11,507 research outputs found
The Naming Game in Social Networks: Community Formation and Consensus Engineering
We study the dynamics of the Naming Game [Baronchelli et al., (2006) J. Stat.
Mech.: Theory Exp. P06014] in empirical social networks. This stylized
agent-based model captures essential features of agreement dynamics in a
network of autonomous agents, corresponding to the development of shared
classification schemes in a network of artificial agents or opinion spreading
and social dynamics in social networks. Our study focuses on the impact that
communities in the underlying social graphs have on the outcome of the
agreement process. We find that networks with strong community structure hinder
the system from reaching global agreement; the evolution of the Naming Game in
these networks maintains clusters of coexisting opinions indefinitely. Further,
we investigate agent-based network strategies to facilitate convergence to
global consensus.Comment: The original publication is available at
http://www.springerlink.com/content/70370l311m1u0ng3
Comprehensive Security Framework for Global Threats Analysis
Cyber criminality activities are changing and becoming more and more professional. With the growth of financial flows through the Internet and the Information System (IS), new kinds of thread arise involving complex scenarios spread within multiple IS components. The IS information modeling and Behavioral Analysis are becoming new solutions to normalize the IS information and counter these new threads. This paper presents a framework which details the principal and necessary steps for monitoring an IS. We present the architecture of the framework, i.e. an ontology of activities carried out within an IS to model security information and User Behavioral analysis. The results of the performed experiments on real data show that the modeling is effective to reduce the amount of events by 91%. The User Behavioral Analysis on uniform modeled data is also effective, detecting more than 80% of legitimate actions of attack scenarios
Cognitive network structure: an experimental study
In this paper we present first experimental results about a small group of
people exchanging private and public messages in a virtual community. Our goal
is the study of the cognitive network that emerges during a chat seance. We
used the Derrida coefficient and the triangle structure under the working
assumption that moods and perceived mutual affinity can produce results
complementary to a full semantic analysis. The most outstanding outcome is the
difference between the network obtained considering publicly exchanged messages
and the one considering only privately exchanged messages: in the former case,
the network is very homogeneous, in the sense that each individual interacts in
the same way with all the participants, whilst in the latter the interactions
among different agents are very heterogeneous, and are based on "the enemy of
my enemy is my friend" strategy. Finally a recent characterization of the
triangular cliques has been considered in order to describe the intimate
structure of the network. Experimental results confirm recent theoretical
studies indicating that certain 3-vertex structures can be used as indicators
for the network aging and some relevant dynamical features.Comment: 15 pages, 5 figures, 3 table
Future Trends and Challenges for Mobile and Convergent Networks
Some traffic characteristics like real-time, location-based, and
community-inspired, as well as the exponential increase on the data traffic in
mobile networks, are challenging the academia and standardization communities
to manage these networks in completely novel and intelligent ways, otherwise,
current network infrastructures can not offer a connection service with an
acceptable quality for both emergent traffic demand and application requisites.
In this way, a very relevant research problem that needs to be addressed is how
a heterogeneous wireless access infrastructure should be controlled to offer a
network access with a proper level of quality for diverse flows ending at
multi-mode devices in mobile scenarios. The current chapter reviews recent
research and standardization work developed under the most used wireless access
technologies and mobile access proposals. It comprehensively outlines the
impact on the deployment of those technologies in future networking
environments, not only on the network performance but also in how the most
important requirements of several relevant players, such as, content providers,
network operators, and users/terminals can be addressed. Finally, the chapter
concludes referring the most notable aspects in how the environment of future
networks are expected to evolve like technology convergence, service
convergence, terminal convergence, market convergence, environmental awareness,
energy-efficiency, self-organized and intelligent infrastructure, as well as
the most important functional requisites to be addressed through that
infrastructure such as flow mobility, data offloading, load balancing and
vertical multihoming.Comment: In book 4G & Beyond: The Convergence of Networks, Devices and
Services, Nova Science Publishers, 201
- …