49 research outputs found
On the Impact of Disorder on Dynamic Network Navigation
In this extended abstract, we highlight the impact of disorder on routing algorithms in dynamic networks. We show that real dynamic networks exhibit some degree of disorder which, if efficiently exploited, can improve significantly routing performance in such networks
Understanding and modeling the small-world phenomenon in dynamic networks
The small-world phenomenon first introduced in the context of static graphs consists of graphs with high clustering coefficient and low shortest path length. This is an intrinsic property of many real complex static networks. Recent research has shown that this structure is also observable in dynamic networks but how it emerges remains an open problem. In this paper, we propose a model capable of capturing the small-world behavior observed in various real traces. We then study information diffusion in such small-world networks. Analytical and simulation results with epidemic model show that the small-world structure increases dramatically the information spreading speed in dynamic networks
Uncovering the Wider Structure of Extreme Right Communities Spanning Popular Online Networks
Recent years have seen increased interest in the online presence of extreme
right groups. Although originally composed of dedicated websites, the online
extreme right milieu now spans multiple networks, including popular social
media platforms such as Twitter, Facebook and YouTube. Ideally therefore, any
contemporary analysis of online extreme right activity requires the
consideration of multiple data sources, rather than being restricted to a
single platform. We investigate the potential for Twitter to act as a gateway
to communities within the wider online network of the extreme right, given its
facility for the dissemination of content. A strategy for representing
heterogeneous network data with a single homogeneous network for the purpose of
community detection is presented, where these inherently dynamic communities
are tracked over time. We use this strategy to discover and analyze persistent
English and German language extreme right communities.Comment: 10 pages, 11 figures. Due to use of "sigchi" template, minor changes
were made to ensure 10 page limit was not exceeded. Minor clarifications in
Introduction, Data and Methodology section
Uncovering the wider structure of extreme right communities spanning popular online networks
AbstractRecent years have seen increased interest in the online presence of extreme right groups. Although originally composed of dedicated websites, the online extreme right milieu now spans multiple networks, including popular social media platforms such as Twitter, Facebook and YouTube. Ideally therefore, any contemporary analysis of online extreme right activity requires the consideration of multiple data sources, rather than being restricted to a single platform.We investigate the potential for Twitter to act as one possible gateway to communities within the wider online network of the extreme right, given its facility for the dissemination of content. A strategy for representing heterogeneous network data with a single homogeneous network for the purpose of community detection is presented, where these inherently dynamic communities are tracked over time. We use this strategy to discover and analyze persistent English and German language extreme right communities.Authored by Derek OâCallaghan, Derek Greene, Maura Conway, Joe Carthy and Padraig Cunningham
Exploiting Temporal Complex Network Metrics in Mobile Malware Containment
Malicious mobile phone worms spread between devices via short-range Bluetooth
contacts, similar to the propagation of human and other biological viruses.
Recent work has employed models from epidemiology and complex networks to
analyse the spread of malware and the effect of patching specific nodes. These
approaches have adopted a static view of the mobile networks, i.e., by
aggregating all the edges that appear over time, which leads to an approximate
representation of the real interactions: instead, these networks are inherently
dynamic and the edge appearance and disappearance is highly influenced by the
ordering of the human contacts, something which is not captured at all by
existing complex network measures. In this paper we first study how the
blocking of malware propagation through immunisation of key nodes (even if
carefully chosen through static or temporal betweenness centrality metrics) is
ineffective: this is due to the richness of alternative paths in these
networks. Then we introduce a time-aware containment strategy that spreads a
patch message starting from nodes with high temporal closeness centrality and
show its effectiveness using three real-world datasets. Temporal closeness
allows the identification of nodes able to reach most nodes quickly: we show
that this scheme can reduce the cellular network resource consumption and
associated costs, achieving, at the same time, a complete containment of the
malware in a limited amount of time.Comment: 9 Pages, 13 Figures, In Proceedings of IEEE 12th International
Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM '11
Fast filtering and animation of large dynamic networks
Detecting and visualizing what are the most relevant changes in an evolving
network is an open challenge in several domains. We present a fast algorithm
that filters subsets of the strongest nodes and edges representing an evolving
weighted graph and visualize it by either creating a movie, or by streaming it
to an interactive network visualization tool. The algorithm is an approximation
of exponential sliding time-window that scales linearly with the number of
interactions. We compare the algorithm against rectangular and exponential
sliding time-window methods. Our network filtering algorithm: i) captures
persistent trends in the structure of dynamic weighted networks, ii) smoothens
transitions between the snapshots of dynamic network, and iii) uses limited
memory and processor time. The algorithm is publicly available as open-source
software.Comment: 6 figures, 2 table