embedded Systems II. Modeling in SysML Ludovic Apvrille ludovic.apvrille@telecom-paristech.fr Eurecom, office 470 http://soc.eurecom.fr/umlemb/ @UMLEmb Eurecom Goals Learning objective

More information

Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks

Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks 1 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta, and Samir R. Das {anandps, hgupta, samir}@cs.sunysb.edu Stony Brook University,

More information

MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS. Justin Becker, Hao Chen UC Davis May 2009

MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS. Justin Becker, Hao Chen UC Davis May 2009 MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS Justin Becker, Hao Chen UC Davis May 2009 1 Motivating example College admission Kaplan surveyed 320 admissions offices in 2008 1 in 10 admissions officers

More information

Gateways Placement in Backbone Wireless Mesh Networks

Gateways Placement in Backbone Wireless Mesh Networks I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

The Pigeonhole Principle

The Pigeonhole Principle The Pigeonhole Principle Some Questions Does there have to be two trees on Earth with the same number of leaves? How large of a set of distinct integers between 1 and 200 is needed to assure that two numbers

More information

Foundations of Distributed Systems: Tree Algorithms

Foundations of Distributed Systems: Tree Algorithms Foundations of Distributed Systems: Tree Algorithms Stefan Schmid @ T-Labs, 2011 Broadcast Why trees? E.g., efficient broadcast, aggregation, routing,... Important trees? E.g., breadth-first trees, minimal

More information

Parallel Dynamic and Selective Community Detection in Massive Streaming Graphs

Parallel Dynamic and Selective Community Detection in Massive Streaming Graphs Parallel Dynamic and Selective Community Detection in Massive Streaming Graphs European Conference on Data Analysis 2013, Luxembourg July 11, 2013 Christian L. Staudt, Yassine Marrakchi, Aleksejs Sazonovs

More information

Constructing K-Connected M-Dominating Sets

Constructing K-Connected M-Dominating Sets Constructing K-Connected M-Dominating Sets in Wireless Sensor Networks Yiwei Wu, Feng Wang, My T. Thai and Yingshu Li Georgia State University Arizona State University University of Florida Outline Introduction

More information

Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels

Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels 734 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 4, APRIL 2001 Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels Oh-Soon Shin, Student

More information

Filling out a form quiz

Filling out a form quiz Level A 1. A form can be described as: A) a pre-set format B) a quiz C) a list 2. To delete means to: A) skip that question B) cross out C) circle the right answer 3. A census form collects information

More information

Using Program Slicing to Identify Faults in Software:

Using Program Slicing to Identify Faults in Software: Using Program Slicing to Identify Faults in Software: Sue Black 1, Steve Counsell 2, Tracy Hall 3, Paul Wernick 3, 1 Centre for Systems and Software Engineering, London South Bank University, 103 Borough

More information

OPINION FORMATION IN TIME-VARYING SOCIAL NETWORK: THE CASE OF NAMING GAME

OPINION FORMATION IN TIME-VARYING SOCIAL NETWORK: THE CASE OF NAMING GAME OPINION FORMATION IN TIME-VARYING SOCIAL NETWORK: THE CASE OF NAMING GAME ANIMESH MUKHERJEE DEPARTMENT OF COMPUTER SCIENCE & ENGG. INDIAN INSTITUTE OF TECHNOLOGY, KHARAGPUR Naming Game in complex networks

More information

QAT Sample Questions (SET 3)

QAT Sample Questions (SET 3) 1. Let f(x) = (x+2)(x+3) (x+1)(x+6). What is f (0)? A. 5/6 B. 4/3 C. 1 D. 1/3 E. 2/3 QAT Sample Questions (SET 3) 2. The following graph (solid lines only) shows level curves of which function? (A level

More information

A N E T W O R K A N A LY T I C A P P R O A C H F O R E X P L O R I N G T H E C O M P L E X I T Y O F RUSH HOUR

A N E T W O R K A N A LY T I C A P P R O A C H F O R E X P L O R I N G T H E C O M P L E X I T Y O F RUSH HOUR A N E T W O R K A N A LY T I C A P P R O A C H F O R E X P L O R I N G T H E C O M P L E X I T Y O F RUSH HOUR mareike bockholt 1 introduction It is well known that problem solving capabilities of humans

More information

Automated Analysis and Synthesis of Block-Cipher Modes of Operation

Automated Analysis and Synthesis of Block-Cipher Modes of Operation Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff 1 Jonathan Katz 1 Matthew D. Green 2 1 University of Maryland 2 Johns Hopkins University Presented at the Fall Protocol

More information

Topology Control with Better Radio Models: Implications for Energy and Multi-Hop Interference

Topology Control with Better Radio Models: Implications for Energy and Multi-Hop Interference Topology Control with Better Radio Models: Implications for Energy and Multi-Hop Interference Douglas M. Blough Mauro Leoncini Giovanni Resta Paolo Santi June 1, 2006 Abstract Topology Control (TC) is

More information

Using Artificial intelligent to solve the game of 2048

Using Artificial intelligent to solve the game of 2048 Using Artificial intelligent to solve the game of 2048 Ho Shing Hin (20343288) WONG, Ngo Yin (20355097) Lam Ka Wing (20280151) Abstract The report presents the solver of the game 2048 base on artificial

More information

Heuristics & Pattern Databases for Search Dan Weld

Heuristics & Pattern Databases for Search Dan Weld 10//01 CSE 57: Artificial Intelligence Autumn01 Heuristics & Pattern Databases for Search Dan Weld Recap: Search Problem States configurations of the world Successor function: function from states to lists

More information

On the GNSS integer ambiguity success rate

On the GNSS integer ambiguity success rate On the GNSS integer ambiguity success rate P.J.G. Teunissen Mathematical Geodesy and Positioning Faculty of Civil Engineering and Geosciences Introduction Global Navigation Satellite System (GNSS) ambiguity

More information

Hybrid Halftoning A Novel Algorithm for Using Multiple Halftoning Techniques

Hybrid Halftoning A Novel Algorithm for Using Multiple Halftoning Techniques Hybrid Halftoning A ovel Algorithm for Using Multiple Halftoning Techniques Sasan Gooran, Mats Österberg and Björn Kruse Department of Electrical Engineering, Linköping University, Linköping, Sweden Abstract

More information

Low-Latency Multi-Source Broadcast in Radio Networks

Low-Latency Multi-Source Broadcast in Radio Networks Low-Latency Multi-Source Broadcast in Radio Networks Scott C.-H. Huang City University of Hong Kong Hsiao-Chun Wu Louisiana State University and S. S. Iyengar Louisiana State University In recent years

More information

arxiv: v2 [cs.cc] 18 Mar 2013

arxiv: v2 [cs.cc] 18 Mar 2013 Deciding the Winner of an Arbitrary Finite Poset Game is PSPACE-Complete Daniel Grier arxiv:1209.1750v2 [cs.cc] 18 Mar 2013 University of South Carolina grierd@email.sc.edu Abstract. A poset game is a

More information

Game Theory. Share information. Evaluate information (obtained from friends, acquaintances and coworkers) Develop trust. Accept or reject friendship

Game Theory. Share information. Evaluate information (obtained from friends, acquaintances and coworkers) Develop trust. Accept or reject friendship Æ ÇÌ Ë º ÅÁËÀÊ ÈÊÁÄ ¾ ¾¼½¾ Game Theory A social network is not a static structure the individuals in a social network must constantly interact in order to create social capital that reflects how a group

More information

Finite games: finite number of players, finite number of possible actions, finite number of moves. Canusegametreetodepicttheextensiveform.

Finite games: finite number of players, finite number of possible actions, finite number of moves. Canusegametreetodepicttheextensiveform. A game is a formal representation of a situation in which individuals interact in a setting of strategic interdependence. Strategic interdependence each individual s utility depends not only on his own

More information

Clustering of traffic accidents with the use of the KDE+ method

Clustering of traffic accidents with the use of the KDE+ method Richard Andrášik*, Michal Bíl Transport Research Centre, Líšeňská 33a, 636 00 Brno, Czech Republic *e-mail: andrasik.richard@gmail.com Clustering of traffic accidents with the use of the KDE+ method TABLE

More information

The Job Interview: Here are some popular questions asked in job interviews:

The Job Interview: Here are some popular questions asked in job interviews: The Job Interview: Helpful Hints to Prepare for your interview: In preparing for a job interview, learn a little about your potential employer. You can do this by calling the business and asking, or research

More information

Statistical Analysis of Nuel Tournaments Department of Statistics University of California, Berkeley

Statistical Analysis of Nuel Tournaments Department of Statistics University of California, Berkeley Statistical Analysis of Nuel Tournaments Department of Statistics University of California, Berkeley MoonSoo Choi Department of Industrial Engineering & Operations Research Under Guidance of Professor.

More information

Move a Little Closer? Information Sharing and the Spatial Clustering of Bank Branches

Move a Little Closer? Information Sharing and the Spatial Clustering of Bank Branches Move a Little Closer? Information Sharing and the Spatial Clustering of Bank Branches Shusen Qi (Xiamen University) Ralph De Haas (EBRD; Tilburg University) Steven Ongena (University of Zurich; SFI; KU

More information

NETW 701: Wireless Communications. Lecture 5. Small Scale Fading

NETW 701: Wireless Communications. Lecture 5. Small Scale Fading NETW 701: Wireless Communications Lecture 5 Small Scale Fading Small Scale Fading Most mobile communication systems are used in and around center of population. The transmitting antenna or Base Station

More information

Hardcore Classification: Identifying Play Styles in Social Games using Network Analysis

Hardcore Classification: Identifying Play Styles in Social Games using Network Analysis Hardcore Classification: Identifying Play Styles in Social Games using Network Analysis Ben Kirman and Shaun Lawson September 2009 Abstract In the social network of a web-based online game, all players

More information

Chapter 10. User Cooperative Communications

Chapter 10. User Cooperative Communications Chapter 10 User Cooperative Communications 1 Outline Introduction Relay Channels User-Cooperation in Wireless Networks Multi-Hop Relay Channel Summary 2 Introduction User cooperative communication is a

More information

HETEROGENEOUS LINK ASYMMETRY IN TDD MODE CELLULAR SYSTEMS

HETEROGENEOUS LINK ASYMMETRY IN TDD MODE CELLULAR SYSTEMS HETEROGENEOUS LINK ASYMMETRY IN TDD MODE CELLULAR SYSTEMS Magnus Lindström Radio Communication Systems Department of Signals, Sensors and Systems Royal Institute of Technology (KTH) SE- 44, STOCKHOLM,

More information

Dynamic Programming. Objective

Dynamic Programming. Objective Dynamic Programming Richard de Neufville Professor of Engineering Systems and of Civil and Environmental Engineering MIT Massachusetts Institute of Technology Dynamic Programming Slide 1 of 43 Objective

More information

Acknowledged Broadcasting and Gossiping in ad hoc radio networks

Acknowledged Broadcasting and Gossiping in ad hoc radio networks Acknowledged Broadcasting and Gossiping in ad hoc radio networks Jiro Uchida 1, Wei Chen 2, and Koichi Wada 3 1,3 Nagoya Institute of Technology Gokiso-cho, Syowa-ku, Nagoya, 466-8555, Japan, 1 jiro@phaser.elcom.nitech.ac.jp,

More information

Game Mechanics Minesweeper is a game in which the player must correctly deduce the positions of

Game Mechanics Minesweeper is a game in which the player must correctly deduce the positions of Table of Contents Game Mechanics...2 Game Play...3 Game Strategy...4 Truth...4 Contrapositive... 5 Exhaustion...6 Burnout...8 Game Difficulty... 10 Experiment One... 12 Experiment Two...14 Experiment Three...16

More information

5.4 Imperfect, Real-Time Decisions

5.4 Imperfect, Real-Time Decisions 116 5.4 Imperfect, Real-Time Decisions Searching through the whole (pruned) game tree is too inefficient for any realistic game Moves must be made in a reasonable amount of time One has to cut off the

More information

Convergence in competitive games

Convergence in competitive games Convergence in competitive games Vahab S. Mirrokni Computer Science and AI Lab. (CSAIL) and Math. Dept., MIT. This talk is based on joint works with A. Vetta and with A. Sidiropoulos, A. Vetta DIMACS Bounded

More information

INNOVATION NETWORKS IN THE GERMAN LASER INDUSTRY

INNOVATION NETWORKS IN THE GERMAN LASER INDUSTRY INNOVATION NETWORKS IN THE GERMAN LASER INDUSTRY EVOLUTIONARY CHANGE, STRATEGIC POSITIONING AND FIRM INNOVATIVENESS Dissertation Submitted in fulfillment of the requirements for the degree "Doktor der

More information

Spectrum Collaboration Challenge (SC2)

Spectrum Collaboration Challenge (SC2) Spectrum Collaboration Challenge (SC2) www.spectrumcollaborationchallenge.com Phase 1 Entrance Hurdles Revision 1 9/1/2016 Defense Advanced Research Projects Agency Microsystems Technology Office 675 North

More information

Broadcast in Radio Networks in the presence of Byzantine Adversaries

Broadcast in Radio Networks in the presence of Byzantine Adversaries Broadcast in Radio Networks in the presence of Byzantine Adversaries Vinod Vaikuntanathan Abstract In PODC 0, Koo [] presented a protocol that achieves broadcast in a radio network tolerating (roughly)

More information

Online Call Control in Cellular Networks Revisited

Online Call Control in Cellular Networks Revisited Online Call Control in Cellular Networks Revisited Yong Zhang Francis Y.L. Chin Hing-Fung Ting Joseph Wun-Tat Chan Xin Han Ka-Cheong Lam Abstract Wireless Communication Networks based on Frequency Division

More information

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Nithin Sugavanam, C. Emre Koksal, Atilla Eryilmaz Department of Electrical and Computer Engineering The Ohio State

More information

A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS

A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS C. COMMANDER, C.A.S. OLIVEIRA, P.M. PARDALOS, AND M.G.C. RESENDE ABSTRACT. Ad hoc networks are composed of a set of wireless

More information

Small World Problem. Web Science (VU) ( ) Denis Helic. Mar 16, KTI, TU Graz. Denis Helic (KTI, TU Graz) Small-World Mar 16, / 50

Small World Problem. Web Science (VU) ( ) Denis Helic. Mar 16, KTI, TU Graz. Denis Helic (KTI, TU Graz) Small-World Mar 16, / 50 Small World Problem Web Science (VU) (707.000) Denis Helic KTI, TU Graz Mar 16, 2015 Denis Helic (KTI, TU Graz) Small-World Mar 16, 2015 1 / 50 Outline 1 Introduction 2 Small World Experiment 3 Small world

More information