In many information networks, data items such as updates in social networks, news flowing through interconnected RSS feeds and blogs, measurements in sensor networks, route updates in ad-hoc networks, etc. propagate in an uncoordinated manner: nodes often relay information they receive to neighbors, independent of whether or not these neighbors received such information from other sources. This uncoordinated data dissemination may result in significant, yet unnecessary communication and processing overheads, ultimately reducing the utility of information networks. To alleviate the negative impacts of this information multiplicity phenomenon, we propose that a subset of nodes (selected at key positions in the network) carry out additional i...
Abstract — We consider social networks which contain agents that spread misinformation and refuse to...
Abstract—This paper presents two contributions. The first is an incremental placement algorithm for ...
Opportunistic network applications are usually assumed to work only with unordered immutable message...
In many information networks, data items – such as updates in social networks, news flowing through ...
textModern day networks, both physical and virtual, are designed to support increasingly sophisticat...
As the world becomes more and more interconnected, our everyday objects become part of the Internet ...
How can we optimize the topology of a networked system to make it resilient to flus or malware, or a...
As content provisioning becomes the driving application of today\u27s (opportunistic) networking env...
The problem of limiting the diffusion of information in social networks has received substantial att...
Second generation networks have emerged in the recent years. These networks are set up for a specifi...
We consider the model of information diffusion in social networks from [21] which incorporates trust...
The Network Decontamination problem consists in coordinating a team of mobile agents in order to cle...
Unlike the telephone network or the Internet, many of the next generation networks are not engineere...
Abstract This paper describes a network reduction technique to reveal possibly hidden relational pat...
: Better ways at finding the most valuable information on the Internet, and to avoid trash, would ve...
Abstract — We consider social networks which contain agents that spread misinformation and refuse to...
Abstract—This paper presents two contributions. The first is an incremental placement algorithm for ...
Opportunistic network applications are usually assumed to work only with unordered immutable message...
In many information networks, data items – such as updates in social networks, news flowing through ...
textModern day networks, both physical and virtual, are designed to support increasingly sophisticat...
As the world becomes more and more interconnected, our everyday objects become part of the Internet ...
How can we optimize the topology of a networked system to make it resilient to flus or malware, or a...
As content provisioning becomes the driving application of today\u27s (opportunistic) networking env...
The problem of limiting the diffusion of information in social networks has received substantial att...
Second generation networks have emerged in the recent years. These networks are set up for a specifi...
We consider the model of information diffusion in social networks from [21] which incorporates trust...
The Network Decontamination problem consists in coordinating a team of mobile agents in order to cle...
Unlike the telephone network or the Internet, many of the next generation networks are not engineere...
Abstract This paper describes a network reduction technique to reveal possibly hidden relational pat...
: Better ways at finding the most valuable information on the Internet, and to avoid trash, would ve...
Abstract — We consider social networks which contain agents that spread misinformation and refuse to...
Abstract—This paper presents two contributions. The first is an incremental placement algorithm for ...
Opportunistic network applications are usually assumed to work only with unordered immutable message...