1,474 research outputs found

    The diffusion of IP telephony and vendors' commercialisation strategies

    Get PDF
    This is a post-peer-review, pre-copyedit version of an article published in the Journal of Information Technology. The definitive publisher-authenticated version is available at the link below.The Internet telephony (IP telephony) has been presented as a technology that can replace existing fixed-line services and disrupt the telecommunications industry by offering new low-priced services. This study investigates the diffusion of IP telephony in Denmark by focusing on vendors’ commercialisation strategies. The theory of disruptive innovation is introduced to investigate vendors’ perceptions about IP telephony and explore their strategies that affect the diffusion process in the residential market. The analysis is based on interview data collected from the key market players. The study's findings suggest that IP telephony is treated as a sustaining innovation that goes beyond the typical voice transmission and enables provision of advanced services such as video telephony

    Nontangential limits and Fatou-type theorems on post-critically finite self-similar sets

    Full text link
    In this paper we study the boundary limit properties of harmonic functions on R+×K\mathbb R_+\times K, the solutions u(t,x)u(t,x) to the Poisson equation 2ut2+Δu=0, \frac{\partial^2 u}{\partial t^2} + \Delta u = 0, where KK is a p.c.f. set and Δ\Delta its Laplacian given by a regular harmonic structure. In particular, we prove the existence of nontangential limits of the corresponding Poisson integrals, and the analogous results of the classical Fatou theorems for bounded and nontangentially bounded harmonic functions.Comment: 22 page

    Semi-supervised prediction of protein interaction sentences exploiting semantically encoded metrics

    Get PDF
    Protein-protein interaction (PPI) identification is an integral component of many biomedical research and database curation tools. Automation of this task through classification is one of the key goals of text mining (TM). However, labelled PPI corpora required to train classifiers are generally small. In order to overcome this sparsity in the training data, we propose a novel method of integrating corpora that do not contain relevance judgements. Our approach uses a semantic language model to gather word similarity from a large unlabelled corpus. This additional information is integrated into the sentence classification process using kernel transformations and has a re-weighting effect on the training features that leads to an 8% improvement in F-score over the baseline results. Furthermore, we discover that some words which are generally considered indicative of interactions are actually neutralised by this process

    Extremism propagation in social networks with hubs

    No full text
    One aspect of opinion change that has been of academic interest is the impact of people with extreme opinions (extremists) on opinion dynamics. An agent-based model has been used to study the role of small-world social network topologies on general opinion change in the presence of extremists. It has been found that opinion convergence to a single extreme occurs only when the average number of network connections for each individual is extremely high. Here, we extend the model to examine the effect of positively skewed degree distributions, in addition to small-world structures, on the types of opinion convergence that occur in the presence of extremists. We also examine what happens when extremist opinions are located on the well-connected nodes (hubs) created by the positively skewed distribution. We find that a positively skewed network topology encourages opinion convergence on a single extreme under a wider range of conditions than topologies whose degree distributions were not skewed. The importance of social position for social influence is highlighted by the result that, when positive extremists are placed on hubs, all population convergence is to the positive extreme even when there are twice as many negative extremists. Thus, our results have shown the importance of considering a positively skewed degree distribution, and in particular network hubs and social position, when examining extremist transmission

    Emergence of influential spreaders in modified rumor models

    Full text link
    The burst in the use of online social networks over the last decade has provided evidence that current rumor spreading models miss some fundamental ingredients in order to reproduce how information is disseminated. In particular, recent literature has revealed that these models fail to reproduce the fact that some nodes in a network have an influential role when it comes to spread a piece of information. In this work, we introduce two mechanisms with the aim of filling the gap between theoretical and experimental results. The first model introduces the assumption that spreaders are not always active whereas the second model considers the possibility that an ignorant is not interested in spreading the rumor. In both cases, results from numerical simulations show a higher adhesion to real data than classical rumor spreading models. Our results shed some light on the mechanisms underlying the spreading of information and ideas in large social systems and pave the way for more realistic diffusion models.Comment: 14 Pages, 6 figures, accepted for publication in Journal of Statistical Physic

    Studying Paths of Participation in Viral Diffusion Process

    Full text link
    Authors propose a conceptual model of participation in viral diffusion process composed of four stages: awareness, infection, engagement and action. To verify the model it has been applied and studied in the virtual social chat environment settings. The study investigates the behavioral paths of actions that reflect the stages of participation in the diffusion and presents shortcuts, that lead to the final action, i.e. the attendance in a virtual event. The results show that the participation in each stage of the process increases the probability of reaching the final action. Nevertheless, the majority of users involved in the virtual event did not go through each stage of the process but followed the shortcuts. That suggests that the viral diffusion process is not necessarily a linear sequence of human actions but rather a dynamic system.Comment: In proceedings of the 4th International Conference on Social Informatics, SocInfo 201

    Dilogarithm Identities in Conformal Field Theory and Group Homology

    Full text link
    Recently, Rogers' dilogarithm identities have attracted much attention in the setting of conformal field theory as well as lattice model calculations. One of the connecting threads is an identity of Richmond-Szekeres that appeared in the computation of central charges in conformal field theory. We show that the Richmond-Szekeres identity and its extension by Kirillov-Reshetikhin can be interpreted as a lift of a generator of the third integral homology of a finite cyclic subgroup sitting inside the projective special linear group of all 2×22 \times 2 real matrices viewed as a {\it discrete} group. This connection allows us to clarify a few of the assertions and conjectures stated in the work of Nahm-Recknagel-Terhoven concerning the role of algebraic KK-theory and Thurston's program on hyperbolic 3-manifolds. Specifically, it is not related to hyperbolic 3-manifolds as suggested but is more appropriately related to the group manifold of the universal covering group of the projective special linear group of all 2×22 \times 2 real matrices viewed as a topological group. This also resolves the weaker version of the conjecture as formulated by Kirillov. We end with the summary of a number of open conjectures on the mathematical side.Comment: 20 pages, 2 figures not include
    corecore