Collaboration in Social Network-based Information Dissemination

被引:0
|
作者
Mohaisen, Aziz [1 ]
AbuHmed, Tamer [2 ]
Zhu, Ting [3 ]
Mohaisen, Manar [4 ]
机构
[1] Univ Minnesota Twin Cities, Minneapolis, MN 55455 USA
[2] Inha Univ, Inha, South Korea
[3] SUNY Binghamton, Binghamton, NY 13902 USA
[4] Korea Univ Technol & Educ, Seoul, South Korea
来源
2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2012年
关键词
Social networks; collaboration; routing; adversarial behavior; performance;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Connectivity and trust within social networks have been exploited to build applications on top of these networks, including information dissemination, Sybil defenses, and anonymous communication systems. In these networks, and for such applications, connectivity ensures good performance of applications while trust is assumed to always hold, so as collaboration and good behavior are always guaranteed. In this paper, we study the impact of differential behavior of users on performance in typical social network-based information dissemination applications. We classify users into either collaborative or rational (probabilistically collaborative) and study the impact of this classification and the associated behavior of users on the performance on such applications. By experimenting with real-world social network traces, we make several interesting observations. First, we show that some of the existing social graphs have high routing costs, demonstrating poor structure that prevents their use in such applications. Second, we study the factors that make probabilistically collaborative nodes important for the performance of the routing protocol within the entire network and demonstrate that the importance of these nodes stems from their topological features rather than their percentage of all the nodes within the network.
引用
收藏
页码:2103 / 2107
页数:5
相关论文
共 50 条
  • [31] Network-based market knowledge and product innovativeness
    Bao, Yongchuan
    Sheng, Shibin
    Zhou, Kevin Zheng
    MARKETING LETTERS, 2012, 23 (01) : 309 - 324
  • [32] The Social Structure of the Information Systems Collaboration Network: Centers of Influence and Antecedents of Tie Formation
    Chipidza, Wallace
    Tripp, John F.
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2018, 42 : 431 - 454
  • [33] Utilizing Social Insect-Based Communities for Routing in Network-based Sensor Systems
    Ang, Li-Minn
    Seng, Kah Phooi
    Zungeru, Adamu Murtala
    INTERNATIONAL JOURNAL OF SWARM INTELLIGENCE RESEARCH, 2016, 7 (04) : 52 - 70
  • [34] The Social Network of Victims of Domestic Violence: A Network-Based Intervention Model to Improve Relational Autonomy
    Nolet, Anne-Marie
    Morselli, Carlo
    Cousineau, Marie-Marthe
    VIOLENCE AGAINST WOMEN, 2021, 27 (10) : 1630 - 1654
  • [35] International scientific collaboration in research of depression based on social network analysis
    Wu, Ying
    Duan, Zhiguang
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON THE MODERN DEVELOPMENT OF HUMANITIES AND SOCIAL SCIENCE, 2013, : 390 - 395
  • [36] The problem of knowledge dissemination in social network discussions
    Labinaz, Paolo
    Sbisa, Marina
    JOURNAL OF PRAGMATICS, 2021, 175 : 67 - 80
  • [37] A Social Network Model for Academic Collaboration
    Bhukya, Sreedhar
    NETWORKED DIGITAL TECHNOLOGIES, 2011, 136 : 203 - 211
  • [38] Young people, social capital and network-based educational decision-making
    Heath, Sue
    Fuller, Alison
    Johnston, Brenda
    BRITISH JOURNAL OF SOCIOLOGY OF EDUCATION, 2010, 31 (04) : 395 - 411
  • [39] The Research on Influencing Factors of Knowledge Transfer in Project Network-Based on the Social Networks
    Sun Jian
    Hao Sheng-yue
    Ren Xu
    2015 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING - 22ND ANNUAL CONFERENCE PROCEEDINGS, VOLS I AND II, 2015, : 1650 - 1659
  • [40] Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures
    Kartaltepe, Erhan J.
    Morales, Jose Andre
    Xu, Shouhuai
    Sandhu, Ravi
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2010, 6123 : 511 - +