Friday, December 21, 2007

Strong Social Networks

A well-written article (pdf) reports on the work by Oxford folks (previous post). Plus, it says that a "pair of Oxford physicists, Neil Johnson and Sean Gourley, have teamed up with social scientists at the Conflict Analysis Resource Center (CERAC), based in Bogotá"

"When the researchers graphed all the attacks within a given conflict, with the number of attacks plotted against the number killed in each, it produces a fat-tailed exponential curve. And the exponent of the function, which determines the curve’s shape, is nearly always the same. “Terrorism and guerrilla warfare everywhere in the world has a signature of about 2.5,” says Gourley. Plotting the distribution of these events over time produces another, distinctive signature.

Thursday, December 20, 2007

At 71, physics professor is a Web star

Professor Walter H. G. Lewin "delivers his lectures [owc] with the panache of Julia Child bringing French cooking to amateurs and the zany theatricality of YouTube's greatest hits. He is part of a new generation of academic stars who hold forth in cyberspace on their college Web sites and even, without charge, on iTunes U, which went up in May on Apple's iTunes Store.

In his lectures at ocw.mit.edu, Professor Lewin beats a student with cat fur to demonstrate electrostatics. Wearing shorts, sandals with socks and a pith helmet — nerd safari garb — he fires a cannon loaded with a golf ball at a stuffed monkey wearing a bulletproof vest to demonstrate the trajectories of objects in free fall.

He rides a fire-extinguisher-propelled tricycle across his classroom to show how a rocket lifts off." Source

The stars this week included Hubert Dreyfus, a philosophy professor at the University of California, Berkeley, and Leonard Susskind, a professor of quantum mechanics at Stanford.

Last week, Yale put some of its most popular undergraduate courses and professors online free. The list includes Controversies in Astrophysics with Charles Bailyn, Modern Poetry with Langdon Hammer and Introduction to the Old Testament with Christine Hayes.

Wednesday, December 19, 2007

The weakness of weak ties

This is a very interesting paper: Structure and tie strengths in mobile communication networks. It studies the communication patterns of millions of mobile phone users by arranging them in a big weighted social network. The weight between two individuals corresponds to the aggregated duration of calls between them.

Findings:
"Weak ties appear to be crucial for maintaining the network’s structural integrity, but strong ties play an important role in maintaining local communities. Both weak and strong ties are ineffective, however, when it comes to information transfer, given that most news in the real simulations reaches an individual for the first time through ties of intermediate strength." ..."The speed of spread then depended on the strength of each link. The results suggest that information spreads most quickly via links of intermediate strength, or medium length calls. This is because information spreads slowly through weaker links, or shorter calls, and stronger links tend to bind only a limited number of people."

Consequence:
To enhance the spreading of information, one needs to intentionally force it through the intermediate- to weak-strenght ties (while avoiding hubs!)

Tuesday, December 18, 2007

You, poor? Out!

Switzerland welcomes rich people with its banks and deports poor ones with this new initiative:

Switzerland has started a television campaign in African countries to keep potential illegal migrants from trying to immigrate to Switzerland.

Monday, December 17, 2007

Robustness of community structure in networks

"The discovery of community structure is a common challenge in the analysis of network data. Many methods have been proposed for finding community structure, but few have been proposed for determining whether the structure found is statistically significant or whether, conversely, it could have arisen purely as a result of chance. In this paper we show that the significance of community structure can be effectively quantified by measuring its robustness to small perturbations in network structure. We propose a suitable method for perturbing networks and a measure of the resulting change in community structure and use them to assess the significance of community structure in a variety of networks, both real and computer generated." Source

Does your data follow a power-law distribution?

Power-law distributions in empirical data (htm)

Science paper (pdf)

How brain catalogs info. PageRank-style?

"Human Brain Cloud: a multiplayer word association game that started with a single word ("volcano") and has since taken on a life of its own. Players are given a word, which is culled from the database of previously entered words, and asked to enter the first thing that comes to mind. As people interact with the game it collects data about word associations that can be formed into a giant network (the cloud)."

"Researchers at the University of California recently conducted a study in which they found evidence to suggest that our brains catalog and rate the relevance of information by forming connections between data. The researchers compared the brain's system to Google's PageRank algorithm"Source

" The investigators found that a word’s “Page­Rank” was a good pre­dic­tor of how of­ten it would show up when peo­ple were asked to think of words that start with A, with B, and so on.

When it came pre­dict­ing these re­sults, “Page­Rank” beat two oth­er seem­ingly rea­son­a­ble rank­ing sys­tems: tal­lies of how of­ten words show up in or­di­nary writ­ing; and a sim­ple count of di­rect “links” to a word that does­n’t con­sid­er how many words, in turn, link to those link­ing words.

In the PageR­ank for­mu­la, a page gains “im­por­tance” based on how many oth­er pages link to it. But links from pages that are them­selves “im­por­tant,” con­fer more im­por­tance than those that aren’t. Thus, im­por­tance can be thought of as flow­ing through the Web’s link net­work to­ward the most highly “linked-in” sites.

One ex­plana­t­ion for the new find­ings, wrote Grif­fiths and col­leagues, could be that con­nec­tions among brain cells work si­m­i­larly to Web links. Cells that are tar­gets of many con­nec­tions might be­come more ac­tive than oth­ers, in the same way that highly linked-in web­sites are deemed more im­por­tant." Source

Sunday, December 16, 2007

Recommenders Everywhere - WikiLens

Here is the talk. "Suppose you have a passion for items of a certain type, and you wish to start a recommender system around those items. You want a system like Amazon or Epinions, but for cookie recipes, local theater, or microbrew beer. How can you set up your recommender system without assembling complicated algorithms, large software infrastructure, a large community of contributors, or even a full catalog of items?

WikiLens is open source software that enables anyone, anywhere to start a community-maintained recommender around any type of item. We introduce five principles for community-maintained recommenders that address the two
key issues: (1) community contribution of items and associated information; and (2) finding items of interest. Since all recommender communities start small, we look at feasibility and utility in the small world, one with few users, few items, few ratings. We describe the features of WikiLens, which are based on our principles, and give lessons learned from two years of experience running
wikilens.org."

A mobile phone that can buy clothes for you


"A revolutionary new mobile phone will soon be able to let shoppers snatch a photo of clothes they want before ordering them online. Nokia is currently developing the device which lets you buy clothes, furniture or holidays in the High Street — without going into a store. Buyers can now avoid queuing at the checkout and even buy clothes simlpy by looking through a shop window and taking a photo of the window display. The phone then uses image recognition software to find the same object on the Internet." Source.

Monday, December 10, 2007

What's on CIO wish lists?

Number 5: Collaboration Technologies "Web 2.0 and social networking may be becoming candidates for the mainstream, although some CIOs have their reservations. Bob Worrall, for example, CIO of Sun Microsystems, reckons to have talked to well over 100 of his contemporaries over the past year and believes that social networking represents a new threat. There is a lot of information out there on blogs and wiki, but there is no easy way to harvest that information and make it available to the organisation” he says. Sun, however, has created a virtual Californian building in cyberspace and is experimenting with its use as a meeting place for remote staff... RM, the supplier of IT to UK schools, places collaboration and mobility at the top of the list... One of the biggest challenges is to evaluate Web 2.0 opportunities and select those which will add real value to the business" FT

Eight business technology trends to watch
(McKinsey)

The Natural Pattern Behind our Votes

From 30 years of elections around the world: "The most important factor determining a candidate’s success compared with his rivals in the same party turns out to be his or her personal ability to connect with the public."

How opinions form?

Person-to-person process is enough to explain the data! "In their model, they supposed that each candidate starts out trying to convince others to vote in their favour. Those he or she convinces, then try to convince others. These influences percolate through the scoial net until everyone has made a decision."
Consequence
Candidates should focus on WHO they contact - influential people may easily convince others.
More on this pdf.

Sunday, December 9, 2007

Lightweight Distributed Trust Propagation

I just finished to present our work at ICDM. Here are the slides (also in ppt).





SlideShare | View | Upload your own

Trust Bootstrapping: TRULLO @ Mobiquitous

At Mobiquitous 2007, we presented TRULLO. Here are the slides (some animations do not work properly in slideshare, sorry). A brief description follows.



Situation: Using mobile devices, such as smart phones, people may create and distribute different types of digital content (e.g., photos, videos). One of the problems is that digital content, being easy to create and replicate, may likely swamp users rather than informing them. To avoid that, users may run trust models on their mobile devices. A trust model is a piece of software that keeps track of who provides quality content and who does not.

Problem: Devices should be able to set their initial trust for other devices. One way of doing so is for devices to learn from their own past experiences. To see how, consider the following quotes about human trust: ``We may initially trust or not trust those involved on our projects based on past experience'', and ``If your boyfriend is unfaithful, you won't initially trust the next man you date'' :-) Algorithms that model human trust on pervasive devices, one might say, ought to do the same thing - they should assign their initial trust upon `similar' past experiences.

Existing Solutions: Existing solutions usually require an ontology upon which they decide which past experiences are similar, and, in so doing, they require both that the same ontology is shared by all users (which is hardly the case in reality) and that users agree on that ontology for good (ie, the ontology is not supposed to change over time) :-(

Proposal: TRULLO gathers ratings of past experiences in a matrix, learns staticial "features" from that matrix, and combines those features to set initial trust values. It works quite well in a simulated antique market and its implementation is reasonably fast on a Nokia mobile phone.

Future: TRULLO does not work if one does not have past experiences. That is why we will propose a distributed trust propadation algorithm (pdf)