2,890 research outputs found

    Multiple Partitioning of Multiplex Signed Networks: Application to European Parliament Votes

    Full text link
    For more than a decade, graphs have been used to model the voting behavior taking place in parliaments. However, the methods described in the literature suffer from several limitations. The two main ones are that 1) they rely on some temporal integration of the raw data, which causes some information loss, and/or 2) they identify groups of antagonistic voters, but not the context associated to their occurrence. In this article, we propose a novel method taking advantage of multiplex signed graphs to solve both these issues. It consists in first partitioning separately each layer, before grouping these partitions by similarity. We show the interest of our approach by applying it to a European Parliament dataset.Comment: Social Networks, 2020, 60, 83 - 10

    COMMUNITY DETECTION IN GRAPHS

    Get PDF
    Thesis (Ph.D.) - Indiana University, Luddy School of Informatics, Computing, and Engineering/University Graduate School, 2020Community detection has always been one of the fundamental research topics in graph mining. As a type of unsupervised or semi-supervised approach, community detection aims to explore node high-order closeness by leveraging graph topological structure. By grouping similar nodes or edges into the same community while separating dissimilar ones apart into different communities, graph structure can be revealed in a coarser resolution. It can be beneficial for numerous applications such as user shopping recommendation and advertisement in e-commerce, protein-protein interaction prediction in the bioinformatics, and literature recommendation or scholar collaboration in citation analysis. However, identifying communities is an ill-defined problem. Due to the No Free Lunch theorem [1], there is neither gold standard to represent perfect community partition nor universal methods that are able to detect satisfied communities for all tasks under various types of graphs. To have a global view of this research topic, I summarize state-of-art community detection methods by categorizing them based on graph types, research tasks and methodology frameworks. As academic exploration on community detection grows rapidly in recent years, I hereby particularly focus on the state-of-art works published in the latest decade, which may leave out some classic models published decades ago. Meanwhile, three subtle community detection tasks are proposed and assessed in this dissertation as well. First, apart from general models which consider only graph structures, personalized community detection considers user need as auxiliary information to guide community detection. In the end, there will be fine-grained communities for nodes better matching user needs while coarser-resolution communities for the rest of less relevant nodes. Second, graphs always suffer from the sparse connectivity issue. Leveraging conventional models directly on such graphs may hugely distort the quality of generate communities. To tackle such a problem, cross-graph techniques are involved to propagate external graph information as a support for target graph community detection. Third, graph community structure supports a natural language processing (NLP) task to depict node intrinsic characteristics by generating node summarizations via a text generative model. The contribution of this dissertation is threefold. First, a decent amount of researches are reviewed and summarized under a well-defined taxonomy. Existing works about methods, evaluation and applications are all addressed in the literature review. Second, three novel community detection tasks are demonstrated and associated models are proposed and evaluated by comparing with state-of-art baselines under various datasets. Third, the limitations of current works are pointed out and future research tracks with potentials are discussed as well

    QUEST Hierarchy for Hyperspectral Face Recognition

    Get PDF
    Face recognition is an attractive biometric due to the ease in which photographs of the human face can be acquired and processed. The non-intrusive ability of many surveillance systems permits face recognition applications to be used in a myriad of environments. Despite decades of impressive research in this area, face recognition still struggles with variations in illumination, pose and expression not to mention the larger challenge of willful circumvention. The integration of supporting contextual information in a fusion hierarchy known as QUalia Exploitation of Sensor Technology (QUEST) is a novel approach for hyperspectral face recognition that results in performance advantages and a robustness not seen in leading face recognition methodologies. This research demonstrates a method for the exploitation of hyperspectral imagery and the intelligent processing of contextual layers of spatial, spectral, and temporal information. This approach illustrates the benefit of integrating spatial and spectral domains of imagery for the automatic extraction and integration of novel soft features (biometric). The establishment of the QUEST methodology for face recognition results in an engineering advantage in both performance and efficiency compared to leading and classical face recognition techniques. An interactive environment for the testing and expansion of this recognition framework is also provided

    The citizen-user and the crowd-mediated politics of the Five Star Movement

    Get PDF
    This thesis described the trajectory of the Italy’s Five Star Movement (M5S, 2005- 2014) from the perspective of the citizens who, as Internet users, participated in in the political enterprise. Citizen-users, enabled and empowered by Internet and mobile technologies, shaped and sustained the identity and evolution of the movement that became the M5S. The case study selected for this research, the M5S, is exceptional due to the magnitude of its success; but its features (Internet-centered and fluid ideology) are becoming more common among political organisations in Western democracies. The goal of the thesis is to assess the impact of the Internet on the political process, through its connecting, mobilising, organising, and to characterise the shape of political talk among citizens. This is achieved by applying quantitative methods, including network analysis and natural language processing, on 10 years of user-generated data collected mainly from four sources: the blog of the Movement’s founder, the M5S official forum, Facebook and Meetup.com. The thesis finds that the online discussion fora fostered diversity without fragmentation, and contributed on at least one occasion to shape the policy agenda of the M5S. Furthermore, the meetups of the Movement maintained their capacity to attract and mobilise users, and their territorial distribution clearly correlate with local results of the M5S in two elections, suggesting a positive impact of Internet-enabled mobilisation. Finally, given the votes received in the 2013 general election, the political communication generated over the Internet offset the low attention dedicated by TV news broadcast to the Movement during the electoral campaign. As Internet and mobile technologies are routinised, it is easy to see how their importance in political organisation and deliberation will grow. By studying the application of ICTs in the case of the M5S, this thesis offers insights into their use in practice, as well as pointing to possible democratic risks if online deliberation is non controlled to guarantee its fairness and openness but instead steered by the leadership, turning a deliberating community of citizen-users into a noisy crowd

    Computation in Complex Networks

    Get PDF
    Complex networks are one of the most challenging research focuses of disciplines, including physics, mathematics, biology, medicine, engineering, and computer science, among others. The interest in complex networks is increasingly growing, due to their ability to model several daily life systems, such as technology networks, the Internet, and communication, chemical, neural, social, political and financial networks. The Special Issue “Computation in Complex Networks" of Entropy offers a multidisciplinary view on how some complex systems behave, providing a collection of original and high-quality papers within the research fields of: • Community detection • Complex network modelling • Complex network analysis • Node classification • Information spreading and control • Network robustness • Social networks • Network medicin

    Methods and applications in social networks analysis

    Get PDF
    The Social Network Analysis perspective has proven the ability to develop a significant breadth of theoretical and methodological issues witnessed by the contribution of an increasing number of scholars and the multiplication of empirical applications in a wide range of scientific fields. One of the disciplinary areas in which this development has occurred, among others, is certainly that of computational social science, by virtue of the developing field of online social networks and the leading role of information technologies in the production of scientific knowledge. The complex nature of social phenomena enforced the usefulness of the network perspective as a wealth of theoretical and methodological tools capable of penetrating within the dimensions of that complexity. The book hosts eleven contributions that within a sound theoretical ground, present different examples of speculative and applicative areas where the Social Network Analysis can contribute to explore, interpret and predict social interaction between actors. Some of the contributions were presented at the ARS’19 Conference held in Vietri sul Mare (Salerno, Italy) in October, 29-31 2019; it was the seventh of a biennial meetings series started in 2007 with the aim to promote relevant results and the most recent methodological developments in Social Network Analysis

    Evolving Bitcoin Custody

    Full text link
    The broad topic of this thesis is the design and analysis of Bitcoin custody systems. Both the technology and threat landscape are evolving constantly. Therefore, custody systems, defence strategies, and risk models should be adaptive too. We introduce Bitcoin custody by describing the different types, design principles, phases and functions of custody systems. We review the technology stack of these systems and focus on the fundamentals; key-management and privacy. We present a perspective we call the systems view. It is an attempt to capture the full complexity of a custody system, including technology, people, and processes. We review existing custody systems and standards. We explore Bitcoin covenants. This is a mechanism to enforce constraints on transaction sequences. Although previous work has proposed how to construct and apply Bitcoin covenants, these require modifying the consensus rules of Bitcoin, a notoriously difficult task. We introduce the first detailed exposition and security analysis of a deleted-key covenant protocol, which is compatible with current consensus rules. We demonstrate a range of security models for deleted-key covenants which seem practical, in particular, when applied in autonomous (user-controlled) custody systems. We conclude with a comparative analysis with previous proposals. Covenants are often proclaimed to be an important primitive for custody systems, but no complete design has been proposed to validate that claim. To address this, we propose an autonomous custody system called Ajolote which uses deleted-key covenants to enforce a vault sequence. We evaluate Ajolote with; a model of its state dynamics, a privacy analysis, and a risk model. We propose a threat model for custody systems which captures a realistic attacker for a system with offline devices and user-verification. We perform ceremony analysis to construct the risk model.Comment: PhD thesi
    corecore