Romantic Partnerships and the Dispersion of Social Ties
|
|
- Clinton Charles
- 6 years ago
- Views:
Transcription
1 Introduction Embeddedness and Evaluation Combining Features Romantic Partnerships and the of Social Ties Lars Backstrom Jon Kleinberg presented by Yehonatan Cohen
2 Introduction Embeddedness and Evaluation Combining Features 1 Introduction Problem Statement Dataset 2 Embeddedness and Embeddedness 3 Evaluation Take 1 Take 2 Time and Space 4 Combining Features Machine Learning Performance Over Time
3 Introduction Embeddedness and Evaluation Combining Problem Features Statement Problem Statement Dataset Consider a social network user, a
4 Introduction Embeddedness and Evaluation Combining Problem Features Statement Problem Statement Dataset Consider a social network user, a, and its neighborhood...
5 Introduction Embeddedness and Evaluation Combining Problem Features Statement Problem Statement Dataset Consider a social network user, a, and its neighborhood... Also, let us assume that a is married. Can we identify his wife?
6 Introduction Embeddedness and Evaluation Combining Problem Features Statement Problem Statement Dataset Formally, our problem is defined as follows: Spouse Detection Let a an ego Facebook node and denote by G a its set of all friends and the links among them. Given a declared a relationship partner ( married, engaged or in a relationship ). Can we identify a s spouse?
7 Introduction Embeddedness and Evaluation Combining Problem Features Statement Motivation Dataset Such relationships detection is important for several reasons: Romantic relationships are singular type of social ties that play powerful roles in social processes over a person s whole life course. They also form an important aspect of the everyday practices and uses of social media. They are among the very strongest ties, but is has not been clear whether standard structural features are sufficient to characterize them.
8 Introduction Embeddedness and Evaluation Combining Problem Features Statement Facebook Semantcis Dataset Facebook is the most popular on-line social network.
9 Introduction Embeddedness and Evaluation Combining Problem Features Statement Facebook Semantcis Dataset Facebook is the most popular on-line social network. A user is represented by a node.
10 Introduction Embeddedness and Evaluation Combining Problem Features Statement Facebook Semantcis Dataset Facebook is the most popular on-line social network. A user is represented by a node. Facebook s friendship relation is undirected.
11 Introduction Embeddedness and Evaluation Combining Problem Features Statement Facebook Semantcis Dataset Facebook is the most popular on-line social network. A user is represented by a node. Facebook s friendship relation is undirected. An edge between two nodes represents a friendship between the corresponding users.
12 Introduction Embeddedness and Evaluation Combining Problem Features Statement Facebook Semantics Dataset
13 Introduction Embeddedness and Evaluation Combining Problem Features Statement Datasets Description Dataset Two datasets were used by the authors: The first consists of the network neighborhoods of approximately 1.3 million Facebook users. Users were selected uniformly at random from among: Users of age at least 20. Users with between 50 and 2000 friends. Users who list a spouse or relationship partner in their profile.
14 Introduction Embeddedness and Evaluation Combining Problem Features Statement Datasets Description Dataset The second is a sample of approximately 73,000 neighborhoods from the first dataset selected uniformly at random from among all neighborhoods with at most 25,000 links.
15 Introduction Embeddedness and Evaluation Combining Problem Features Statement Datasets Dimensions Dataset The datasets contains 379 million nodes. Overall there are 8.6 billion links. An average of 291 nodes and 6652 links per node s neighborhood.
16 Introduction Embeddedness and Evaluation Combining Problem Features Statement Dataset 1 Introduction Problem Statement Dataset 2 Embeddedness and Embeddedness 3 Evaluation Take 1 Take 2 Time and Space 4 Combining Features Machine Learning Performance Over Time
17 Introduction Embeddedness and Evaluation Combining Embeddedness Features Embeddedness Embeddedness Given an edge (u, v), its embeddedness is the number of mutual friends shared by its endpoints. Traditionally, embeddedness is associated with tie strength, and will be used as a baseline predictor.
18 Introduction Embeddedness and Evaluation Combining Embeddedness Features Embeddedness What is the embeddedness of (b, c)?
19 Introduction Embeddedness and Evaluation Combining Embeddedness Features Embeddedness What is the embeddedness of (b, c)?
20 Introduction Embeddedness and Evaluation Combining Embeddedness Features Embeddedness Can you determine the strongest tie in the network below?
21 Introduction Embeddedness and Evaluation Combining Embeddedness Features Embeddedness Can you determine the strongest tie in the network below?
22 Introduction Embeddedness and Evaluation Combining Embeddedness Features Many individuals have large clusters of friends corresponding to well-defined foci of interaction in their lives: Co-workers. People with whom they attended college. Family members. Etc. Since many people within these clusters know each other, the clusters contain links of very high embeddedness even though they do not necessarily correspond to particularly strong ties.
23 Introduction Embeddedness and Evaluation Combining Embeddedness Features In contrast, the links to a person s relationship partner may have lower embeddedness, but they will often involve mutual neighbors from several different foci, reflecting the fact that the social orbits of these friends are not bounded within any one focus.
24 Introduction Embeddedness and Evaluation Combining Embeddedness Features Consider the following example: A husband who knows several of his wife s co-workers, family members, and former classmates, even though these people belong to different foci and do not know each other.
25 Introduction Embeddedness and Evaluation Combining Embeddedness Features The mutual neighbors of a married couple are not well-connected to one another.
26 Introduction Embeddedness and Evaluation Combining Embeddedness Features We take the subgraph G u induced on u and all neighbors of u, and for a node v in G u we define C uv to be the set of common neighbors of u and v. Then disp(u, v) = Σ s,t Cuv d v (s, t)
27 Introduction Embeddedness and Evaluation Combining Embeddedness Features We take the subgraph G u induced on u and all neighbors of u, and for a node v in G u we define C uv to be the set of common neighbors of u and v. Then disp(u, v) = Σ s,t Cuv d v (s, t) d v is a distance function on the nodes of C uv.
28 Introduction Embeddedness and Evaluation Combining Embeddedness Features We take the subgraph G u induced on u and all neighbors of u, and for a node v in G u we define C uv to be the set of common neighbors of u and v. Then disp(u, v) = Σ s,t Cuv d v (s, t) d v is a distance function on the nodes of C uv. We do not consider the two-step paths through u and v themselves.
29 Introduction Embeddedness and Evaluation Combining Embeddedness Features The function d v need not be the standard graph-theoretic distance.
30 Introduction Embeddedness and Evaluation Combining Embeddedness Features The function d v need not be the standard graph-theoretic distance. A function equal to 1 when s and t are not directly linked and also have no common neighbors in G u other than u and v.
31 Introduction Embeddedness and Evaluation Combining Embeddedness Features The function d v need not be the standard graph-theoretic distance. A function equal to 1 when s and t are not directly linked and also have no common neighbors in G u other than u and v. A function equal to 1 when the distance between s and t is greater than a pre-defined threshold T.
32 Introduction Embeddedness and Evaluation Combining Embeddedness Features The function d v need not be the standard graph-theoretic distance. A function equal to 1 when s and t are not directly linked and also have no common neighbors in G u other than u and v. A function equal to 1 when the distance between s and t is greater than a pre-defined threshold T. A function equal to 1 when there are less than T disjoint paths between s and t.
33 Introduction Embeddedness and Evaluation Combining Embeddedness Features Let us practice dispersion under the assumption that d v (s, t) equal to 1 when s and t are not directly linked and also have no common neighbors in G u...
34 Introduction Embeddedness and Evaluation Combining Embeddedness Features disp(u, b) =?
35 Introduction Embeddedness and Evaluation Combining Embeddedness Features disp(u, b) =?
36 Introduction Embeddedness and Evaluation Combining Embeddedness Features disp(u, b) =?
37 Introduction Embeddedness and Evaluation Combining Embeddedness Features disp(u, h) =?
38 Introduction Embeddedness and Evaluation Combining Embeddedness Features disp(u, h) =?
39 Introduction Embeddedness and Evaluation Combining Embeddedness Features Strengthenings of We can detect a s romantic partner based of the two functions (dispersion and embeddedness). It has been empirically found that performance is highest for functions that are monotonically increasing in dispersion and monotonically decreasing in embeddedness. E.g. disp(u, v)/emb(u, v). Can you find the logic behind this finding?
40 Introduction Embeddedness and Evaluation Combining Embeddedness Features One can strengthen performance by applying the idea of dispersion recursively as follows: We initially define X v = 1 for all neighbors v of u, and then iteratively update each X v to be: Recursive X v = Xw 2 +2 d v (s,t)x sx t w Cuv s,t Cuv emb(u,v) The authors found that the highest performance is achieved when they rank nodes by the values of X v after the third iteration.
41 Introduction Embeddedness and Evaluation Combining Embeddedness Features 1 Introduction Problem Statement Dataset 2 Embeddedness and Embeddedness 3 Evaluation Take 1 Take 2 Time and Space 4 Combining Features Machine Learning Performance Over Time
42 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Take 1 Accuracy is defined as the fraction of instances on which the highest-ranked node under the examined measure is in fact the partner. Results can be compared to other standard measures: The number of photos in which u appear with v. The total number of times that u has viewed v s profile page in the previous 90 days.
43 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Take 1
44 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Take 1 When the user v who scores highest under one of these measures is not the partner of u, what role does v play among u s network neighbors?
45 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Take 1 When the user v who scores highest under one of these measures is not the partner of u, what role does v play among u s network neighbors? v is often a family member of u.
46 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Take 2 Let us consider dispersion measures based on other definitions of d v : d v (s, t) = 1 when s and t are at least r hops apart in G u \ {u, v}, and d v (s, t) = 0 otherwise.
47 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Take 2 Let us consider dispersion measures based on other definitions of d v : d v (s, t) = 1 when s and t are at least r hops apart in G u \ {u, v}, and d v (s, t) = 0 otherwise. d v (s, t) = 1 if s and t belong to different connected components of G u \ {u, v}, and d v (s, t) = 0 otherwise.
48 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Take 2 Let us consider dispersion measures based on other definitions of d v : d v (s, t) = 1 when s and t are at least r hops apart in G u \ {u, v}, and d v (s, t) = 0 otherwise. d v (s, t) = 1 if s and t belong to different connected components of G u \ {u, v}, and d v (s, t) = 0 otherwise. d v (s, t) = 1 if and only if s and t belong to different communities based on Louvain method.
49 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Take 2
50 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Time and Space An important source of variation among users is in the size of their network neighborhoods and the amount of time since they joined Facebook. Time effects: The neighborhood s complexity. The extent to which the network reflects the user s off-line relationships.
51 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Time and Space
52 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space Evaluation - Time and Space Why the interaction features performance increases as a function of neighborhood size?
53 Introduction Embeddedness and Evaluation Combining TakeFeatures 1 2 Time and Space 1 Introduction Problem Statement Dataset 2 Embeddedness and Embeddedness 3 Evaluation Take 1 Take 2 Time and Space 4 Combining Features Machine Learning Performance Over Time
54 Introduction Embeddedness and Evaluation Combining Machine Features Learning Machine Learning Performance Over Time Why focus on one aspect of the user s neighborhood? Let s combine information! Structural features: Absolute and normalized dispersion based on six distinct distance functions. Recursive versions using iterations 2 through 7. Interaction features: Number of common photos. Number of profile views over the last 30, 60 and 90 days. Number of messages sent. Etc.
55 Introduction Embeddedness and Evaluation Combining Machine Features Learning Machine Learning Performance Over Time The combination of structural and interaction features improves the accuracy.
56 Introduction Embeddedness and Evaluation Combining Machine Features Learning Machine Learning Performance Over Time Recall our focus is on partner detection, given the user is in a romantic relation. Can we determine whether or not a user is single? Learn demographic features (age, gender and country). Include structural features. Train a classifier.
57 Introduction Embeddedness and Evaluation Combining Machine Features Learning Time Dependency Performance Over Time Notice the decrease of profile viewing...
58 Introduction Embeddedness and Evaluation Combining Machine Features Learning Time Dependency Performance Over Time Say a s romantic partner is b. Is the dispersion of their link correlated with their transition probability over a 60 day period?
59 Introduction Embeddedness and Evaluation Combining Machine Features Learning Time Dependency Performance Over Time Relationships on which recursive dispersion fails to correctly identify the partner are significantly more likely to transition to single status over a 60 day period.
60 Introduction Embeddedness and Evaluation Combining Machine Features Learning Conclusions Performance Over Time Understanding the structural roles of significant people in on-line social network neighborhoods is a broad question that requires a combination of different approaches.
61 Introduction Embeddedness and Evaluation Combining Machine Features Learning Conclusions Performance Over Time Understanding the structural roles of significant people in on-line social network neighborhoods is a broad question that requires a combination of different approaches. provides a powerful method for recognizing the structural positions occupied by romantic partners from network data alone.
62 Introduction Embeddedness and Evaluation Combining Machine Features Learning Conclusions Performance Over Time Understanding the structural roles of significant people in on-line social network neighborhoods is a broad question that requires a combination of different approaches. provides a powerful method for recognizing the structural positions occupied by romantic partners from network data alone. Romantic relations connect us to people who belong to multiple parts of our social neighborhood, producing a set of shared friends that is not simply large but also diverse.
63 Introduction Embeddedness and Evaluation Combining Machine Features Learning Performance Over Time
Social Network Analysis in HCI
Social Network Analysis in HCI Derek L. Hansen and Marc A. Smith Marigold Bays-Muchmore (baysmuc2) Hang Cui (hangcui2) Contents Introduction ---------------- What is Social Network Analysis? How does it
More informationRecommender Systems TIETS43 Collaborative Filtering
+ Recommender Systems TIETS43 Collaborative Filtering Fall 2017 Kostas Stefanidis kostas.stefanidis@uta.fi https://coursepages.uta.fi/tiets43/ selection Amazon generates 35% of their sales through recommendations
More informationMobile Ad Hoc Networks Theory of Interferences, Trade-Offs between Energy, Congestion and Delay
Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between Energy, Congestion and Delay 5th Week 14.05.-18.05.2007 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Unit Disk Graphs
More informationLaboratory 1: Uncertainty Analysis
University of Alabama Department of Physics and Astronomy PH101 / LeClair May 26, 2014 Laboratory 1: Uncertainty Analysis Hypothesis: A statistical analysis including both mean and standard deviation can
More information3D-Assisted Image Feature Synthesis for Novel Views of an Object
3D-Assisted Image Feature Synthesis for Novel Views of an Object Hao Su* Fan Wang* Li Yi Leonidas Guibas * Equal contribution View-agnostic Image Retrieval Retrieval using AlexNet features Query Cross-view
More informationVesselin K. Vassilev South Bank University London Dominic Job Napier University Edinburgh Julian F. Miller The University of Birmingham Birmingham
Towards the Automatic Design of More Efficient Digital Circuits Vesselin K. Vassilev South Bank University London Dominic Job Napier University Edinburgh Julian F. Miller The University of Birmingham Birmingham
More informationUNIVERSITY OF CAGLIARI
UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Can the Wearable be Social? Michele Nitti michele.nitti@diee.unica.it At MCLab http://mclab.diee.unica.it/ 1 Outline How
More informationConnected Identifying Codes
Connected Identifying Codes Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email: {nfazl,staro,trachten}@bu.edu
More informationTopology Control. Chapter 3. Ad Hoc and Sensor Networks. Roger Wattenhofer 3/1
Topology Control Chapter 3 Ad Hoc and Sensor Networks Roger Wattenhofer 3/1 Inventory Tracking (Cargo Tracking) Current tracking systems require lineof-sight to satellite. Count and locate containers Search
More informationUser Modeling on Demographic Attributes in Big Mobile Social Networks
User Modeling on Demographic Attributes in Big Mobile Social Networks YUXIAO DONG, University of Notre Dame NITESH V. CHAWLA, University of Notre Dame JIE TANG, Tsinghua University YANG YANG, Zhejiang
More informationPredicting when seam carved images become. unrecognizable. Sam Cunningham
Predicting when seam carved images become unrecognizable Sam Cunningham April 29, 2008 Acknowledgements I would like to thank my advisors, Shriram Krishnamurthi and Michael Tarr for all of their help along
More informationCS534 Introduction to Computer Vision. Linear Filters. Ahmed Elgammal Dept. of Computer Science Rutgers University
CS534 Introduction to Computer Vision Linear Filters Ahmed Elgammal Dept. of Computer Science Rutgers University Outlines What are Filters Linear Filters Convolution operation Properties of Linear Filters
More informationDiffusion of Networking Technologies
Diffusion of Networking Technologies ISP Bellairs Workshop on Algorithmic Game Theory Barbados April 2012 Sharon Goldberg Boston University Princeton University Zhenming Liu Harvard University Diffusion
More informationTICRec: A Probabilistic Framework to Utilize Temporal Influence Correlations for Time-aware Location Recommendations
: A Probabilistic Framework to Utilize Temporal Influence Correlations for Time-aware Location Recommendations Jia-Dong Zhang, Chi-Yin Chow, Member, IEEE Abstract In location-based social networks (LBSNs),
More informationMATH 17, Winter 2017 COMPLEX NETWORKS. An Introduction to Mathematics Beyond Calculus. Nishant Malik Department of Mathematics Dartmouth College
MATH 17, Winter 2017 COMPLEX NETWORKS An Introduction to Mathematics Beyond Calculus Nishant Malik Department of Mathematics Dartmouth College February 15, 2017 Membership Closure LiveJournal Tracking
More informationPaper Presentation. Steve Jan. March 5, Virginia Tech. Steve Jan (Virginia Tech) Paper Presentation March 5, / 28
Paper Presentation Steve Jan Virginia Tech March 5, 2015 Steve Jan (Virginia Tech) Paper Presentation March 5, 2015 1 / 28 2 paper to present Nonparametric Multi-group Membership Model for Dynamic Networks,
More informationAIMA 3.5. Smarter Search. David Cline
AIMA 3.5 Smarter Search David Cline Uninformed search Depth-first Depth-limited Iterative deepening Breadth-first Bidirectional search None of these searches take into account how close you are to the
More informationFoundations of Artificial Intelligence
Foundations of Artificial Intelligence 20. Combinatorial Optimization: Introduction and Hill-Climbing Malte Helmert Universität Basel April 8, 2016 Combinatorial Optimization Introduction previous chapters:
More informationChapter 20. The Small-World Phenomenon Six Degrees of Separation
Chapter 20 The Small-World Phenomenon 20.1 Six Degrees of Separation In the previous chapter, we considered how social networks can serve as conduits by which ideas and innovations flow through groups
More informationDiffusion of Innovation Across a National Local Health Department Network: A Simulation Approach to Policy Development Using Agent- Based Modeling
Frontiers in Public Health Services and Systems Research Volume 2 Number 5 Article 3 August 2013 Diffusion of Innovation Across a National Local Health Department Network: A Simulation Approach to Policy
More informationSOLITAIRE CLOBBER AS AN OPTIMIZATION PROBLEM ON WORDS
INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 8 (2008), #G04 SOLITAIRE CLOBBER AS AN OPTIMIZATION PROBLEM ON WORDS Vincent D. Blondel Department of Mathematical Engineering, Université catholique
More informationSocial network Analysis: small world phenomenon and decentralized search
Social network Analysis: small world phenomenon and decentralized search Donglei Du Faculty of Business Administration, University of New Brunswick, NB Canada Fredericton E3B 9Y2 (ddu@unb.ca) Du (UNB)
More informationSense in Order: Channel Selection for Sensing in Cognitive Radio Networks
Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,
More informationDistinguishing Photographs and Graphics on the World Wide Web
Distinguishing Photographs and Graphics on the World Wide Web Vassilis Athitsos, Michael J. Swain and Charles Frankel Department of Computer Science The University of Chicago Chicago, Illinois 60637 vassilis,
More informationp-percent Coverage in Wireless Sensor Networks
p-percent Coverage in Wireless Sensor Networks Yiwei Wu, Chunyu Ai, Shan Gao and Yingshu Li Department of Computer Science Georgia State University October 28, 2008 1 Introduction 2 p-percent Coverage
More informationComment: Social Network Theory (book published last year, Alan Dali, editor/sna in educational change) / Filipa has it
SNA Workshop, Kassel, 25-29 June, 2012 DAY 1 15 th June, 2012 LITERATURE: SNA, Wasserman and Faust (1999) Bible of SNA, the math and formulas behind it - Duality of Groups (important paper, briger, 70s)
More informationLocalization in Wireless Sensor Networks
Localization in Wireless Sensor Networks Part 2: Localization techniques Department of Informatics University of Oslo Cyber Physical Systems, 11.10.2011 Localization problem in WSN In a localization problem
More informationA Machine Learning Based Approach for Predicting Undisclosed Attributes in Social Networks
A Machine Learning Based Approach for Predicting Undisclosed Attributes in Social Networks Gergely Kótyuk Laboratory of Cryptography and Systems Security (CrySyS) Budapest University of Technology and
More informationChapter 5 - Elementary Probability Theory
Chapter 5 - Elementary Probability Theory Historical Background Much of the early work in probability concerned games and gambling. One of the first to apply probability to matters other than gambling
More informationSocial Events in a Time-Varying Mobile Phone Graph
Social Events in a Time-Varying Mobile Phone Graph Carlos Sarraute 1, Jorge Brea 1, Javier Burroni 1, Klaus Wehmuth 2, Artur Ziviani 2, and J.I. Alvarez-Hamelin 3 1 Grandata Labs, Argentina 2 LNCC, Brazil
More informationSelective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks. Andrea E.F. Clementi Angelo Monti Riccardo Silvestri
Selective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks Andrea E.F. Clementi Angelo Monti Riccardo Silvestri Introduction A radio network is a set of radio stations that are able
More informationAssociation Rule Mining. Entscheidungsunterstützungssysteme SS 18
Association Rule Mining Entscheidungsunterstützungssysteme SS 18 Frequent Pattern Analysis Frequent pattern: a pattern (a set of items, subsequences, substructures, etc.) that occurs frequently in a data
More informationAUTOMATED MUSIC TRACK GENERATION
AUTOMATED MUSIC TRACK GENERATION LOUIS EUGENE Stanford University leugene@stanford.edu GUILLAUME ROSTAING Stanford University rostaing@stanford.edu Abstract: This paper aims at presenting our method to
More informationSkip Lists S 3 S 2 S 1. 2/6/2016 7:04 AM Skip Lists 1
Skip Lists S 3 15 15 23 10 15 23 36 2/6/2016 7:04 AM Skip Lists 1 Outline and Reading What is a skip list Operations Search Insertion Deletion Implementation Analysis Space usage Search and update times
More informationOn Availability-Performability Trade-off in Wireless Mesh Networks
1 On Availability-Performability Trade-off in Wireless Mesh Networks Parth H. Pathak, Rudra Dutta, Prasant Mohapatra Computer Science Department, University of California, Davis, CA, USA Computer Science
More informationGenbby Technical Paper
Genbby Team January 24, 2018 Genbby Technical Paper Rating System and Matchmaking 1. Introduction The rating system estimates the level of players skills involved in the game. This allows the teams to
More informationDrum Transcription Based on Independent Subspace Analysis
Report for EE 391 Special Studies and Reports for Electrical Engineering Drum Transcription Based on Independent Subspace Analysis Yinyi Guo Center for Computer Research in Music and Acoustics, Stanford,
More informationCSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25. Homework #1. ( Due: Oct 10 ) Figure 1: The laser game.
CSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25 Homework #1 ( Due: Oct 10 ) Figure 1: The laser game. Task 1. [ 60 Points ] Laser Game Consider the following game played on an n n board,
More informationYale University Department of Computer Science
LUX ETVERITAS Yale University Department of Computer Science Secret Bit Transmission Using a Random Deal of Cards Michael J. Fischer Michael S. Paterson Charles Rackoff YALEU/DCS/TR-792 May 1990 This work
More informationAsynchronous Best-Reply Dynamics
Asynchronous Best-Reply Dynamics Noam Nisan 1, Michael Schapira 2, and Aviv Zohar 2 1 Google Tel-Aviv and The School of Computer Science and Engineering, The Hebrew University of Jerusalem, Israel. 2 The
More informationDominant and Dominated Strategies
Dominant and Dominated Strategies Carlos Hurtado Department of Economics University of Illinois at Urbana-Champaign hrtdmrt2@illinois.edu Junel 8th, 2016 C. Hurtado (UIUC - Economics) Game Theory On the
More informationSmall World Problem. Web Science (VU) ( ) Denis Helic. Mar 16, KTI, TU Graz. Denis Helic (KTI, TU Graz) Small-World Mar 16, / 51
Small World Problem Web Science (VU) (707.000) Denis Helic KTI, TU Graz Mar 16, 2015 Denis Helic (KTI, TU Graz) Small-World Mar 16, 2015 1 / 51 Outline 1 Introduction 2 Small World Experiment 3 Small world
More informationCouple Intake Interview
Name: 1 1. What is the issue that led you to decide to come to therapy? 2. How long have you and your partner been together? In what form? (i.e., dating, living together, married, other) 3. What initially
More informationWIRELESS COMMUNICATION TECHNOLOGIES (16:332:546) LECTURE 5 SMALL SCALE FADING
WIRELESS COMMUNICATION TECHNOLOGIES (16:332:546) LECTURE 5 SMALL SCALE FADING Instructor: Dr. Narayan Mandayam Slides: SabarishVivek Sarathy A QUICK RECAP Why is there poor signal reception in urban clutters?
More informationIntroduction to Coding Theory
Coding Theory Massoud Malek Introduction to Coding Theory Introduction. Coding theory originated with the advent of computers. Early computers were huge mechanical monsters whose reliability was low compared
More informationTransportation and The Small World
Aaron Valente Transportation and The Small World Networks are the fabric that holds the very system of our lives together. From the bus we took to school as a child to the subway system we take to the
More informationData Storage Using a Non-integer Number of Bits per Cell
Data Storage Using a Non-integer Number of Bits per Cell Naftali Sommer June 21st, 2017 The Conventional Scheme Information is stored in a memory cell by setting its threshold voltage 1 bit/cell - Many
More informationMAC Theory Chapter 7. Standby Energy [digitalstrom.org] Rating. Overview. No apps Mission critical
Standby Energy [digitalstrom.org] MAC Theory Chapter 7 0 billion electrical devices in Europe 9.5 billion are not networked 6 billion euro per year energy lost Make electricity smart cheap networking (over
More informationMAC Theory. Chapter 7
MAC Theory Chapter 7 Ad Hoc and Sensor Networks Roger Wattenhofer 7/1 Standby Energy [digitalstrom.org] 10 billion electrical devices in Europe 9.5 billion are not networked 6 billion euro per year energy
More informationOn the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission
On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission Ravi Kishore Ashutosh Kumar Chiranjeevi Vanarasa Kannan Srinathan Abstract In a network of n nodes (modelled as a digraph),
More informationWireless Network Coding with Local Network Views: Coded Layer Scheduling
Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the
More informationPredicting Win/Loss Records using Starcraft 2 Replay Data
Predicting Win/Loss Records using Starcraft 2 Replay Data Final Project, Team 31 Evan Cox Stanford University evancox@stanford.edu Snir Kodesh Stanford University snirk@stanford.edu Dan Preston Stanford
More informationA Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model
A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model Abstract In wireless networks, mutual interference prevents wireless devices from correctly receiving packages from others
More informationSSB Debate: Model-based Inference vs. Machine Learning
SSB Debate: Model-based nference vs. Machine Learning June 3, 2018 SSB 2018 June 3, 2018 1 / 20 Machine learning in the biological sciences SSB 2018 June 3, 2018 2 / 20 Machine learning in the biological
More informationGrundlagen der Rechnernetze. Introduction
Grundlagen der Rechnernetze Introduction Overview Building blocks and terms Basics of communication Addressing Protocols and Layers Performance Historical development Grundlagen der Rechnernetze Introduction
More informationUMLEmb: UML for Embedded Systems. II. Modeling in SysML. Eurecom
UMLEmb: UML for Embedded Systems II. Modeling in SysML Ludovic Apvrille ludovic.apvrille@telecom-paristech.fr Eurecom, office 470 http://soc.eurecom.fr/umlemb/ @UMLEmb Eurecom Goals Learning objective
More informationMinimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks
1 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta, and Samir R. Das {anandps, hgupta, samir}@cs.sunysb.edu Stony Brook University,
More informationMEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS. Justin Becker, Hao Chen UC Davis May 2009
MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS Justin Becker, Hao Chen UC Davis May 2009 1 Motivating example College admission Kaplan surveyed 320 admissions offices in 2008 1 in 10 admissions officers
More informationGateways Placement in Backbone Wireless Mesh Networks
I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract
More information3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007
3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,
More informationThe Pigeonhole Principle
The Pigeonhole Principle Some Questions Does there have to be two trees on Earth with the same number of leaves? How large of a set of distinct integers between 1 and 200 is needed to assure that two numbers
More informationFoundations of Distributed Systems: Tree Algorithms
Foundations of Distributed Systems: Tree Algorithms Stefan Schmid @ T-Labs, 2011 Broadcast Why trees? E.g., efficient broadcast, aggregation, routing,... Important trees? E.g., breadth-first trees, minimal
More informationParallel Dynamic and Selective Community Detection in Massive Streaming Graphs
Parallel Dynamic and Selective Community Detection in Massive Streaming Graphs European Conference on Data Analysis 2013, Luxembourg July 11, 2013 Christian L. Staudt, Yassine Marrakchi, Aleksejs Sazonovs
More informationConstructing K-Connected M-Dominating Sets
Constructing K-Connected M-Dominating Sets in Wireless Sensor Networks Yiwei Wu, Feng Wang, My T. Thai and Yingshu Li Georgia State University Arizona State University University of Florida Outline Introduction
More informationUtilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels
734 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 4, APRIL 2001 Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels Oh-Soon Shin, Student
More informationFilling out a form quiz
Level A 1. A form can be described as: A) a pre-set format B) a quiz C) a list 2. To delete means to: A) skip that question B) cross out C) circle the right answer 3. A census form collects information
More informationUsing Program Slicing to Identify Faults in Software:
Using Program Slicing to Identify Faults in Software: Sue Black 1, Steve Counsell 2, Tracy Hall 3, Paul Wernick 3, 1 Centre for Systems and Software Engineering, London South Bank University, 103 Borough
More informationOPINION FORMATION IN TIME-VARYING SOCIAL NETWORK: THE CASE OF NAMING GAME
OPINION FORMATION IN TIME-VARYING SOCIAL NETWORK: THE CASE OF NAMING GAME ANIMESH MUKHERJEE DEPARTMENT OF COMPUTER SCIENCE & ENGG. INDIAN INSTITUTE OF TECHNOLOGY, KHARAGPUR Naming Game in complex networks
More informationQAT Sample Questions (SET 3)
1. Let f(x) = (x+2)(x+3) (x+1)(x+6). What is f (0)? A. 5/6 B. 4/3 C. 1 D. 1/3 E. 2/3 QAT Sample Questions (SET 3) 2. The following graph (solid lines only) shows level curves of which function? (A level
More informationA N E T W O R K A N A LY T I C A P P R O A C H F O R E X P L O R I N G T H E C O M P L E X I T Y O F RUSH HOUR
A N E T W O R K A N A LY T I C A P P R O A C H F O R E X P L O R I N G T H E C O M P L E X I T Y O F RUSH HOUR mareike bockholt 1 introduction It is well known that problem solving capabilities of humans
More informationAutomated Analysis and Synthesis of Block-Cipher Modes of Operation
Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff 1 Jonathan Katz 1 Matthew D. Green 2 1 University of Maryland 2 Johns Hopkins University Presented at the Fall Protocol
More informationTopology Control with Better Radio Models: Implications for Energy and Multi-Hop Interference
Topology Control with Better Radio Models: Implications for Energy and Multi-Hop Interference Douglas M. Blough Mauro Leoncini Giovanni Resta Paolo Santi June 1, 2006 Abstract Topology Control (TC) is
More informationUsing Artificial intelligent to solve the game of 2048
Using Artificial intelligent to solve the game of 2048 Ho Shing Hin (20343288) WONG, Ngo Yin (20355097) Lam Ka Wing (20280151) Abstract The report presents the solver of the game 2048 base on artificial
More informationHeuristics & Pattern Databases for Search Dan Weld
10//01 CSE 57: Artificial Intelligence Autumn01 Heuristics & Pattern Databases for Search Dan Weld Recap: Search Problem States configurations of the world Successor function: function from states to lists
More informationOn the GNSS integer ambiguity success rate
On the GNSS integer ambiguity success rate P.J.G. Teunissen Mathematical Geodesy and Positioning Faculty of Civil Engineering and Geosciences Introduction Global Navigation Satellite System (GNSS) ambiguity
More informationHybrid Halftoning A Novel Algorithm for Using Multiple Halftoning Techniques
Hybrid Halftoning A ovel Algorithm for Using Multiple Halftoning Techniques Sasan Gooran, Mats Österberg and Björn Kruse Department of Electrical Engineering, Linköping University, Linköping, Sweden Abstract
More informationLow-Latency Multi-Source Broadcast in Radio Networks
Low-Latency Multi-Source Broadcast in Radio Networks Scott C.-H. Huang City University of Hong Kong Hsiao-Chun Wu Louisiana State University and S. S. Iyengar Louisiana State University In recent years
More informationarxiv: v2 [cs.cc] 18 Mar 2013
Deciding the Winner of an Arbitrary Finite Poset Game is PSPACE-Complete Daniel Grier arxiv:1209.1750v2 [cs.cc] 18 Mar 2013 University of South Carolina grierd@email.sc.edu Abstract. A poset game is a
More informationGame Theory. Share information. Evaluate information (obtained from friends, acquaintances and coworkers) Develop trust. Accept or reject friendship
Æ ÇÌ Ë º ÅÁËÀÊ ÈÊÁÄ ¾ ¾¼½¾ Game Theory A social network is not a static structure the individuals in a social network must constantly interact in order to create social capital that reflects how a group
More informationFinite games: finite number of players, finite number of possible actions, finite number of moves. Canusegametreetodepicttheextensiveform.
A game is a formal representation of a situation in which individuals interact in a setting of strategic interdependence. Strategic interdependence each individual s utility depends not only on his own
More informationClustering of traffic accidents with the use of the KDE+ method
Richard Andrášik*, Michal Bíl Transport Research Centre, Líšeňská 33a, 636 00 Brno, Czech Republic *e-mail: andrasik.richard@gmail.com Clustering of traffic accidents with the use of the KDE+ method TABLE
More informationThe Job Interview: Here are some popular questions asked in job interviews:
The Job Interview: Helpful Hints to Prepare for your interview: In preparing for a job interview, learn a little about your potential employer. You can do this by calling the business and asking, or research
More informationStatistical Analysis of Nuel Tournaments Department of Statistics University of California, Berkeley
Statistical Analysis of Nuel Tournaments Department of Statistics University of California, Berkeley MoonSoo Choi Department of Industrial Engineering & Operations Research Under Guidance of Professor.
More informationMove a Little Closer? Information Sharing and the Spatial Clustering of Bank Branches
Move a Little Closer? Information Sharing and the Spatial Clustering of Bank Branches Shusen Qi (Xiamen University) Ralph De Haas (EBRD; Tilburg University) Steven Ongena (University of Zurich; SFI; KU
More informationNETW 701: Wireless Communications. Lecture 5. Small Scale Fading
NETW 701: Wireless Communications Lecture 5 Small Scale Fading Small Scale Fading Most mobile communication systems are used in and around center of population. The transmitting antenna or Base Station
More informationHardcore Classification: Identifying Play Styles in Social Games using Network Analysis
Hardcore Classification: Identifying Play Styles in Social Games using Network Analysis Ben Kirman and Shaun Lawson September 2009 Abstract In the social network of a web-based online game, all players
More informationChapter 10. User Cooperative Communications
Chapter 10 User Cooperative Communications 1 Outline Introduction Relay Channels User-Cooperation in Wireless Networks Multi-Hop Relay Channel Summary 2 Introduction User cooperative communication is a
More informationHETEROGENEOUS LINK ASYMMETRY IN TDD MODE CELLULAR SYSTEMS
HETEROGENEOUS LINK ASYMMETRY IN TDD MODE CELLULAR SYSTEMS Magnus Lindström Radio Communication Systems Department of Signals, Sensors and Systems Royal Institute of Technology (KTH) SE- 44, STOCKHOLM,
More informationDynamic Programming. Objective
Dynamic Programming Richard de Neufville Professor of Engineering Systems and of Civil and Environmental Engineering MIT Massachusetts Institute of Technology Dynamic Programming Slide 1 of 43 Objective
More informationAcknowledged Broadcasting and Gossiping in ad hoc radio networks
Acknowledged Broadcasting and Gossiping in ad hoc radio networks Jiro Uchida 1, Wei Chen 2, and Koichi Wada 3 1,3 Nagoya Institute of Technology Gokiso-cho, Syowa-ku, Nagoya, 466-8555, Japan, 1 jiro@phaser.elcom.nitech.ac.jp,
More informationGame Mechanics Minesweeper is a game in which the player must correctly deduce the positions of
Table of Contents Game Mechanics...2 Game Play...3 Game Strategy...4 Truth...4 Contrapositive... 5 Exhaustion...6 Burnout...8 Game Difficulty... 10 Experiment One... 12 Experiment Two...14 Experiment Three...16
More information5.4 Imperfect, Real-Time Decisions
116 5.4 Imperfect, Real-Time Decisions Searching through the whole (pruned) game tree is too inefficient for any realistic game Moves must be made in a reasonable amount of time One has to cut off the
More informationConvergence in competitive games
Convergence in competitive games Vahab S. Mirrokni Computer Science and AI Lab. (CSAIL) and Math. Dept., MIT. This talk is based on joint works with A. Vetta and with A. Sidiropoulos, A. Vetta DIMACS Bounded
More informationINNOVATION NETWORKS IN THE GERMAN LASER INDUSTRY
INNOVATION NETWORKS IN THE GERMAN LASER INDUSTRY EVOLUTIONARY CHANGE, STRATEGIC POSITIONING AND FIRM INNOVATIVENESS Dissertation Submitted in fulfillment of the requirements for the degree "Doktor der
More informationSpectrum Collaboration Challenge (SC2)
Spectrum Collaboration Challenge (SC2) www.spectrumcollaborationchallenge.com Phase 1 Entrance Hurdles Revision 1 9/1/2016 Defense Advanced Research Projects Agency Microsystems Technology Office 675 North
More informationBroadcast in Radio Networks in the presence of Byzantine Adversaries
Broadcast in Radio Networks in the presence of Byzantine Adversaries Vinod Vaikuntanathan Abstract In PODC 0, Koo [] presented a protocol that achieves broadcast in a radio network tolerating (roughly)
More informationOnline Call Control in Cellular Networks Revisited
Online Call Control in Cellular Networks Revisited Yong Zhang Francis Y.L. Chin Hing-Fung Ting Joseph Wun-Tat Chan Xin Han Ka-Cheong Lam Abstract Wireless Communication Networks based on Frequency Division
More informationColor of Interference and Joint Encoding and Medium Access in Large Wireless Networks
Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Nithin Sugavanam, C. Emre Koksal, Atilla Eryilmaz Department of Electrical and Computer Engineering The Ohio State
More informationA GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS
A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS C. COMMANDER, C.A.S. OLIVEIRA, P.M. PARDALOS, AND M.G.C. RESENDE ABSTRACT. Ad hoc networks are composed of a set of wireless
More informationSmall World Problem. Web Science (VU) ( ) Denis Helic. Mar 16, KTI, TU Graz. Denis Helic (KTI, TU Graz) Small-World Mar 16, / 50
Small World Problem Web Science (VU) (707.000) Denis Helic KTI, TU Graz Mar 16, 2015 Denis Helic (KTI, TU Graz) Small-World Mar 16, 2015 1 / 50 Outline 1 Introduction 2 Small World Experiment 3 Small world
More information