4,827 research outputs found

    Parallel distributed algorithms of the beta-model of the small world graphs

    Get PDF
    The research goal is to develop a large-scale agent-based simulation environment to support implementations of Internet simulation applications.The Small Worlds (SW) graphs are used to model Web sites and social networks of Internet users. Each vertex represents the identity of a simple agent. In order to cope with scalability issues, we have to consider distributed parallel processing. The focus of this paper is to present two parallel-distributed algorithms for the construction of a particular type of SW graph called Beta-model. The first algorithm serializes the graph construction, while the second constructs the graph in parallel

    Spartan Daily, November 1, 2006

    Get PDF
    Volume 127, Issue 38https://scholarworks.sjsu.edu/spartandaily/10296/thumbnail.jp

    Crowdfunding : psychological conditioning

    Get PDF
    "Crowdfunding" jest stosunkowo nowym pojęciem; to neologizm, który powstał w 2006 roku. Słowo składa się z dwóch terminów: crowd ("tłum") oraz funding ("finansowanie"). Crowdfunding funkcjonuje za pośrednictwem specjalnych platform i Internetu, wykorzystuje płatności online. Celem niniejszego artykułu jest zdefiniowanie crowdfundingu, a także opisanie jego modeli i wskazanie na motywacje psychologiczne związane z dziedziną crowdfundingu. Ponadto przedstawione zostały niektóre z ostatnich badań na jego temat, które wskazują na psychologiczne i socjologiczne determinanty zachowań w sieci.Crowdfunding is a relatively new term; it’s a neologism that has been brought to live in 2006. The word itself is a blend of two terms: ‘crowd’ and ‘funding’ and the background for that term is connected with ‘crowdsourcing’. Crowdfunding use special platforms, web and online payments. The aim of the paper is mainly related to defining crowdfunding, describing models of crowdfunding and indicating some of psychological motivations and conditions to operate in crowdfunding realm. The analysis provides a clear picture of crowdfunding models and psy- chological motivations to crowdfunding. What is more, some of the recent researches and case studies will be presented to show some of the particular crowdfunding activities

    The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps

    Get PDF
    Third party apps that work on top of personal cloud services such as Google Drive and Dropbox, require access to the user's data in order to provide some functionality. Through detailed analysis of a hundred popular Google Drive apps from Google's Chrome store, we discover that the existing permission model is quite often misused: around two thirds of analyzed apps are over-privileged, i.e., they access more data than is needed for them to function. In this work, we analyze three different permission models that aim to discourage users from installing over-privileged apps. In experiments with 210 real users, we discover that the most successful permission model is our novel ensemble method that we call Far-reaching Insights. Far-reaching Insights inform the users about the data-driven insights that apps can make about them (e.g., their topics of interest, collaboration and activity patterns etc.) Thus, they seek to bridge the gap between what third parties can actually know about users and users perception of their privacy leakage. The efficacy of Far-reaching Insights in bridging this gap is demonstrated by our results, as Far-reaching Insights prove to be, on average, twice as effective as the current model in discouraging users from installing over-privileged apps. In an effort for promoting general privacy awareness, we deploy a publicly available privacy oriented app store that uses Far-reaching Insights. Based on the knowledge extracted from data of the store's users (over 115 gigabytes of Google Drive data from 1440 users with 662 installed apps), we also delineate the ecosystem for third-party cloud apps from the standpoint of developers and cloud providers. Finally, we present several general recommendations that can guide other future works in the area of privacy for the cloud
    corecore