187,332 research outputs found

    Leader Election for Anonymous Asynchronous Agents in Arbitrary Networks

    Get PDF
    We study the problem of leader election among mobile agents operating in an arbitrary network modeled as an undirected graph. Nodes of the network are unlabeled and all agents are identical. Hence the only way to elect a leader among agents is by exploiting asymmetries in their initial positions in the graph. Agents do not know the graph or their positions in it, hence they must gain this knowledge by navigating in the graph and share it with other agents to accomplish leader election. This can be done using meetings of agents, which is difficult because of their asynchronous nature: an adversary has total control over the speed of agents. When can a leader be elected in this adversarial scenario and how to do it? We give a complete answer to this question by characterizing all initial configurations for which leader election is possible and by constructing an algorithm that accomplishes leader election for all configurations for which this can be done

    Virtual Radicalisation: Challenges for Police

    Get PDF
    Recent advances in communications technology are providing a medium for individuals or groups to subscribe to extremist worldviews and form networks, access training and obtain information, whilst remaining virtually undetected in the online world. Whilst the Internet is facilitating global virtual communities like Second Life, MySpace and Facebook it is also providing an anonymous meeting place for disenfranchised individuals to gather, share ideas, post and exchange information regarding their particular ideology. This virtual community provides a sense of belonging to a global cause in which the actions of an individual can be aligned to, and seen to contribute towards something more significant than their own lives. Membership of this virtual community can facilitate the indoctrination of individuals, thereby negating psychological barriers that would normally inhibit particular types of behaviour. Terrorist groups operate as amorphous, fluid networks providing them significant advantages over rigidly structured state and nation based law enforcement agencies. In addition terrorist groups are exploiting the combination of rapidly evolving technology and incommodious legislation to prevent detection

    Sexual networks and the transmission of HIV in London

    Get PDF
    Copyright @ 1998 Cambridge University Press.This paper discusses ways in which empirical research investigating sexual networks can further understanding of the transmission of HIV in London, using information from a 24-month period of participant observation and 53 open-ended, in-depth interviews with eighteen men and one woman who have direct and indirect sexual links with each other. These interviews enabled the identification of a wider sexual network between 154 participants and contacts during the year August 1994-July 1995. The linked network data help to identify pathways of transmission between individuals who are HIV + and those who are HIV -, as well as sexual links between 'older' and 'younger' men, and with male prostitutes. There appears to be considerable on-going transmission of HIV in London. The majority of participants reported having had unprotected anal and/or vaginal sex within a variety of relationships. The implications of these findings for policies designed to prevent the transmission of HIV are discussed.The Wellcome Trust and The Health Education Authority

    Foucault, exhibitionism and voyeurism on chatroulette

    Get PDF
    Sexuality, understood as a Foucauldian discourse that expresses itself through our passions and pursuits and contributes massively to our socially- constructed identity formation, has from the outset been a major factor in the growth of the internet. As the ultimate look-but-don‘t-touch medium, the computer screen has offered us a pornographic emporium in the privacy of our homes, fed first by the producers of material in the standard broadcast mode, then more and more by ourselves, to each other, in the social media context of online sexual social networking. The recent shift of sexual video material from broadcast to social media mode highlights the fundamental exhibitionism/voyeurism dyad at the core of all this activity, and finds its most impersonal, anonymous apotheosis in the phenomenon that is ChatRoulette, where visual discourse-objects are deployed in a nexus of online sexual power relations

    Is there more than one linkage between Social Network and Inequality?

    Get PDF
    The paper aims to analyse how income inequality affects social networks strength in fourteen European Countries. We introduce some new evidences by using the ECHP for testing the networks-inequality nexus and being able to construct directly inequality indices from the microdata as well their decomposition. In particular, we focus on two main point: firstly, we analyse how total income inequality could be related to social network; secondly, we introduce the "clustered network" definition, by decomposing total income inequality based on the education level. We test the existence of a pluralism linkage between Social Network and Inequality and many results confirm that the linkage is neither unambiguous nor unidirectional. We introduce and stress some important issue. First, we use dierent levels of social network: narrow, wide and anonymous; second, we use different inequality indexes (different sensitiveness to changes at different part of the income distribution); third, the ambiguous linkage could be explained on one hand by the positive role of emulation and reciprocity behaviors and on the other hand by negative ones of the envy, amoral familism and keeping up with the Joneses mechanisms. Finally, we stress the different roles of within and between components of inequality. Our idea is that higher income inequality - related to the changing education premia - could affect social network formation among individuals through two different channels: higher inequality among dierent educated ind ividuals could raise (clustered networks), while higher inequality among similars could halt the social networks.Social Network ; Inequality ; Clustered Network ; Envy ; Emulation

    Gathering in Dynamic Rings

    Full text link
    The gathering problem requires a set of mobile agents, arbitrarily positioned at different nodes of a network to group within finite time at the same location, not fixed in advanced. The extensive existing literature on this problem shares the same fundamental assumption: the topological structure does not change during the rendezvous or the gathering; this is true also for those investigations that consider faulty nodes. In other words, they only consider static graphs. In this paper we start the investigation of gathering in dynamic graphs, that is networks where the topology changes continuously and at unpredictable locations. We study the feasibility of gathering mobile agents, identical and without explicit communication capabilities, in a dynamic ring of anonymous nodes; the class of dynamics we consider is the classic 1-interval-connectivity. We focus on the impact that factors such as chirality (i.e., a common sense of orientation) and cross detection (i.e., the ability to detect, when traversing an edge, whether some agent is traversing it in the other direction), have on the solvability of the problem. We provide a complete characterization of the classes of initial configurations from which the gathering problem is solvable in presence and in absence of cross detection and of chirality. The feasibility results of the characterization are all constructive: we provide distributed algorithms that allow the agents to gather. In particular, the protocols for gathering with cross detection are time optimal. We also show that cross detection is a powerful computational element. We prove that, without chirality, knowledge of the ring size is strictly more powerful than knowledge of the number of agents; on the other hand, with chirality, knowledge of n can be substituted by knowledge of k, yielding the same classes of feasible initial configurations
    corecore