613 research outputs found

    Semantic-driven matchmaking of web services using case-based reasoning

    Get PDF
    With the rapid proliferation of Web services as the medium of choice to securely publish application services beyond the firewall, the importance of accurate, yet flexible matchmaking of similar services gains importance both for the human user and for dynamic composition engines. In this paper, we present a novel approach that utilizes the case based reasoning methodology for modelling dynamic Web service discovery and matchmaking. Our framework considers Web services execution experiences in the decision making process and is highly adaptable to the service requester constraints. The framework also utilises OWL semantic descriptions extensively for implementing both the components of the CBR engine and the matchmaking profile of the Web services

    Electrophoretic separation of human kidney cells at zero gravity

    Get PDF
    Electrophoretic isolation of cells results in a loss of resolution power caused by the sedimentation of the cells in the media. The results of an experiment to extract urokinase from human embryos during the Apollo Soyuz mission are presented and discussed

    Geometric Aspects of Ambrosetti-Prodi operators with Lipschitz nonlinearities

    Full text link
    For Dirichlet boundary conditions on a bounded domain, what happens to the critical set of the Ambrosetti-Prodi operator if the nonlinearity is only a Lipschitz map? It turns out that many properties which hold in the smooth case are preserved, despite of the fact that the operator is not even differentiable at some points. In particular, a global Lyapunov-Schmidt decomposition of great convenience for numerical inversion is still available

    Reproducing, Extending, and Analyzing Naming Experiments

    Full text link
    Naming is very important in software development, as names are often the only vehicle of meaning about what the code is intended to do. A recent study on how developers choose names collected the names given by different developers for the same objects. This enabled a study of these names' diversity and structure, and the construction of a model of how names are created. We reproduce different parts of this study in three independent experiments. Importantly, we employ methodological variations rather than striving of an exact replication. When the same results are obtained this then boosts our confidence in their validity by demonstrating that they do not depend on the methodology. Our results indeed corroborate those of the original study in terms of the diversity of names, the low probability of two developers choosing the same name, and the finding that experienced developers tend to use slightly longer names than inexperienced students. We explain name diversity by performing a new analysis of the names, classifying the concepts represented in them as universal (agreed upon), alternative (reflecting divergent views on a topic), or optional (reflecting divergent opinions on whether to include this concept at all). This classification enables new research directions concerning the considerations involved in naming decisions. We also show that explicitly using the model proposed in the original study to guide naming leads to the creation of better names, whereas the simpler approach of just asking participants to use longer and more detailed names does not.Comment: 35 pages with 10 figures and 6 table

    Quantifying the Advantage of Looking Forward

    Get PDF
    We introduce a future orientation index to quantify the degree to which Internet users worldwide seek more information about years in the future than years in the past. We analyse Google logs and find a striking correlation between the country's GDP and the predisposition of its inhabitants to look forward

    Sustaining the Internet with Hyperbolic Mapping

    Full text link
    The Internet infrastructure is severely stressed. Rapidly growing overheads associated with the primary function of the Internet---routing information packets between any two computers in the world---cause concerns among Internet experts that the existing Internet routing architecture may not sustain even another decade. Here we present a method to map the Internet to a hyperbolic space. Guided with the constructed map, which we release with this paper, Internet routing exhibits scaling properties close to theoretically best possible, thus resolving serious scaling limitations that the Internet faces today. Besides this immediate practical viability, our network mapping method can provide a different perspective on the community structure in complex networks

    Forecasting in the light of Big Data

    Get PDF
    Predicting the future state of a system has always been a natural motivation for science and practical applications. Such a topic, beyond its obvious technical and societal relevance, is also interesting from a conceptual point of view. This owes to the fact that forecasting lends itself to two equally radical, yet opposite methodologies. A reductionist one, based on the first principles, and the naive inductivist one, based only on data. This latter view has recently gained some attention in response to the availability of unprecedented amounts of data and increasingly sophisticated algorithmic analytic techniques. The purpose of this note is to assess critically the role of big data in reshaping the key aspects of forecasting and in particular the claim that bigger data leads to better predictions. Drawing on the representative example of weather forecasts we argue that this is not generally the case. We conclude by suggesting that a clever and context-dependent compromise between modelling and quantitative analysis stands out as the best forecasting strategy, as anticipated nearly a century ago by Richardson and von Neumann

    Structure and tie strengths in mobile communication networks

    Full text link
    Electronic databases, from phone to emails logs, currently provide detailed records of human communication patterns, offering novel avenues to map and explore the structure of social and communication networks. Here we examine the communication patterns of millions of mobile phone users, allowing us to simultaneously study the local and the global structure of a society-wide communication network. We observe a coupling between interaction strengths and the network's local structure, with the counterintuitive consequence that social networks are robust to the removal of the strong ties, but fall apart following a phase transition if the weak ties are removed. We show that this coupling significantly slows the diffusion process, resulting in dynamic trapping of information in communities, and find that when it comes to information diffusion, weak and strong ties are both simultaneously ineffective.Comment: 30 pages (manuscript + supplementary material), 11 figure

    Analyzing Users' Activity in On-line Social Networks over Time through a Multi-Agent Framework

    Full text link
    [EN] The number of people and organizations using online social networks as a new way of communication is continually increasing. Messages that users write in networks and their interactions with other users leave a digital trace that is recorded. In order to understand what is going on in these virtual environments, it is necessary systems that collect, process, and analyze the information generated. The majority of existing tools analyze information related to an online event once it has finished or in a specific point of time (i.e., without considering an in-depth analysis of the evolution of users activity during the event). They focus on an analysis based on statistics about the quantity of information generated in an event. In this article, we present a multi-agent system that automates the process of gathering data from users activity in social networks and performs an in-depth analysis of the evolution of social behavior at different levels of granularity in online events based on network theory metrics. We evaluated its functionality analyzing users activity in events on Twitter.This work is partially supported by the PROME-TEOII/2013/019, TIN2014-55206-R, TIN2015-65515-C4-1-R, H2020-ICT-2015-688095.Del Val Noguera, E.; MartĂ­nez, C.; Botti, V. (2016). Analyzing Users' Activity in On-line Social Networks over Time through a Multi-Agent Framework. Soft Computing. 20(11):4331-4345. https://doi.org/10.1007/s00500-016-2301-0S433143452011Ahn Y-Y, Han S, Kwak H, Moon S, Jeong H (2007) Analysis of topological characteristics of huge online social networking services. In: Proceedings of the 16th WWW, pp 835–844Bastiaensens S, Vandebosch H, Poels K, Cleemput KV, DeSmet A, Bourdeaudhuij ID (2014) Cyberbullying on social network sites. an experimental study into behavioural intentions to help the victim or reinforce the bully. Comput Hum Behav 31:259–271Benevenuto F, Rodrigues T, Cha M, Almeida V (2009) Characterizing user behavior in online social networks. In: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. ACM, pp 49–62Borge-Holthoefer J, Rivero A, GarcĂ­a I, CauhĂ© E, Ferrer A, Ferrer D, Francos D, Iñiguez D, PĂ©rez MP, Ruiz G et al (2011) Structural and dynamical patterns on online social networks: the Spanish may 15th movement as a case study. PLoS One 6(8):e23883Borondo J, Morales AJ, Losada JC, Benito RM (2013) Characterizing and modeling an electoral campaign in the context of Twitter: 2011 Spanish presidential election as a case studyCatanese SA, De Meo P, Ferrara E, Fiumara G, Provetti A (2011) Crawling facebook for social network analysis purposes. In: Proceedings of the international conference on web intelligence, mining and semantics. ACM, p 52Cha M, Mislove A, Gummadi KP (2009) A measurement-driven analysis of information propagation in the flickr social network. In: Proceedings of the 18th international conference on World Wide Web. ACM, pp 721–730del Val E, MartĂ­nez C, Botti V (2015a) A multi-agent framework for the analysis of users behavior over time in on-line social networks. In: 10th International conference on soft computing models in industrial and environmental applications. Springer, Berlin, pp 191–201del Val E, Rebollo M, Botti V (2015b) Does the type of event influence how user interactions evolve on twitter? PLOS One 10(5):e0124049Eurostat (2016a) Internet use statistics—individuals. http://ec.europa.eu/eurostat/statistics-explained/index.php/Internet_use_statistics_-_individuals . Accessed 29 April 2016Eurostat (2016b) Social media—statistics on the use by enterprises. http://ec.europa.eu/eurostat/statistics-explained/index.php/Social_media_-_statistics_on_the_use_by_enterprises#Further_Eurostat_information . Accessed 29 April 2016GarcĂ­a Fornes AM, Rodrigo Solaz M, Terrasa Barrena AM, Inglada J, Javier V, Jorge Cano J, Mulet Mengual L, Palomares Chust A, BĂșrdalo Rapa LA, Giret Boggino AS et al (2015) Magentix 2 user’s manualGolbeck J, Robles C, Turner K (2011) Predicting personality with social media. In: CHI’11, pp 253–262GuimerĂ  R, Llorente A, Moro E, Sales-Pardo M (2012) Predicting human preferences using the block structure of complex social networks. PloS One 7(9):e44620Huberman BA, Romero DM, Wu F (2008) Social networks that matter: Twitter under the microscope. arXiv preprint arXiv:0812.1045Jamali M, Abolhassani H (2006) Different aspects of social network analysis. In: 2006 IEEE/WIC/ACM international conference on web intelligence (WI 2006 main conference proceedings)(WI’06). IEEE, pp 66–72Jiang Y, Jiang J (2014) Understanding social networks from a multiagent perspective. Parallel Distrib Syst IEEE Trans 25(10):2743–2759Kossinets G, Watts D (2006) Empirical analysis of an evolving social network. Science 311(5757):88–90Kumar R, Novak J, Tomkins A (2010) Structure and evolution of online social networks. In: Yu PS, Han J, Faloutsos C (eds) Link mining: models, algorithms, and applications. Springer, New York, pp 337–357Lazer D (2009) Life in the network: the coming age of computational social science. Science 323(5915):721–723Leskovec J, Adamic LA, Huberman BA (2007) The dynamics of viral marketing. ACM Trans Web 1(1):5Licoppe C, Smoreda Z (2005) Are social networks technologically embedded? How networks are changing today with changes in communication technology. Soc Netw 27(4):317–335Lotan G, Graeff E, Ananny M, Gaffney D, Pearce I, Boyd D (2011) The revolutions were tweeted: information flows during the 2011 tunisian and egyptian revolutions. Int J Commun 5:1375–1405Peña-LĂłpez I, Congosto M, AragĂłn P (2013) Spanish indignados and the evolution of 15M: towards networked para-institutions. Big data: challenges and opportunities, pp 25–26Perliger A, Pedahzur A (2011) Social network analysis in the study of terrorism and political violence. PS Polit Sci Polit 44:45–50Romero DM, Galuba W, Asur S, Huberman BA (2011a) Influence and passivity in social media. In: Proceedings of the 20th WWW, pp 113–114Romero DM, Meeder B, Kleinberg J (2011b) Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on Twitter. In: Proceedings of the 20th WWW, pp 695–704Stockman FN, Doreian P, (1997) Evolution of social networks: processes and principles. In: Doreian P, Stokman FN (eds) Evolution of social networks. Routledge, London, pp 233–250Traud AL, Mucha PJ, Porter MA (2012) Social structure of facebook networks. Phys A Stat Mech Its Appl 391(16):4165–4180Ugander J, Karrer B, Backstrom L, Marlow C (2011) The anatomy of the Facebook social graph. arXiv preprint arXiv:1111.4503Valero S, del Val E, Alemany J, Botti V (2015) Using magentix2 in smart-home environments. In: 10th International conference on soft computing models in industrial and environmental applications. Springer, Berlin, pp 27–37Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, CambridgeWersm (2015) How much data is generated every minute on social media? http://wersm.com/how-much-data-is-generated-every-minute-on-social-media/ . Accessed 29 April 201

    Does \u2018bigger\u2019mean \u2018better\u2019? Pitfalls and shortcuts associated with big data for social research

    Get PDF
    \u2018Big data is here to stay.\u2019 This key statement has a double value: is an assumption as well as the reason why a theoretical reflection is needed. Furthermore, Big data is something that is gaining visibility and success in social sciences even, overcoming the division between humanities and computer sciences. In this contribution some considerations on the presence and the certain persistence of Big data as a socio-technical assemblage will be outlined. Therefore, the intriguing opportunities for social research linked to such interaction between practices and technological development will be developed. However, despite a promissory rhetoric, fostered by several scholars since the birth of Big data as a labelled concept, some risks are just around the corner. The claims for the methodological power of bigger and bigger datasets, as well as increasing speed in analysis and data collection, are creating a real hype in social research. Peculiar attention is needed in order to avoid some pitfalls. These risks will be analysed for what concerns the validity of the research results \u2018obtained through Big data. After a pars distruens, this contribution will conclude with a pars construens; assuming the previous critiques, a mixed methods research design approach will be described as a general proposal with the objective of stimulating a debate on the integration of Big data in complex research projecting
    • 

    corecore