ترغب بنشر مسار تعليمي؟ اضغط هنا

Social network analysis tools can infer various attributes just by scrutinizing ones connections. Several researchers have studied the problem faced by an evader whose goal is to strategically rewire their social connections in order to mislead such tools, thereby concealing their private attributes. However, to date, this literature has only considered static networks, while neglecting the more general case of temporal networks, where the structure evolves over time. Driven by this observation, we study how the evader can conceal their importance from an adversary armed with temporal centrality measures. We consider computational and structural aspects of this problem: Is it computationally feasible to calculate optimal ways of hiding? If it is, what network characteristics facilitate hiding? This topic has been studied in static networks, but in this work, we add realism to the problem by considering temporal networks of edges changing in time. We find that it is usually computationally infeasible to find the optimal way of hiding. On the other hand, by manipulating ones contacts, one could add a surprising amount of privacy. Compared to static networks, temporal networks offer more strategies for this type of manipulation and are thus, to some extent, easier to hide in.
Differences in the social and economic environment across countries encourage humans to migrate in search of better living conditions, including job opportunities, higher salaries, security and welfare. Quantifying global migration is, however, chall enging because of poor recording, privacy issues and residence status. This is particularly critical for some classes of migrants involved in stigmatised, unregulated or illegal activities. Escorting services or high-end prostitution are well-paid activities that attract workers all around the world. In this paper, we study international migration patterns of sex-workers by using network methods. Using an extensive international online advertisement directory of escorting services and information about individual escorts, we reconstruct a migrant flow network where nodes represent either origin or destination countries. The links represent the direct routes between two countries. The migration network of sex-workers shows different structural patterns than the migration of the general population. The network contains a strong core where mutual migration is often observed between a group of high-income European countries, yet Europe is split into different network communities with specific ties to non-European countries. We find non-reciprocal relations between countries, with some of them mostly offering while others attract workers. The GDP per capita is a good indicator of country attractiveness for incoming workers and service rates but is unrelated to the probability of emigration. The median financial gain of migrating, in comparison to working at the home country, is 15.9%. Only sex-workers coming from 77% of the countries have financial gains with migration and average gains decrease with the GDPc of the country of origin. Our results shows that high-end sex-worker migration is regulated by economic, geographic and cultural aspects.
Understanding the causes and consequences of, and devising countermeasures to, global warming is a profoundly complex problem. Even when researchers narrow down the focus to a publishable investigation, their analysis often contains enough interactin g components to require a network visualization. Networks are thus both necessary and natural elements of climate science. Furthermore, networks form a mathematical foundation for a multitude of computational and analytical techniques. We are only beginning to see the benefits of this connection between the sciences of climate change and networks. In this review, we cover use-cases of networks in the climate-change literature -- what they represent, how they are analyzed, and what insights they bring. We also discuss network data, tools, and problems yet to be explored.
Influencing (and being influenced by) others indirectly through social networks is fundamental to all human societies. Whether this happens through the diffusion of rumors, viruses, opinions, or know-how, finding the source is of persistent interest to people and an algorithmic challenge of much current research interest. However, no study has considered the case of diffusion sources actively trying to avoid detection. By disregarding this assumption, we risk conflating intentional obfuscation from the fundamental limitations of source-finding algorithms. We close this gap by separating two mechanisms hiding diffusion sources-one stemming from the network topology itself and the other from strategic manipulation of the network. We find that identifying the source can be challenging even without foul play and, many times, it is easy to evade source-detection algorithms further. We show that hiding connections that were part of the viral cascade is far more effective than introducing fake individuals. Thus, efforts should focus on exposing concealed ties rather than planted fake entities, e.g., bots in social media; such exposure would drastically improve our chances of detecting the source of a social diffusion.
Diseases spread over temporal networks of interaction events between individuals. Structures of these temporal networks hold the keys to understanding epidemic propagation. One early concept of the literature to aid in discussing these structures is concurrency -- quantifying individuals tendency to form time-overlapping partnerships. Although conflicting evaluations and an overabundance of operational definitions have marred the history of concurrency, it remains important, especially in the area of sexually transmitted infections. Today, much of theoretical epidemiology uses more direct models of contact patterns, and there is an emerging body of literature trying to connect methods to the concurrency literature. In this review, we will cover the development of the concept of concurrency and these new approaches.
In many data sets, crucial elements co-exist with non-essential ones and noise. For data represented as networks in particular, several methods have been proposed to extract a network backbone, i.e., the set of most important links. However, the ques tion of how the resulting compressed views of the data can effectively be used has not been tackled. Here we address this issue by putting forward and exploring several systematic procedures to build surrogate data from various kinds of temporal network backbones. In particular, we explore how much information about the original data need to be retained alongside the backbone so that the surrogate data can be used in data-driven numerical simulations of spreading processes. We illustrate our results using empirical temporal networks with a broad variety of structures and properties.
We investigate the formation of opinion against authority in an authoritarian society composed of agents with different levels of authority. We explore a dissenting opinion, held by lower-ranking, obedient, or less authoritative people, spreading in an environment of an affirmative opinion held by authoritative leaders. A real-world example would be a corrupt society where people revolt against such leaders, but it can be applied to more general situations. In our model, agents can change their opinion depending on their authority relative to their neighbors and their own confidence level. In addition, with a certain probability, agents can override the affirmative opinion to take the dissenting opinion of a neighbor. Based on analytic derivation and numerical simulations, we observe that both the network structure and heterogeneity in authority, and their correlation, significantly affect the possibility of the dissenting opinion to spread through the population. In particular, the dissenting opinion is suppressed when the authority distribution is very heterogeneous and there exists a positive correlation between the authority and the number of neighbors of people (degree). Except for such an extreme case, though, spreading of the dissenting opinion takes place when people have the tendency to override the authority to hold the dissenting opinion, but the dissenting opinion can take a long time to spread to the entire society, depending on the model parameters. We argue that the internal social structure of agents sets the scale of the time to reach consensus, based on the analysis of the underlying structural properties of opinion spreading.
We study an evolutionary spatial prisoners dilemma game where the fitness of the players is determined by both the payoffs from the current interaction and their history. We consider the situation where the selection timescale is slower than the inte raction timescale. This is done by implementing probabilistic reproduction on an individual level. We observe that both too fast and too slow reproduction rates hamper the emergence of cooperation. In other words, there exists an intermediate selection timescale that maximizes cooperation. Another factor we find to promote cooperation is a diversity of reproduction timescales.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا