首页 > 最新文献

2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)最新文献

英文 中文
Is ARPU1; the right choice for wireless data-based communication services? ARPU1;无线数据通信服务的正确选择是什么?
S. Park, J. Kwak, B. Lee
Communication services based on wireless data, such as Social Network Service (SNS) and Mobile Instant Messenger (MIM), developed rapidly with the advent of communication networks and smartphones. As SNS and MIM gradually replace voice and Short Message Service (SMS) communication, the revenue structures of mobile carriers also change into data. Although mobile carriers are still measuring their revenues using voice-based indices such as Average Revenue Per User (ARPU). The use of accurate indices and measurement is important, since revenue measurement determines the future developmental direction of businesses and industries. Therefore, this study analyzes changes in revenue sources in this age of data, the utility of ARPU, and the standards for data-based revenue calculations. The analysis shows that the utility of ARPU is very low, since it cannot reflect the growth of data services and the existence of multiple subscribers. Also, it was identified that services and subscribers should be redefined in consideration of data revenues. The results of the study propose measurement factors considering data-based revenue, which could be referred as standards for measuring diverse revenues.
随着通信网络和智能手机的出现,以无线数据为基础的社交网络服务(SNS)、移动即时通讯(MIM)等通信业务得到了迅速发展。随着SNS和MIM逐渐取代语音和短信通信,移动运营商的收入结构也向数据转变。尽管移动运营商仍然使用基于语音的指标,如每用户平均收益(ARPU)来衡量他们的收入。使用准确的指标和衡量是很重要的,因为收入衡量决定了企业和行业未来的发展方向。因此,本研究分析了数据时代收益来源的变化、ARPU的效用以及基于数据的收益计算标准。分析表明,ARPU的效用很低,因为它不能反映数据业务的增长和多个用户的存在。此外,还确定应根据数据收入重新定义服务和订户。研究结果提出了考虑基于数据的收入的衡量因素,可作为衡量不同收入的标准。
{"title":"Is ARPU1; the right choice for wireless data-based communication services?","authors":"S. Park, J. Kwak, B. Lee","doi":"10.1109/CASoN.2012.6412382","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412382","url":null,"abstract":"Communication services based on wireless data, such as Social Network Service (SNS) and Mobile Instant Messenger (MIM), developed rapidly with the advent of communication networks and smartphones. As SNS and MIM gradually replace voice and Short Message Service (SMS) communication, the revenue structures of mobile carriers also change into data. Although mobile carriers are still measuring their revenues using voice-based indices such as Average Revenue Per User (ARPU). The use of accurate indices and measurement is important, since revenue measurement determines the future developmental direction of businesses and industries. Therefore, this study analyzes changes in revenue sources in this age of data, the utility of ARPU, and the standards for data-based revenue calculations. The analysis shows that the utility of ARPU is very low, since it cannot reflect the growth of data services and the existence of multiple subscribers. Also, it was identified that services and subscribers should be redefined in consideration of data revenues. The results of the study propose measurement factors considering data-based revenue, which could be referred as standards for measuring diverse revenues.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132766041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance of Modified Iterative Decoding Algorithm for Multilevel codes 改进迭代译码算法的多电平译码性能
Atta-ur-Rahman
In this paper, performance of Modified Iterative Decoding Algorithm (MIDA) is investigated for decoding of Multi-level codes. MIDA is a hard decision decoder that was initially proposed for decoding of Product codes, by same authors. In this paper same concept is being extended for Multi-level codes. The basic iterative decoder has a huge complexity which is unaffordable for long constituent codes especially when used in real time systems. In MIDA, the idea of Syndrome Decoding is used for search space reduction. Moreover, it is found that complexity reduction factor increases with each iteration. The worst case complexity of MIDA is closed to that of basic algorithm but in average case there is huge reduction in complexity, with negligible performance degradation. Performance of the proposed algorithm is investigated over an OFDM system. Additive White Gaussian Noise (AWGN) channel and Rayleigh fading channel are used for simulations.
本文研究了改进迭代译码算法(MIDA)在多级码译码中的性能。MIDA是一种硬决策解码器,最初由同一作者提出用于解码产品代码。本文将这一概念推广到多级码。基本的迭代解码器具有巨大的复杂性,特别是在实时系统中使用时,难以承受长组成码。在MIDA中,使用了综合征解码的思想来减少搜索空间。此外,发现复杂度降低因子随迭代次数的增加而增加。在最坏情况下,MIDA算法的复杂度接近于基本算法,但在平均情况下,其复杂度大大降低,而性能下降可以忽略不计。在OFDM系统中研究了该算法的性能。采用加性高斯白噪声信道和瑞利衰落信道进行仿真。
{"title":"Performance of Modified Iterative Decoding Algorithm for Multilevel codes","authors":"Atta-ur-Rahman","doi":"10.1109/CASoN.2012.6412385","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412385","url":null,"abstract":"In this paper, performance of Modified Iterative Decoding Algorithm (MIDA) is investigated for decoding of Multi-level codes. MIDA is a hard decision decoder that was initially proposed for decoding of Product codes, by same authors. In this paper same concept is being extended for Multi-level codes. The basic iterative decoder has a huge complexity which is unaffordable for long constituent codes especially when used in real time systems. In MIDA, the idea of Syndrome Decoding is used for search space reduction. Moreover, it is found that complexity reduction factor increases with each iteration. The worst case complexity of MIDA is closed to that of basic algorithm but in average case there is huge reduction in complexity, with negligible performance degradation. Performance of the proposed algorithm is investigated over an OFDM system. Additive White Gaussian Noise (AWGN) channel and Rayleigh fading channel are used for simulations.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123920602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Social media in the context of academic marketing: Case study: Evaluation of the Umwelt-Campus campaign 学术营销背景下的社交媒体:案例研究:Umwelt-Campus活动的评价
Lisa Ziemer, Tina Stahlschmidt, Norbert Kuhn
Recently, more and more German universities have decided to pursue an active marketing strategy for student recruitment. Given the fact that the target group of these marketing efforts, i.e. potential students, belong to the generation of so-called "digital natives“, it seems indisputable that the integration of social media channels in academic marketing campaigns is indispensable. German institutions of higher education have increasingly been acknowledging this trend by creating official profiles on Twitter, Facebook, and YouTube or by hosting a blog. Looking at this process from a longterm perspective, this should be considered as a first phase. As online activities are becoming more professional and habitual, a second phase has to be initiated: monitoring and evaluation. In this paper we present the results of the evaluation of a university social media marketing campaign, namely the campaign of our university, which was launched in May 2011. Now, seven months later we carried out a survey among new students to evaluate their acceptance, feedback and interaction. In this paper we discuss how the use and requirements of participants have changed over just a few months, as well as how different platforms serve different needs and target groups. In addition, we will argue that continuous monitoring and analysis of social media activities and usage is essential when carrying out successful academic marketing.
最近,越来越多的德国大学决定在招生时采取积极的营销策略。鉴于这些营销努力的目标群体,即潜在的学生,属于所谓的“数字原住民”一代,在学术营销活动中整合社交媒体渠道是不可或缺的,这似乎是不争的事实。德国高等教育机构越来越多地认识到这一趋势,他们在Twitter、Facebook和YouTube上创建官方档案,或者开设博客。从长远的角度来看,这应该被视为第一阶段。随着在线活动变得越来越专业和习惯,必须启动第二阶段:监测和评估。在本文中,我们展示了对一所大学社交媒体营销活动的评估结果,即我校于2011年5月启动的活动。现在,七个月后,我们在新生中进行了一项调查,评估他们的接受程度、反馈和互动。在本文中,我们讨论了参与者的使用和需求在短短几个月内是如何变化的,以及不同的平台如何服务于不同的需求和目标群体。此外,我们将认为,在进行成功的学术营销时,持续监测和分析社交媒体活动和使用情况是必不可少的。
{"title":"Social media in the context of academic marketing: Case study: Evaluation of the Umwelt-Campus campaign","authors":"Lisa Ziemer, Tina Stahlschmidt, Norbert Kuhn","doi":"10.1109/CASoN.2012.6412396","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412396","url":null,"abstract":"Recently, more and more German universities have decided to pursue an active marketing strategy for student recruitment. Given the fact that the target group of these marketing efforts, i.e. potential students, belong to the generation of so-called \"digital natives“, it seems indisputable that the integration of social media channels in academic marketing campaigns is indispensable. German institutions of higher education have increasingly been acknowledging this trend by creating official profiles on Twitter, Facebook, and YouTube or by hosting a blog. Looking at this process from a longterm perspective, this should be considered as a first phase. As online activities are becoming more professional and habitual, a second phase has to be initiated: monitoring and evaluation. In this paper we present the results of the evaluation of a university social media marketing campaign, namely the campaign of our university, which was launched in May 2011. Now, seven months later we carried out a survey among new students to evaluate their acceptance, feedback and interaction. In this paper we discuss how the use and requirements of participants have changed over just a few months, as well as how different platforms serve different needs and target groups. In addition, we will argue that continuous monitoring and analysis of social media activities and usage is essential when carrying out successful academic marketing.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125918479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A look at hidden web pages in Italian public administrations 意大利公共行政部门的隐藏网页
E. Sorio, Alberto Bartoli, Eric Medvet
Preventing illegitimate modifications to web sites offering a public service is a fundamental requirement of any e-government initiative. Unfortunately, attacks to web sites resulting in the creation of fraudulent content by hackers are ubiquitous. In this work we attempted to assess the ability of Italian public administrations to be in full control of the respective web sites. We examined several thousands sites, including all local governments and universities, and found that approximately 1.5% of the analyzed sites serves contents that admittedly is not supposed to be there. Although these contents do not constitute an immediate threat to citizens, this result does not seem very encouraging also because our methodology leads to very conservative estimates. We believe that our analysis allows gaining useful insights into this novel and peculiar threat.
防止对提供公共服务的网站进行非法修改是任何电子政务计划的基本要求。不幸的是,黑客对网站的攻击导致了虚假内容的产生,这种情况无处不在。在这项工作中,我们试图评估意大利公共行政部门完全控制各自网站的能力。我们检查了数千个网站,包括所有的地方政府和大学,发现大约1.5%的被分析网站提供了不该有的内容。虽然这些内容并不对公民构成直接威胁,但这一结果似乎并不十分令人鼓舞,因为我们的方法得出的估计非常保守。我们相信,我们的分析可以让我们对这种新奇而独特的威胁获得有用的见解。
{"title":"A look at hidden web pages in Italian public administrations","authors":"E. Sorio, Alberto Bartoli, Eric Medvet","doi":"10.1109/CASoN.2012.6412417","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412417","url":null,"abstract":"Preventing illegitimate modifications to web sites offering a public service is a fundamental requirement of any e-government initiative. Unfortunately, attacks to web sites resulting in the creation of fraudulent content by hackers are ubiquitous. In this work we attempted to assess the ability of Italian public administrations to be in full control of the respective web sites. We examined several thousands sites, including all local governments and universities, and found that approximately 1.5% of the analyzed sites serves contents that admittedly is not supposed to be there. Although these contents do not constitute an immediate threat to citizens, this result does not seem very encouraging also because our methodology leads to very conservative estimates. We believe that our analysis allows gaining useful insights into this novel and peculiar threat.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129746368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An investigation of entropy of selectively encrypted bitmap images 选择性加密位图图像熵的研究
R. Lundin, S. Lindskog
Selective encryption is a concept in which the main goal is to reduce computational cost while providing confidentiality by encrypting only chosen parts of the information to be protected. Previous work on selective encryption has mainly been aimed towards multimedia applications in order to reduce the overhead induced by encryption while still making the information perceptually secure to a desired protection level. This was accomplished by utilizing the fact that different parts of the information have different impacts on our perception senses, i.e., eyes and ears. How computationally secure the information is when using selective encryption has however only briefly been mentioned or rudimentarily analyzed. In this paper, we therefore investigate the security implications of selective encryption by generalizing the work on entropy of selectively encrypted strings to several dimensions and applying it to bitmap images. The generalization is done by constructing information neighborhoods that capture and model information dependencies in several dimensions.
选择性加密是一个概念,其主要目标是通过只加密要保护的信息的选定部分来降低计算成本,同时提供机密性。以前关于选择性加密的工作主要针对多媒体应用,目的是减少加密引起的开销,同时仍然使信息在感知上安全到所需的保护级别。这是通过利用信息的不同部分对我们的感知感官(即眼睛和耳朵)有不同影响的事实来实现的。然而,当使用选择性加密时,信息的计算安全性如何仅被简要提及或初步分析。因此,在本文中,我们通过将选择性加密字符串的熵的工作推广到几个维度并将其应用于位图图像来研究选择性加密的安全含义。泛化是通过构建信息邻域来实现的,这些信息邻域可以在几个维度上捕获和建模信息依赖关系。
{"title":"An investigation of entropy of selectively encrypted bitmap images","authors":"R. Lundin, S. Lindskog","doi":"10.1109/CASoN.2012.6412409","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412409","url":null,"abstract":"Selective encryption is a concept in which the main goal is to reduce computational cost while providing confidentiality by encrypting only chosen parts of the information to be protected. Previous work on selective encryption has mainly been aimed towards multimedia applications in order to reduce the overhead induced by encryption while still making the information perceptually secure to a desired protection level. This was accomplished by utilizing the fact that different parts of the information have different impacts on our perception senses, i.e., eyes and ears. How computationally secure the information is when using selective encryption has however only briefly been mentioned or rudimentarily analyzed. In this paper, we therefore investigate the security implications of selective encryption by generalizing the work on entropy of selectively encrypted strings to several dimensions and applying it to bitmap images. The generalization is done by constructing information neighborhoods that capture and model information dependencies in several dimensions.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123141371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A fingerprinting system calls approach for intrusion detection in a cloud environment 指纹识别系统在云环境中调用入侵检测方法
Sanchika Gupta, Padam Kumar, A. Sardana, A. Abraham
Cloud Computing envisioned as the next generation architecture for IT enterprises, has proliferated itself due to the advantages it provides. Cloud Computing provides solutions for carrying out efficient, scalable and low cost computing. Due to the distributed nature of cloud based system, it is vulnerable to a large category of attacks out of which VM based attacks are most common. To counter these attacks we need Intrusion Detection System (IDS), which is used to monitor network traffic and policy violations from unauthorized users. Anomaly Detection is a technique of Intrusion Detection, which is used to detect intrusions by monitoring system activity and finding out patterns that do not comply with the normal behavior. In this paper an approach for anomaly detection in cloud environment is presented, which is based upon analysis of system call sequences generated by the virtual machines to the hypervisor. Our proposed implementation prevents malicious VM users to modify well known frequently executed programs.
云计算被设想为IT企业的下一代架构,由于它提供的优势,它本身已经激增。云计算提供了执行高效、可扩展和低成本计算的解决方案。由于基于云的系统的分布式特性,它容易受到大量攻击,其中基于VM的攻击是最常见的。为了对抗这些攻击,我们需要入侵检测系统(IDS),它用于监控来自未经授权用户的网络流量和策略违规行为。异常检测是入侵检测的一种技术,它通过监测系统活动,发现不符合正常行为的模式来检测入侵。本文提出了一种基于虚拟机对管理程序产生的系统调用序列分析的云环境异常检测方法。我们提出的实现防止恶意VM用户修改众所周知的经常执行的程序。
{"title":"A fingerprinting system calls approach for intrusion detection in a cloud environment","authors":"Sanchika Gupta, Padam Kumar, A. Sardana, A. Abraham","doi":"10.1109/CASoN.2012.6412420","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412420","url":null,"abstract":"Cloud Computing envisioned as the next generation architecture for IT enterprises, has proliferated itself due to the advantages it provides. Cloud Computing provides solutions for carrying out efficient, scalable and low cost computing. Due to the distributed nature of cloud based system, it is vulnerable to a large category of attacks out of which VM based attacks are most common. To counter these attacks we need Intrusion Detection System (IDS), which is used to monitor network traffic and policy violations from unauthorized users. Anomaly Detection is a technique of Intrusion Detection, which is used to detect intrusions by monitoring system activity and finding out patterns that do not comply with the normal behavior. In this paper an approach for anomaly detection in cloud environment is presented, which is based upon analysis of system call sequences generated by the virtual machines to the hypervisor. Our proposed implementation prevents malicious VM users to modify well known frequently executed programs.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127737216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Ontology design towards web intelligence: A Sports Complex Ontology case study 面向web智能的本体设计:一个体育综合体本体案例研究
S. K. Malik, S. Rizvi
As we are aware that for fulfilling the dream of an intelligent web, an Ontology may act as a backbone and it's significance may not be denied for realizing the vision of semantic web to add semantics or computer understandable data to the existing human readable web inorder to facilitate a more efficient knowledge use or reuse on a sharable basis on web. It means that Ontology enables to structure and conceptualize the shared knowledge of a particular domain on web but the major challenging problem is the huge decentralized nature of web which does not permit to have a single large ontology but left with the possibility of having several smaller ontologies which are difficult to implement and manage. Now, Ontology has several critical aspects where Ontology design and development is one of the fundamental key issues which may be best realized with the help of a case study. In this paper, a case study of a “Sports Complex Ontology” is presented using ontology editor SWOOP 2.3 Beta 4 presenting Ontology Statistics with some results or observations. What makes it different from others is it's key aspects which include: design criteria pictorial representation along with the key steps and it's relevance with research issues like Semantic Search patterns based on "Structure", the details being out of scope of this paper.
我们意识到,为了实现智能网络的梦想,本体可以作为一个骨干,在现有的人类可读的网络上添加语义或计算机可理解的数据,以促进知识在网络上更有效地使用或重用,在共享的基础上实现语义网的愿景,其意义不可否认。这意味着本体能够在web上对特定领域的共享知识进行结构化和概念化,但主要的挑战问题是web的巨大分散性,这使得不允许拥有单一的大型本体,而留下了多个难以实现和管理的小型本体的可能性。现在,本体有几个关键方面,其中本体的设计和开发是最基本的关键问题之一,可以通过案例研究的帮助来最好地实现。本文使用本体编辑器SWOOP 2.3 Beta 4对“运动综合体本体”进行了案例研究,并展示了本体统计和一些结果或观察结果。它的不同之处在于它的关键方面,包括:设计标准、图形表示和关键步骤,以及它与基于“结构”的语义搜索模式等研究问题的相关性,这些细节超出了本文的范围。
{"title":"Ontology design towards web intelligence: A Sports Complex Ontology case study","authors":"S. K. Malik, S. Rizvi","doi":"10.1109/CASoN.2012.6412430","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412430","url":null,"abstract":"As we are aware that for fulfilling the dream of an intelligent web, an Ontology may act as a backbone and it's significance may not be denied for realizing the vision of semantic web to add semantics or computer understandable data to the existing human readable web inorder to facilitate a more efficient knowledge use or reuse on a sharable basis on web. It means that Ontology enables to structure and conceptualize the shared knowledge of a particular domain on web but the major challenging problem is the huge decentralized nature of web which does not permit to have a single large ontology but left with the possibility of having several smaller ontologies which are difficult to implement and manage. Now, Ontology has several critical aspects where Ontology design and development is one of the fundamental key issues which may be best realized with the help of a case study. In this paper, a case study of a “Sports Complex Ontology” is presented using ontology editor SWOOP 2.3 Beta 4 presenting Ontology Statistics with some results or observations. What makes it different from others is it's key aspects which include: design criteria pictorial representation along with the key steps and it's relevance with research issues like Semantic Search patterns based on \"Structure\", the details being out of scope of this paper.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127769229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detection of head experts in social network 社交网络中头部专家的检测
M. Radvanský, M. Kudelka, V. Snás̃el
This paper introduces a method for head expert identification in a social network based on local community detection and formal concept analysis. There are several methods for expert identification, but most of these methods try to find an expert for a particular area. In this paper, we propose a novel approach to identify a head expert. This person is in the background and most of the time he is working across different areas of research, and he can establish teams of experts for particular areas.
介绍了一种基于局部社区检测和形式概念分析的社会网络首领专家识别方法。鉴定专家的方法有几种,但大多数方法都试图找到某一特定领域的专家。本文提出了一种识别首席专家的新方法。这个人在后台,大多数时候他在不同的研究领域工作,他可以为特定领域建立专家团队。
{"title":"Detection of head experts in social network","authors":"M. Radvanský, M. Kudelka, V. Snás̃el","doi":"10.1109/CASoN.2012.6412384","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412384","url":null,"abstract":"This paper introduces a method for head expert identification in a social network based on local community detection and formal concept analysis. There are several methods for expert identification, but most of these methods try to find an expert for a particular area. In this paper, we propose a novel approach to identify a head expert. This person is in the background and most of the time he is working across different areas of research, and he can establish teams of experts for particular areas.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125512589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Social network indices as performance predictors in a virtual organization 社会网络指标在虚拟组织中的绩效预测作用
R. Wigand, Nitin Agarwal, O. I. Osesina, W. Hering, M. Korsgaard, A. Picot, Marcus A. Drescher
Measuring an individual's potential to accomplish a goal has key implications in organizational studies, behavioral analysis, business and management among other areas. This relative potential, which is dependent on a myriad of factors, e.g., experience, resource management, cooperation, etc., could shape the individual's performance, motivation, leadership, and likely success. The increasing prevalence of virtual organizations provides unique challenges and opportunities to study complex research questions via convenient data collection. In this NSF-funded research, we introduce a multi-factor dynamic model to estimate the potential of an individual to accomplish a goal in a virtual organization. We analyze data from a Massive Multi-player Online Role-Playing Game (MMORPG), Travian, collected in a controlled environment for over 3.5 months. The data contains activities of 7,406 players, including, players' profiles, daily snapshots of individual and alliance attributes, amount of gold, military strength, trades and cooperation, diplomacy status as well as a 2.3 million-message graph. We model players' potential to survive as a multi-factor function derived from the data attributes, including SNA-based network measures from the message graph. The model predicts a player's potential to win the game or to achieve a specified goal. The target is to identify the influence of network behavior for the player, and how network statistics for each player influence the accuracy of the prediction.
衡量个人实现目标的潜力在组织研究、行为分析、商业和管理等领域都具有重要意义。这种相对潜力取决于无数的因素,如经验、资源管理、合作等,它可以塑造个人的表现、动机、领导能力和可能的成功。虚拟组织的日益流行为通过方便的数据收集来研究复杂的研究问题提供了独特的挑战和机会。在这项由美国国家科学基金会资助的研究中,我们引入了一个多因素动态模型来评估个人在虚拟组织中完成目标的潜力。我们分析了大型多人在线角色扮演游戏(MMORPG)《Travian》的数据,这些数据是在一个受控环境中收集的,时间超过3.5个月。这些数据包含了7406名玩家的活动,包括玩家的个人资料,个人和联盟属性的每日快照,黄金数量,军事实力,贸易和合作,外交状态以及230万条消息图。我们将玩家的生存潜力建模为来自数据属性的多因素函数,包括来自消息图的基于sna的网络度量。该模型预测玩家赢得比赛或实现特定目标的潜力。目标是确定网络行为对玩家的影响,以及每个玩家的网络统计数据如何影响预测的准确性。
{"title":"Social network indices as performance predictors in a virtual organization","authors":"R. Wigand, Nitin Agarwal, O. I. Osesina, W. Hering, M. Korsgaard, A. Picot, Marcus A. Drescher","doi":"10.1109/CASoN.2012.6412393","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412393","url":null,"abstract":"Measuring an individual's potential to accomplish a goal has key implications in organizational studies, behavioral analysis, business and management among other areas. This relative potential, which is dependent on a myriad of factors, e.g., experience, resource management, cooperation, etc., could shape the individual's performance, motivation, leadership, and likely success. The increasing prevalence of virtual organizations provides unique challenges and opportunities to study complex research questions via convenient data collection. In this NSF-funded research, we introduce a multi-factor dynamic model to estimate the potential of an individual to accomplish a goal in a virtual organization. We analyze data from a Massive Multi-player Online Role-Playing Game (MMORPG), Travian, collected in a controlled environment for over 3.5 months. The data contains activities of 7,406 players, including, players' profiles, daily snapshots of individual and alliance attributes, amount of gold, military strength, trades and cooperation, diplomacy status as well as a 2.3 million-message graph. We model players' potential to survive as a multi-factor function derived from the data attributes, including SNA-based network measures from the message graph. The model predicts a player's potential to win the game or to achieve a specified goal. The target is to identify the influence of network behavior for the player, and how network statistics for each player influence the accuracy of the prediction.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"24 19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129260058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Evaluation of quality in encrypted VoIP calls 加密VoIP通话质量评价
Dherik Barison, R. Miani, B. Zarpelão, G. D. Breda, L. Mendes
The purpose of this work is to evaluate the quality of encrypted VoIP calls with different encryption algorithms through OpenVPN software, in order to identify differences in results between encryption algorithms and also differences between non-encrypted and encrypted calls. This evaluation will take into account the MOS (Mean Opinion Score), a method to indicate user satisfaction of voice communication quality. The encrypted VoIP calls will occur in different network scenarios that present different network bandwidths and different problems, like packet loss, out-of-order packets, and delay.
这项工作的目的是通过OpenVPN软件评估不同加密算法下加密VoIP呼叫的质量,以识别加密算法之间结果的差异,以及非加密和加密呼叫之间的差异。该评价将考虑到MOS(平均意见得分),这是一种表明用户对语音通信质量满意度的方法。加密VoIP呼叫会发生在不同的网络场景中,网络带宽不同,丢包、乱包、时延等问题也不同。
{"title":"Evaluation of quality in encrypted VoIP calls","authors":"Dherik Barison, R. Miani, B. Zarpelão, G. D. Breda, L. Mendes","doi":"10.1109/CASoN.2012.6412398","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412398","url":null,"abstract":"The purpose of this work is to evaluate the quality of encrypted VoIP calls with different encryption algorithms through OpenVPN software, in order to identify differences in results between encryption algorithms and also differences between non-encrypted and encrypted calls. This evaluation will take into account the MOS (Mean Opinion Score), a method to indicate user satisfaction of voice communication quality. The encrypted VoIP calls will occur in different network scenarios that present different network bandwidths and different problems, like packet loss, out-of-order packets, and delay.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128615726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1