Modeling Opportunistic Social Networks with Decayed Aggregation Graph

نویسندگان

  • Peiyan Yuan
  • Yali Wang
چکیده

—The emerging mobile applications including contact-based forwarding and online worm containment have put a heavy burden on opportunistic social networks (OSNs), the first goal is to develop an effective model that can reveal the hidden, important social features underlying the OSNs. This problem is especially challenging because of the time-varying network topology. Traditional time expanded graph caches each snapshot of networks, resulting in low computation efficiency and high storage overhead. By aggregating past contact events between two nodes to a simple boolean indicator, the binary graph model can alleviate this issue. However, it only provides a coarse-grained level of identifying the relationship between nodes. It neglects the differences in contact events. Intuitively, recent contact events are generally more important than old ones, and in computing an aggregation, we should assign bigger weights to them. In addition, since each contact has its own duration, we should take this factor into account as well. Motivated by these observations, we propose DAG, a decayed aggregation graph for modeling OSNs at a fine-grained level. By implementing DAG in different real scenarios, we show that DAG is efficient in characterizing the relationship between nodes and in improving the performance of mobile applications. We simultaneously prove that DAG achieves approximate space complexity as the binary graph.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Approach for Detecting Relationships in Social Networks Using Cellular Automata Based Graph Coloring

All the social networks can be modeled as a graph, where each roles as vertex and each relationroles as an edge. The graph can be show as G = [V;E], where V is the set of vertices and E is theset of edges. All social networks can be segmented to K groups, where there are members in eachgroup with same features. In each group each person knows other individuals and is in touch ...

متن کامل

GGRA: a grouped gossip-based reputation aggregation algorithm

An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting previously proposed algorithm for reputation aggregation in P2P networks based on t...

متن کامل

Data routing strategies in opportunistic mobile social networks: Taxonomy and open challenges

Opportunistic Mobile Social Network (MSN) is a kind of Delay Tolerant Network (DTN) in which nodes are mobile with social characteristics. Users in such network carry data, move and forward it to others for information dissemination. To enable efficient data routing in opportunistic MSNs, the social metrics of users, such as mobility pattern, social centrality, community and etc. are leveraged ...

متن کامل

Social-Based Trust Mechanisms in Mobile Opportunistic Networks

The fundamental challenge in opportunistic networking, regardless of the application, is enabling node cooperation to forward a message. While node cooperation is considered as a fundamental property in such networks, ensuring such a property between two devices in mobile opportunistic networks remains largely unexplored. In this paper, we investigate the potential impact of the lack of trust o...

متن کامل

Providing a Link Prediction Model based on Structural and Homophily Similarity in Social Networks

In recent years, with the growing number of online social networks, these networks have become one of the best markets for advertising and commerce, so studying these networks is very important. Most online social networks are growing and changing with new communications (new edges). Forecasting new edges in online social networks can give us a better understanding of the growth of these networ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCM

دوره 10  شماره 

صفحات  -

تاریخ انتشار 2015