4,827 research outputs found
Parallel distributed algorithms of the beta-model of the small world graphs
The research goal is to develop a large-scale agent-based simulation environment to support implementations of Internet simulation applications.The Small Worlds (SW) graphs are used to model Web sites and social networks of Internet users. Each vertex represents the identity of a simple agent. In order to cope with scalability issues, we have to consider distributed parallel
processing. The focus of this paper is to present two parallel-distributed algorithms for the construction of a particular type of SW graph called Beta-model. The first algorithm serializes the graph construction, while the second constructs the graph in parallel
Recommended from our members
Representing chord sequences in OWL
Chord symbols and progressions are a common way to describe musical harmony. In this paper we present SEQ, a pattern representation using the Web Ontology Language OWL DL and its application to modelling chord sequences. SEQ provides a logical representation of order information, which is not available directly in OWL DL, together with an intuitive notation. It therefore allows the use of OWL reasoners for tasks such as classification of sequences by patterns and determining subsumption relationships between the patterns. The SEQ representation is used to express distinctive pattern obtained using data mining of multiple viewpoints of chord sequences
Recommended from our members
Harmony and Technology Enhanced Learning
New technologies offer rich opportunities to support education in harmony. In this chapter we consider theoretical perspectives and underlying principles behind technologies for learning and teaching harmony. Such perspectives help in matching existing and future technologies to educational purposes, and to inspire the creative re-appropriation of technologies
Spartan Daily, November 1, 2006
Volume 127, Issue 38https://scholarworks.sjsu.edu/spartandaily/10296/thumbnail.jp
Crowdfunding : psychological conditioning
"Crowdfunding" jest stosunkowo nowym pojęciem; to neologizm, który powstał w 2006 roku. Słowo składa się z dwóch terminów: crowd ("tłum") oraz funding ("finansowanie"). Crowdfunding funkcjonuje za pośrednictwem specjalnych platform i Internetu, wykorzystuje płatności online. Celem niniejszego artykułu jest zdefiniowanie crowdfundingu, a także opisanie jego modeli i wskazanie na motywacje psychologiczne związane z dziedziną crowdfundingu. Ponadto przedstawione zostały niektóre z ostatnich badań na jego temat, które wskazują na psychologiczne i socjologiczne determinanty zachowań w sieci.Crowdfunding is a relatively new term; it’s a neologism that has been brought to live in 2006. The word itself is a blend of two terms: ‘crowd’ and ‘funding’ and the background for that term is connected with ‘crowdsourcing’. Crowdfunding use special platforms, web and online payments. The aim of the paper is mainly related to defining crowdfunding, describing models of crowdfunding and indicating some of psychological motivations and conditions to operate in crowdfunding realm. The analysis provides a clear picture of crowdfunding models and psy- chological motivations to crowdfunding. What is more, some of the recent researches and case studies will be presented to show some of the particular crowdfunding activities
The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps
Third party apps that work on top of personal cloud services such as Google
Drive and Dropbox, require access to the user's data in order to provide some
functionality. Through detailed analysis of a hundred popular Google Drive apps
from Google's Chrome store, we discover that the existing permission model is
quite often misused: around two thirds of analyzed apps are over-privileged,
i.e., they access more data than is needed for them to function. In this work,
we analyze three different permission models that aim to discourage users from
installing over-privileged apps. In experiments with 210 real users, we
discover that the most successful permission model is our novel ensemble method
that we call Far-reaching Insights. Far-reaching Insights inform the users
about the data-driven insights that apps can make about them (e.g., their
topics of interest, collaboration and activity patterns etc.) Thus, they seek
to bridge the gap between what third parties can actually know about users and
users perception of their privacy leakage. The efficacy of Far-reaching
Insights in bridging this gap is demonstrated by our results, as Far-reaching
Insights prove to be, on average, twice as effective as the current model in
discouraging users from installing over-privileged apps. In an effort for
promoting general privacy awareness, we deploy a publicly available privacy
oriented app store that uses Far-reaching Insights. Based on the knowledge
extracted from data of the store's users (over 115 gigabytes of Google Drive
data from 1440 users with 662 installed apps), we also delineate the ecosystem
for third-party cloud apps from the standpoint of developers and cloud
providers. Finally, we present several general recommendations that can guide
other future works in the area of privacy for the cloud
- …