357 research outputs found
Visual Similarity Perception of Directed Acyclic Graphs: A Study on Influencing Factors
While visual comparison of directed acyclic graphs (DAGs) is commonly
encountered in various disciplines (e.g., finance, biology), knowledge about
humans' perception of graph similarity is currently quite limited. By graph
similarity perception we mean how humans perceive commonalities and differences
in graphs and herewith come to a similarity judgment. As a step toward filling
this gap the study reported in this paper strives to identify factors which
influence the similarity perception of DAGs. In particular, we conducted a
card-sorting study employing a qualitative and quantitative analysis approach
to identify 1) groups of DAGs that are perceived as similar by the participants
and 2) the reasons behind their choice of groups. Our results suggest that
similarity is mainly influenced by the number of levels, the number of nodes on
a level, and the overall shape of the graph.Comment: Graph Drawing 2017 - arXiv Version; Keywords: Graphs, Perception,
Similarity, Comparison, Visualizatio
Mesoscopic structure and social aspects of human mobility
The individual movements of large numbers of people are important in many
contexts, from urban planning to disease spreading. Datasets that capture human
mobility are now available and many interesting features have been discovered,
including the ultra-slow spatial growth of individual mobility. However, the
detailed substructures and spatiotemporal flows of mobility - the sets and
sequences of visited locations - have not been well studied. We show that
individual mobility is dominated by small groups of frequently visited,
dynamically close locations, forming primary "habitats" capturing typical daily
activity, along with subsidiary habitats representing additional travel. These
habitats do not correspond to typical contexts such as home or work. The
temporal evolution of mobility within habitats, which constitutes most motion,
is universal across habitats and exhibits scaling patterns both distinct from
all previous observations and unpredicted by current models. The delay to enter
subsidiary habitats is a primary factor in the spatiotemporal growth of human
travel. Interestingly, habitats correlate with non-mobility dynamics such as
communication activity, implying that habitats may influence processes such as
information spreading and revealing new connections between human mobility and
social networks.Comment: 7 pages, 5 figures (main text); 11 pages, 9 figures, 1 table
(supporting information
Universal features of correlated bursty behaviour
Inhomogeneous temporal processes, like those appearing in human
communications, neuron spike trains, and seismic signals, consist of
high-activity bursty intervals alternating with long low-activity periods. In
recent studies such bursty behavior has been characterized by a fat-tailed
inter-event time distribution, while temporal correlations were measured by the
autocorrelation function. However, these characteristic functions are not
capable to fully characterize temporally correlated heterogenous behavior. Here
we show that the distribution of the number of events in a bursty period serves
as a good indicator of the dependencies, leading to the universal observation
of power-law distribution in a broad class of phenomena. We find that the
correlations in these quite different systems can be commonly interpreted by
memory effects and described by a simple phenomenological model, which displays
temporal behavior qualitatively similar to that in real systems
Boundary work: An interpretive ethnographic perspective on negotiating and leveraging cross-cultural identity
The complexity of global organizations highlights the importance of membersâ ability to span diverse boundaries that may be defined by organization structures, national borders, and/or a variety of cultures associated with organization, nation-based societal and work cultures, industries, and/or professions. Based on ethnographic research in a JapanâUS binational firm, the paper describes and analyzes the boundary role performance of the firm\u27s Japanese members. It contributes toward theory on boundary spanning by introducing a âcultural identity negotiationâ conceptual framework. We show boundary spanning as a process shaped through the interplay of the contextual issues that make a boundary problematic; an individual\u27s multiple repertoires of cultural knowledge; and the individual boundary spanner\u27s ânegotiationâ, through interaction with others, of his/her cultural identities â the sense of âwho I amâ as a cultural being that is fundamental to an individual\u27s self-concept. At the same time, we make transparent the epistemological and methodological foundations of an interpretive ethnographic approach, demonstrating its value for understanding complex organizational processes. Research findings have practical implications for the selection and training of an organization\u27s employees, particularly of persons who may be considered âbiculturalâ
Emergence of scale-free close-knit friendship structure in online social networks
Despite the structural properties of online social networks have attracted
much attention, the properties of the close-knit friendship structures remain
an important question. Here, we mainly focus on how these mesoscale structures
are affected by the local and global structural properties. Analyzing the data
of four large-scale online social networks reveals several common structural
properties. It is found that not only the local structures given by the
indegree, outdegree, and reciprocal degree distributions follow a similar
scaling behavior, the mesoscale structures represented by the distributions of
close-knit friendship structures also exhibit a similar scaling law. The degree
correlation is very weak over a wide range of the degrees. We propose a simple
directed network model that captures the observed properties. The model
incorporates two mechanisms: reciprocation and preferential attachment. Through
rate equation analysis of our model, the local-scale and mesoscale structural
properties are derived. In the local-scale, the same scaling behavior of
indegree and outdegree distributions stems from indegree and outdegree of nodes
both growing as the same function of the introduction time, and the reciprocal
degree distribution also shows the same power-law due to the linear
relationship between the reciprocal degree and in/outdegree of nodes. In the
mesoscale, the distributions of four closed triples representing close-knit
friendship structures are found to exhibit identical power-laws, a behavior
attributed to the negligible degree correlations. Intriguingly, all the
power-law exponents of the distributions in the local-scale and mesoscale
depend only on one global parameter -- the mean in/outdegree, while both the
mean in/outdegree and the reciprocity together determine the ratio of the
reciprocal degree of a node to its in/outdegree.Comment: 48 pages, 34 figure
Tag-Aware Recommender Systems: A State-of-the-art Survey
In the past decade, Social Tagging Systems have attracted increasing
attention from both physical and computer science communities. Besides the
underlying structure and dynamics of tagging systems, many efforts have been
addressed to unify tagging information to reveal user behaviors and
preferences, extract the latent semantic relations among items, make
recommendations, and so on. Specifically, this article summarizes recent
progress about tag-aware recommender systems, emphasizing on the contributions
from three mainstream perspectives and approaches: network-based methods,
tensor-based methods, and the topic-based methods. Finally, we outline some
other tag-related works and future challenges of tag-aware recommendation
algorithms.Comment: 19 pages, 3 figure
PageRank without hyperlinks: Reranking with PubMed related article networks for biomedical text retrieval
Graph analysis algorithms such as PageRank and HITS have been successful in Web environments because they are able to extract important inter-document relationships from manually-created hyperlinks. We consider the application of these algorithms to related document networks comprised of automatically-generated content-similarity links. Specifically, this work tackles the problem of document retrieval in the biomedical domain, in the context of the PubMed search engine. A series of reranking experiments demonstrate that incorporating evidence extracted from link structure yields significant improvements in terms of standard ranked retrieval metrics. These results extend the applicability of link analysis algorithms to different environments
An algorithm for network-based gene prioritization that encodes knowledge both in nodes and in links
Background: Candidate gene prioritization aims to identify promising new genes associated with a disease or a biological process from a larger set of candidate genes. In recent years, network-based methods - which utilize a knowledge network derived from biological knowledge - have been utilized for gene prioritization. Biological knowledge can be encoded either through the network's links or nodes. Current network-based methods can only encode knowledge through links. This paper describes a new network-based method that can encode knowledge in links as well as in nodes. Results: We developed a new network inference algorithm called the Knowledge Network Gene Prioritization (KNGP) algorithm which can incorporate both link and node knowledge. The performance of the KNGP algorithm was evaluated on both synthetic networks and on networks incorporating biological knowledge. The results showed that the combination of link knowledge and node knowledge provided a significant benefit across 19 experimental diseases over using link knowledge alone or node knowledge alone. Conclusions: The KNGP algorithm provides an advance over current network-based algorithms, because the algorithm can encode both link and node knowledge. We hope the algorithm will aid researchers with gene prioritization. © 2013 Kimmel, Visweswaran
Geotag Propagation with User Trust Modeling
The amount of information that people share on social networks is constantly increasing. People also comment, annotate, and tag their own content (videos, photos, notes, etc.), as well as the content of others. In many cases, the content is tagged manually. One way to make this time-consuming manual tagging process more efficient is to propagate tags from a small set of tagged images to the larger set of untagged images automatically. In such a scenario, however, a wrong or a spam tag can damage the integrity and reliability of the automated propagation system. Users may make mistakes in tagging, or irrelevant tags and content may be added maliciously for advertisement or self-promotion. Therefore, a certain mechanism insuring the trustworthiness of users or published content is needed. In this chapter, we discuss several image retrieval methods based on tags, various approaches to trust modeling and spam protection in social networks, and trust modeling in geotagging systems. We then consider a specific example of automated geotag propagation system that adopts a user trust model. The tag propagation in images relies on the similarity between image content (famous landmarks) and its context (associated geotags). For each tagged image, similar untagged images are found by the robust graph-based object duplicate detection and the known tags are propagated accordingly. The user trust value is estimated based on a social feedback from the users of the photo-sharing system and only tags from trusted users are propagated. This approach demonstrates that a practical tagging system significantly benefits from the intelligent combination of efficient propagation algorithm and a user-centered trust model
- âŠ