Is Web Content a Good Proxy for Real-Life Interaction?

نویسندگان

  • Mark Kibanov
  • Martin Atzmueller
  • Christoph Scholz
  • Alain Barrat
  • Ciro Cattuto
  • Gerd Stumme
  • Jens Illig
چکیده

Today, many people spend a lot of time online. Their social interactions captured in online social networks are an important part of the overall personal social profile, in addition to interactions taking place offline. This paper investigates whether relations captured by online social networks can be used as a proxy for the relations in offline social networks, such as networks of human face-to-face (F2F) proximity and coauthorship networks. Particularly, the paper focuses on interactions of computer scientists in online settings (homepages, social networks profiles and connections) and offline settings (scientific collaboration, faceto-face communications during the conferences). We focus on quantitative studies and investigate the structural similarities and correlations of the induced networks; in addition, we analyze implications between networks. Finally, we provide a qualitative user analysis to find characteristics of good and bad proxies.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

بهینه‌سازی اجرا و پاسخ صفحات وب در فضای ابری با روش‌های پیش‌پردازش، مطالعه موردی سامانه‌های وارنیش و انجینکس

The response speed of Web pages is one of the necessities of information technology. In recent years, renowned companies such as Google and computer scientists focused on speeding up the web. Achievements such as Google Pagespeed, Nginx and varnish are the result of these researches. In Customer to Customer(C2C) business systems, such as chat systems, and in Business to Customer(B2C) systems, s...

متن کامل

A Secure and Transparent Firewall Web Proxy

The LANL transparent web proxy lets authorized external users originating from the Internet to securely access internal intranet web content and applications normally blocked by a firewall. Unauthenticated access is still, of course, denied. The proxy is transparent in that no changes to browsers, user interaction, or intranet web servers are necessary. The proxy, a few thousand lines of C runn...

متن کامل

Shear-Flexural Interaction in Analysis of Reduced Web Section Beams using VM Link Element

Reduced web section beams in shear-yielding moment-resistant steel frames are used for energy dissipating of earthquakes. The finite element analysis indicates that failure mode of these beams are governed by the combination of shear force and flexural moment. Therefore the analysis of frames with reduced web section beams needs consideration of shear-flexural interaction in those sections. In ...

متن کامل

Pervasive Web Content Delivery with Efficient Data Reuse

The heterogeneity and dynamics of client's requirement and preference make the current "one content presentation to many global clients" model for information provisioning difficult to deploy cost-efficiently in pervasive and mobile computing environment. Server side solution of maintaining multiple distinct versions of the content is quite limited and expensive; client side solution of transfo...

متن کامل

Evaluation of Randomized Replacement Policies for Web Caches

This paper presents a comparison of the performance of seven randomized replacement policies proposed for Web caching (RAND, HARMONIC, LRU-C, LRU-S, CLIMB-C, CLIMB-S and RRGVF) and the classical LRU scheme widely used in Web proxy caches. This comparison is performed using a Web cache simulator that implements the aforementioned replacement policies and uses a workload of real proxy traces to s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017