4.7 Article

HCMM: Modelling spatial and temporal properties of human mobility driven by users' social relationships

期刊

COMPUTER COMMUNICATIONS
卷 33, 期 9, 页码 1056-1074

出版社

ELSEVIER
DOI: 10.1016/j.comcom.2010.01.013

关键词

Mobility models; Social network theory; Inter-contact time; Jump size; Analytical modelling

资金

  1. European Commission [027918, 217141]

向作者/读者索取更多资源

In Mobile Ad Hoc Networks (MANETs), the mobility of the network users can heavily affect the performance of networking protocols because it causes sudden connectivity changes and topological variations. This is even more important in recent promising paradigms proposed in this field, such as opportunistic and delay tolerant networks. For this reason, it is important to understand the characteristics of the user movements in order to properly handle mobility when designing networking protocols for mobile ad hoc networks. In addition, it is highly desirable to have a mobility model that accurately reproduces the user mobility, thus enabling researchers to evaluate, either analytically or by means of simulations, their protocols under realistic mobility conditions. Recently, there have been many studies aimed to uncover the nature of human movements. In this paper, based on recent literature, we identify three main properties that are fundamental to characterize human mobility. Then, we propose a mobility model (HCMM) that integrates all these three features. To the best of our knowledge, the model proposed is the first one that combines notions about the sociality of users with spatial properties observed in real users movement patterns, i.e., their preference to spend time in a limited number of popular locations and to preferentially select short distances over longer ones. We study the HCMM both through simulation and analysis. Based on this study, we highlight some of its important temporal and spatial features, and we show that they are correctly reproduced in terms of key indicators such as jump size and inter-contact time distribution. (C) 2010 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Hardware & Architecture

Dynamic hard pruning of Neural Networks at the edge of the internet

Lorenzo Valerio, Franco Maria Nardini, Andrea Passarella, Raffaele Perego

Summary: This paper investigates the problem of training effective neural network models on resource-constrained devices. The authors propose a dynamic hard pruning technique that incrementally prunes the network during training and reuses freed memory using dynamic batch sizing. Experimental results show that their method can compress a neural network up to 10 times without significant performance drops and reduce training memory occupancy by 80%.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2022)

Article Engineering, Civil

A Multi-Stage Optimisation Approach to Design Relocation Strategies in One-Way Car-Sharing Systems With Stackable Cars

Riccardo Iacobucci, Raffaele Bruno, Chiara Boldrini

Summary: The study proposes a multi-stage decision support system for tackling the operational challenge of vehicle relocation in one-way car-sharing systems. By leveraging modular and flexible approaches, user-based, operator-based, and robotic relocation schemes are designed to improve service quality and vehicle utilization under demand uncertainty.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

Modeling, Replicating, and Predicting Human Behavior: A Survey

Andrew Fuchs, Andrea Passarella, Marco Conti

Summary: This article provides a review of the efforts to replicate human reasoning in artificial systems and the integration of concepts such as Game Theory, Theory of Mind, and Machine Learning. The article also highlights the need for autonomous agents to understand human behavior in order to work together effectively.

ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS (2023)

Article Multidisciplinary Sciences

Structural invariants and semantic fingerprints in the ego network of words

Kilian Ollivier, Chiara Boldrini, Andrea Passarella, Marco Conti

Summary: Well-established cognitive models from anthropology have shown the cognitive constraints that shape social relations in humans. This study analyzes a Twitter dataset to explore whether similar regularities exist in language production. Results reveal a concentric layered structure in the organization of words, as well as semantic profiles that capture important topics. The first ring of each ego network plays a unique role as the semantic fingerprint of the word network.

PLOS ONE (2022)

Article Computer Science, Cybernetics

Harnessing the Power of Ego Network Layers for Link Prediction in Online Social Networks

Mustafa Toprak, Chiara Boldrini, Andrea Passarella, Marco Conti

Summary: This article proposes leveraging social cognitive theories to improve link prediction performance in online social networks and shows that social awareness generally provides significant improvements in prediction performance.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Chemistry, Analytical

Compensating for Sensing Failures via Delegation in Human-AI Hybrid Systems

Andrew Fuchs, Andrea Passarella, Marco Conti

Summary: Given the prevalence of intelligent systems capable of autonomous actions, it is important to consider scenarios where failures can occur due to contributing factors. This includes failures that can vary from reduced performance to severe consequences like injury or death. In the context of hybrid human-AI teaming, a managing agent is responsible for identifying when to delegate tasks and decide whether the human or autonomous system should take control. By estimating the likelihood of failures based on sensing capabilities and deficiencies, a reinforcement learning manager can help the team outperform any agent working alone by correcting the context-delegation association.

SENSORS (2023)

Article Computer Science, Information Systems

Service differentiation and fair sharing in distributed quantum computing

Claudio Cicconetti, Marco Conti, Andrea Passarella

Summary: In the future, quantum computers will be widely used with a network of quantum repeaters to provide end-to-end entanglement. This will lead to the emergence of a pervasive quantum computation infrastructure, enabling distributed quantum computing and resource pooling on multiple computation nodes. This paper investigates service differentiation in this new environment and proposes a method for selecting computation nodes to achieve fair sharing of available network resources. The analysis was performed using an open source simulator and the results are fully accessible.

PERVASIVE AND MOBILE COMPUTING (2023)

Article Automation & Control Systems

Dynamics of Opinion Polarization

Elisabetta Biondi, Chiara Boldrini, Andrea Passarella, Marco Conti

Summary: For decades, researchers have been trying to understand how people form their opinions. This study focuses on polarization using the popular Friedkin-Johnsen (FJ) model, surveying its variants and polarization metrics, deriving their relation, determining the conditions under which FJ variants induce opinion polarization, discussing a methodology for finding polarized opinion vectors, and applying analytical results to real social network graphs to identify polarizing conditions.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2023)

Article Computer Science, Information Systems

A Survey on Networked Data Streaming With Apache Kafka

Theofanis P. Raptis, Andrea Passarella

Summary: This paper conducts a systematic survey of the research literature in the field of Apache Kafka, classifying it into key macro areas and analyzing the optimization aspects relevant to each area. By synthesizing and consolidating existing knowledge, the paper serves as a trusted reference for the Apache Kafka community, providing practical insights, highlighting novel approaches, and identifying research challenges.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

Models for Digitally Contact-Traced Epidemics

Chiara Boldrini, Andrea Passarella, Marco Conti

Summary: Contacts between people are the main drivers of respiratory infections. Digital contact tracing has been proposed as a solution to scale up traditional contact tracing. However, the required penetration of contact tracing apps within the population is currently under discussion. Mathematical models have been used to understand the effects of digital contact tracing. The research suggests that digital contact tracing alone is not sufficient to control the epidemic, but it can be effective when combined with other strategies such as social distancing and mask-wearing.

IEEE ACCESS (2022)

Proceedings Paper Computer Science, Artificial Intelligence

Demonstrating Optimized Delegation between AI and Human Agents

Andrew Fuchs, Andrea Passarella, Marco Conti

Summary: With the increasing interaction between humans and AI systems, it is important to ensure that artificial systems understand humans and are able to delegate decisions in different contexts, leading to an improved human-AI system.

2022 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2022) (2022)

Proceedings Paper Computer Science, Artificial Intelligence

A Cognitive Framework for Delegation Between Error-Prone AI and Human Agents

Andrew Fuchs, Andrea Passarella, Marco Conti

Summary: With the increasing interaction between humans and AI systems, it is important to ensure that AI systems understand humans and can delegate decision-making accordingly. By using cognitively inspired models of behavior, the predicted behavior of both humans and AI agents can be used to delegate control between the two parties, overcoming potential shortcomings in pursuit of a goal.

2022 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2022) (2022)

Article Computer Science, Interdisciplinary Applications

Teaching the Qubits to fly

Claudio Cicconetti, Marco Conti, Andrea Passarella

Summary: This passage discusses the emergence of a new quantum era and the research being carried out at IIT-CNR on quantum networks. The aim is to develop secure identification and communication, distributed computation, and integration with classical computing systems. The ultimate goal is to build a quantum internet where quantum components coexist with legacy-Internet components or are exclusively built out of quantum devices.

ERCIM NEWS (2022)

Review Computer Science, Information Systems

A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective

Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani

Summary: The Internet of Things (IoT) has the potential to revolutionize medical treatment in healthcare, but it also faces security threats. Advanced analytics can enhance IoT security, but generating realistic datasets is complex. This research conducts a review of Machine Learning (ML) solutions for IoT security in healthcare, focusing on existing datasets, resources, applications, and challenges, to highlight the current landscape and future requirements.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Role of context in determining transfer of risk knowledge in roundabouts

Duncan Deveaux, Takamasa Higuchi, Seyhan Ucar, Jerome Harri, Onur Altintas

Summary: This paper investigates the ability to predict the risk patterns of vehicles in a roundabout and suggests that constraining knowledge transfer to roundabouts with a similar context can significantly improve accuracy.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Intelligent wireless sensing driven metaverse: A survey

Lingjun Zhao, Qinglin Yang, Huakun Huang, Longtao Guo, Shan Jiang

Summary: Metaverse seamlessly integrates the real and virtual worlds, and intelligent wireless sensing technology can serve as an intelligent, flexible, non-contact way to access the metaverse and accelerate the establishment of a bridge between the real physical world and the metaverse. However, there are still challenges and open issues in this field.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

PrivMaskFL: A private masking approach for heterogeneous federated learning in IoT

Jing Xiong, Hong Zhu

Summary: With the rapid growth of data in the era of IoT, the challenge of data privacy protection arises. This article proposes a federated learning approach that uses collaborative training to obtain a global model without direct exposure to local datasets. By utilizing dynamic masking and adaptive differential privacy methods, the approach reduces communication overhead and improves the converge performance of the model.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Quantum-resistant Transport Layer Security

Carlos Rubio Garcia, Simon Rommel, Sofiane Takarabt, Juan Jose Vegas Olmos, Sylvain Guilley, Philippe Nguyen, Idelfonso Tafur Monroy

Summary: The reliance on asymmetric public key cryptography and symmetric encryption for cyber-security in current telecommunication networks is threatened by quantum computing technology. Quantum Key Distribution and post-quantum cryptography provide resistance to quantum attacks. This paper proposes two novel hybrid solutions integrating QKD and PQC into TLS for quantum-resistant key exchange.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Resource allocation for cost minimization of a slice broker in a 5G-MEC scenario

Annisa Sarah, Gianfranco Nencioni

Summary: This article explores the concept of a Slice Broker, an intermediate entity that purchases resources from Infrastructure Providers to offer customized network slices to users. The article proposes a cost-minimization problem and compares it with alternative problems to demonstrate its effectiveness and cost-saving capabilities.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

MBP: Multi-channel broadcast proxy re-encryption for cloud-based IoT devices

Sumana Maiti, Sudip Misra, Ayan Mondal

Summary: The broadcast proxy re-encryption methods extend traditional proxy re-encryption mechanisms and propose a scheme called MBP for IoT applications. MBP calculates a single re-encryption key for all user groups and uses multi-channel broadcast encryption to reduce security element size. However, it increases computation time for receiver IoT devices. The use of Rubinstein-Stahl bargaining game approach addresses this issue and MBP is secure against selective group chosen-ciphertext attack in the random oracle model.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

NextGenV2V: Authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme

Pankaj Kumar, Hari Om

Summary: This paper presents NextGenV2V, a protocol for the next-generation vehicular network that achieves authenticated communication between vehicles using symmetric keys and a (2, n)-threshold scheme. The protocol reduces communication overhead and improves authentication delay, ensuring better security. Comparative analysis demonstrates the suitability of NextGenV2V in next-generation vehicular networks.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

A multi-agent federated reinforcement learning-based optimization of quality of service in various LoRa network slices

Eric Ossongo, Moez Esseghir, Leila Merghem-Boulahia

Summary: The implementation of 5G networks allows for the efficient coexistence of heterogeneous services in a single physical virtualized infrastructure. Virtualization of network functions enables more flexible resource management and customizable services. However, the increasing number of connected objects poses challenges in managing physical and virtual resources, requiring intelligent systems to ensure communication quality.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

PiGateway: Real-time granular analysis of smart home network traffic using P4

Suvrima Datta, U. Venkanna

Summary: The Internet of Things (IoT) enables real-time sensing and data transmission to make homes smarter. Effective device-type identification methods are crucial as the number of IoT devices continues to grow. In this paper, a P4-based gateway called PiGateway is proposed to classify and prioritize the type of IoT devices. By utilizing a decision tree model and flow rules, PiGateway enables real-time granular analysis and in-network classification of IoT traffic.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Resource management in multi-heterogeneous cluster networks using intelligent intra-clustered federated learning

Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran, Fayaz Ali Dharejo

Summary: This paper explores the relationship between heterogeneous cluster networks and federated learning, as well as the challenges of implementing federated learning in heterogeneous networks and the Internet of Things. The authors propose an Intra-Clustered FL (ICFL) model that optimizes computation and communication to select heterogeneous FL nodes in each cluster, enabling efficient processing of asynchronous data and ensuring data security.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

QoS aware resource allocation for coexistence mechanisms between eMBB and URLLC: Issues, challenges, and future directions in 5G

Rajesh Kumar, Deepak Sinwar, Vijander Singh

Summary: This paper investigates the coexistence mechanisms between eMBB and URLLC traffic for resource scheduling in 5G. Through examining different approaches and performance metrics, it provides detailed insights for researchers in the field, and highlights key issues, challenges, and future directions.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Enabling simulation services for digital twins of 5G/B5G mobile networks

Giovanni Nardini, Giovanni Stea

Summary: Digital Twins of Networks (DTNs) are proposed as digital replicas of physical entities, enabling efficient data-driven network management and performance-driven network optimization. DTNs provide simulation services for dynamic reconfiguration and fault anticipation, using discrete-event network simulators as the ideal tools. Challenges include centralized vs. distributed implementation, input gathering from the physical network, security issues and hosting. The possibilities of network simulation for what-if analysis are explored, with the concepts of lockstep and branching analysis defined.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

DINNRS: A Distributed In-Network Name Resolution System for information-centric networks

Zhaolin Ma, Jiali You, Haojiang Deng

Summary: This paper presents the Distributed In-Network Name Resolution System (DINNRS), which leverages software-defined networking and Information-Centric Networking (ICN) paradigm to provide high scalability and minimal request delay. Our methods, including an enhanced marked cuckoo filter for fast resolving, achieve significant performance gains in simulation experiments.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Dynamic WiFi indoor positioning based on the multi-scale metric learning

Yujie Wang, Ying Wang, Qingqing Liu, Yong Zhang

Summary: This paper proposes a dynamic indoor positioning method based on multi-scale metric learning of the channel state information (CSI). By constructing few-shot learning tasks, this method can achieve dynamic positioning using CSI signals without additional equipment. Experimental results show that compared to commonly used dynamic location and tracking algorithms, the proposed method has higher positioning accuracy and does not accumulate errors.

COMPUTER COMMUNICATIONS (2024)