Collaboration in Social Network-based Information Dissemination

被引:0
|
作者
Mohaisen, Aziz [1 ]
AbuHmed, Tamer [2 ]
Zhu, Ting [3 ]
Mohaisen, Manar [4 ]
机构
[1] Univ Minnesota Twin Cities, Minneapolis, MN 55455 USA
[2] Inha Univ, Inha, South Korea
[3] SUNY Binghamton, Binghamton, NY 13902 USA
[4] Korea Univ Technol & Educ, Seoul, South Korea
来源
2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2012年
关键词
Social networks; collaboration; routing; adversarial behavior; performance;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Connectivity and trust within social networks have been exploited to build applications on top of these networks, including information dissemination, Sybil defenses, and anonymous communication systems. In these networks, and for such applications, connectivity ensures good performance of applications while trust is assumed to always hold, so as collaboration and good behavior are always guaranteed. In this paper, we study the impact of differential behavior of users on performance in typical social network-based information dissemination applications. We classify users into either collaborative or rational (probabilistically collaborative) and study the impact of this classification and the associated behavior of users on the performance on such applications. By experimenting with real-world social network traces, we make several interesting observations. First, we show that some of the existing social graphs have high routing costs, demonstrating poor structure that prevents their use in such applications. Second, we study the factors that make probabilistically collaborative nodes important for the performance of the routing protocol within the entire network and demonstrate that the importance of these nodes stems from their topological features rather than their percentage of all the nodes within the network.
引用
收藏
页码:2103 / 2107
页数:5
相关论文
共 50 条
  • [41] Using social network-based complexity profiles to understand attitudes to medical care
    Chung, Kon Shing Kenneth
    Young, Jane
    White, Kate
    HEALTH SYSTEMS, 2014, 3 (03) : 199 - 213
  • [42] Violence in the Social Networks of Homeless Youths: Implications for Network-Based Prevention Programming
    Petering, Robin
    Rice, Eric
    Rhoades, Harmony
    JOURNAL OF ADOLESCENT RESEARCH, 2016, 31 (05) : 582 - 605
  • [43] Analysis of Social Influence and Information Dissemination in Social Media: The Case of Twitter
    Shen, Chien-Wen
    Kuo, Chin-Jin
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2014, 2014, 8838 : 526 - 534
  • [44] The Role of Gossiping in Information Dissemination over a Network of Agents
    Bastopcu, Melih
    Etesami, Seyed Rasoul
    Basar, Tamer
    ENTROPY, 2024, 26 (01)
  • [45] Modeling strategies for information influence dissemination in social networks
    Anas M. Al-Oraiqat
    Oleksandr S. Ulichev
    Yelyzaveta V. Meleshko
    Hazim S. AlRawashdeh
    Oleksii O. Smirnov
    Liudmyla I. Polishchuk
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 2463 - 2477
  • [46] EFFECTIVENESS OF THE SOCIAL NETWORKS EDUCATIONAL INFORMATION DISSEMINATION USAGE
    Lohr, Vaclav
    Tesar, Stepan
    Brozek, Jiri
    EFFICIENCY AND RESPONSIBILITY IN EDUCATION 2013, 2013, : 374 - 381
  • [47] Minimum-Cost Information Dissemination in Social Networks
    Deng, Dongping
    Du, Hongwei
    Jia, Xiaohua
    Ye, Qiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 83 - 93
  • [48] Modeling strategies for information influence dissemination in social networks
    Al-Oraiqat, Anas M.
    Ulichev, Oleksandr S.
    Meleshko, Yelyzaveta V.
    AlRawashdeh, Hazim S.
    Smirnov, Oleksii O.
    Polishchuk, Liudmyla I.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (5) : 2463 - 2477
  • [49] A Novel Social Network Model for Research Collaboration
    Bhukya, Sreedhar
    TRENDS IN NETWORKS AND COMMUNICATIONS, 2011, 197 : 585 - 592
  • [50] A Novel Social Network Model for Business Collaboration
    Bhukya, Sreedhar
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 622 - 630