Positive and Negative Relations
|
|
- Phoebe Boone
- 6 years ago
- Views:
Transcription
1 Positive and Negative Relations CMSC 498J: Social Media Computing Department of Computer Science University of Maryland Spring 2016 Hadi Amiri
2 Lecture Topics Balanced and Unbalanced Networks Structure of Balanced Networks Weakly Balanced Networks 2
3 Structural Balance We viewed networks as having positive relations or links friendship, collaboration, membership relations, etc. But there are networks with negative relations. Support / Oppose relations Trust / Distrust relations Friend / Foe relations How should we reason about these networks? 3
4 Structural Balance- Cnt. Given a network, how can we annotate its links with positive and negative signs? Structural Balance is one basic framework for this purpose. 4
5 Structural Balance- Cnt. Let s assume we have Complete Graph with links labeled by + and signs. Each pair of nodes are either friends or enemies Makes sense for a group of people with mutual awareness a classroom, a small company, a sports team, a fraternity or sorority, or international relations where nodes are countries. We will relax the complete graph assumption later. 5
6 Structural Balance- Cnt. Considering any 2 people in isolation, the edge between them can be labeled + or they are either friends or enemies
7 triangles with one or three +'s as balanced Structural Balance- Cnt. But for 3 people, certain configurations are socially / psychologically more plausible Balanced Unbalanced triangles with zero or two +'s are unbalanced 7
8 Structural Balance- Cnt. Which type is more abundant in real world networks? People try to minimize unbalanced triangles in their personal relationships as they are sources of stress or psychological dissonance. 8
9 Structural Balance Property A Labeled Complete Graph is balanced if every one of its triangles is balanced! Structural Balance Property For every triangle, either all its three edges are labeled +, or else exactly one of them is labeled +. 9
10 Structural Balance Property- Cnt. 10
11 Structural Balance Property- Cnt. Unrealistic definition! 11
12 Structure of Balanced Nets What does a balanced network look like in general? a j b i c d 2 groups of friends (A-B and C-D), with negative relations between the 2 groups! 12
13 Structure of Balanced Nets- Cnt. If a Labeled Complete Graph is balanced, then either: 1. The network contains only positive edges, or 2. Global division of network: Nodes can be divided into 2 groups X and Y such that: a pos link btw every pair of nodes in X, a pos link btw every pair of nodes in Y, and a neg link btw every node of X and every node of Y X Balance Theorem: These are the only ways to have a balanced network! Y 13
14 Structure of Balanced Nets- Cnt. Prove balanced theorem! Solution: Consider the network from a node s perspective! Pick any node in the network, say node A, Let X be all of A's friends, and Y be all of A's enemies. This divides all nodes as the graph is complete! Prove: Every two nodes in X are friends, and Every two nodes in Y are friends, and Every node in X is an enemy of every node in Y. 14
15 Structure of Balanced Nets- Cnt. X Y 15
16 Structural Balance- Applications How does such a social network, labels of edges, evolve over time? Social networks implicitly seek out structural balance! 16
17 App 1. International Relations Separation of Bangladesh from Pakistan in 1972 Why did US support Pakistan? USSR was China s enemy China was India s enemy India was Pakistan s enemy US was China s friend China vetoed Bangladesh 17
18 App 2. International Relations World War I Fr: France Ru: Russia It: Italy Ge: Germany AH: Austria- Hungary GB: Great Britain Structural Balance is not necessarily a good thing : hard-to-resolve opposition between two sides. 18
19 App 3. Trust and Distrust Networks with positive or negative relations! slashdot.com, epinions.com Important to understand the Nature of Relationships! A trusts B, B trusts C -> natural to expect A trust C. What if A distrusts B and B distrusts C: A should trust or to distrust C? Distrust as enemy relationship: A should trust C, otherwise a triangle with 3 negative edges. Distrust as less knowledge relationship: A should distrust C (even more strongly than B). Propagation of trust and distrust. Guha, et. al. WWW
20 Weak Structural Balance Friends of friends may try to reconcile their differences of the 3 mutual enemies ally themselves against the third one!
21 Weak Structural Balance Weak Structural Balance Property There is no triangle with exactly two positive edges and one negative edge. 3 Mutual enemies are allowed as there could be less of a force leading any 2 of them to become friend as compared to the first case (mutual enemies with a common friend to reconcile)!
22 Structure of Weakly Balanced Nets What does a weakly balanced network look like? If a Labeled Complete Graph is weakly balanced, then its nodes can be divided into groups such that: every 2 nodes in the same group are friends, and every 2 nodes in different groups are enemies. Weakly Balance Theorem: This is the only way to have a weakly balanced network! 22
23 Structure of Weakly Balanced Nets Prove weakly balanced theorem! Solution: Consider the network from a node s perspective! Pick a node in the network, say node A, Let X (our 1 st group) consist of A and all of A's friends, Prove: X is a group of mutual friends. A's friends are friends with each other. Nodes in X are enemies of nodes not in X. A and his friends are enemies with other nodes in graph. 23
24 Structure of Weakly Balanced Nets X Remove X from the graph and let it be 1 st group. The smaller graph is still weakly balanced, why? Find others group in this way until all the nodes are assigned to a group. 24
25 Questions? 25
26 Reading Ch.05 Positive and Negative Relationships [NCM] 26
Social and Information Network Analysis Positive and Negative Relationships
Social and Information Network Analysis Positive and Negative Relationships Cornelia Caragea Department of Computer Science and Engineering University of North Texas June 14, 2016 To Recap Triadic Closure
More informationPositive and Negative Links
Positive and Negative Links Web Science (VU) (707.000) Elisabeth Lex KTI, TU Graz May 4, 2015 Elisabeth Lex (KTI, TU Graz) Networks May 4, 2015 1 / 66 Outline 1 Repetition 2 Motivation 3 Structural Balance
More informationRecap! CMSC 498J: Social Media Computing. Department of Computer Science University of Maryland Spring Hadi Amiri
Recap! CMSC 498J: Social Media Computing Department of Computer Science University of Maryland Spring 2015 Hadi Amiri hadi@umd.edu Announcement CourseEvalUM https://www.courseevalum.umd.edu/ 2 Announcement
More informationCS224W: Social and Information Network Analysis Jure Leskovec, Stanford University
CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University http://cs224w.stanford.edu 10/10/2011 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, http://cs224w.stanford.edu
More informationNetwork Basics. CMSC 498J: Social Media Computing. Department of Computer Science University of Maryland Spring Hadi Amiri
Network Basics CMSC 498J: Social Media Computing Department of Computer Science University of Maryland Spring 2016 Hadi Amiri hadi@umd.edu Lecture Topics Graphs as Models of Networks Graph Theory Nodes,
More informationScalable Network Analysis
Inderjit S. Dhillon University of Texas at Austin COMAD, Ahmedabad, India Dec 20, 2013 Outline Unstructured Data - Scale & Diversity Evolving Networks Machine Learning Problems arising in Networks Recommender
More informationOnline Social Networks and Media. Positive and Negative Edges Strong and Weak Edges Strong Triadic Closure
Online Social Networks and Media Positive and Negative Edges Strong and Weak Edges Strong Triadic Closure POSITIVE AND NEGATIVE TIES Structural Balance What about negative edges? Initially, a complete
More informationScalable Clustering of Signed Networks Using Balance Normalized Cut
Scalable Clustering of Signed Networks Using Balance Normalized Cut Kai-Yang Chiang,, Inderjit S. Dhillon The 21st ACM International Conference on Information and Knowledge Management (CIKM 2012) Oct.
More informationSpecial Conditions and Service Description UNLIMITED 1.5GB
Special Conditions and Service Description UNLIMITED 1.5GB amaysim Australia Limited, PO Box R567, Royal Exchange NSW 1225, Australia, ABN 65 143 613 478, ACN 143 613 478 Table of Contents 1. YOUR AGREEMENT
More informationStructural Balance and Transitivity. Social Network Analysis, Chapter 6 Wasserman and Faust
Structural Balance and Transitivity Social Network Analysis, Chapter 6 Wasserman and Faust Balance Theory Concerned with how an individual's attitudes or opinions coincide with those of others in a network
More informationLecture 6: Graph Properties
Lecture 6: Graph Properties Rajat Mittal IIT Kanpur In this section, we will look at some of the combinatorial properties of graphs. Initially we will discuss independent sets. The bulk of the content
More informationWeb 2.0 Social Data Analysis
Web 2.0 Social Data Analysis Ing. Jaroslav Kuchař jaroslav.kuchar@fit.cvut.cz Structure (2) Czech Technical University in Prague, Faculty of Information Technologies Software and Web Engineering 2 Contents
More informationA graph is a mathematical structure for representing relationships.
Graphs Part Two A graph is a mathematical structure for representing relationships. Nodes A graph consists of a set of nodes (or vertices) connected by edges (or arcs) A graph is a mathematical structure
More informationIs the world ready for mobile payments?
Is the world ready for mobile payments? A global consumer perspective Presented by Charles Adriaenssens and Suraya Randawa CARTES & IDentification, 16 November 2011 We asked 13,461 mobile phone users across
More informationCSE 258 Lecture 12. Web Mining and Recommender Systems. Social networks
CSE 258 Lecture 12 Web Mining and Recommender Systems Social networks Social networks We ve already seen networks (a little bit) in week 3 i.e., we ve studied inference problems defined on graphs, and
More informationIMO Training 2008: Graph Theory
IMO Training 2008: Graph Theory by: Adrian Tang Email: tang @ math.ucalgary.ca This is a compilation of math problems (with motivation towards the training for the International Mathematical Olympiad)
More informationINTERDIGITAL. 4 th Quarter 2013 Investor Presentation. invention collaboration contribution InterDigital, Inc. All rights reserved.
INTERDIGITAL 4 th Quarter 2013 Investor Presentation invention collaboration contribution 1 2013 InterDigital, Inc. All rights reserved. Forward-Looking Statements 2 2013 InterDigital, Inc. All rights
More informationCS224W Final Report Emergence of Global Status Hierarchy in Social Networks
CS224W Final Report Emergence of Global Status Hierarchy in Social Networks Group 0: Yue Chen, Jia Ji, Yizheng Liao December 0, 202 Introduction Social network analysis provides insights into a wide range
More informationFor: Ministry of Education From Date: 19 November 18-2 December 18 Venue: M1 Shops
For: Ministry of Education From Date: 19 November 18-2 December 18 Venue: M1 Shops $200 OFF HANDSETS For new line / port-in / re-contract on mysim e 90 and above plan Reg+ and above plan $150 OFF HANDSETS
More informationGlobal Economic Indicators: Global Leading Indicators
Global Economic Indicators: Global Leading Indicators January 30, 2018 Dr. Edward Yardeni 516-2-7683 eyardeni@ Debbie Johnson 480-664-1333 djohnson@ Mali Quintana 480-664-1333 aquintana@ Please visit our
More informationUser SIM Guide. We are responsive between 10AM-6PM AEST. We love seeing what our customers get up to!
User SIM Guide Hello Thanks for purchasing & welcome to SimsDirect! This guide is here to help you use your SIM while traveling. Contact us We are responsive between 10AM-6PM AEST. @m.me/simsdirect @SimsDirect
More informationLessons learnt from building the International Virtual Observatory Alliance. Françoise Genova
Lessons learnt from building the International Virtual Observatory Alliance Françoise Genova The IVOA Formed in June 2002 with a mission to "facilitate the international coordination and collaboration
More informationGlobal Entertainment & Media Outlook.
Global Entertainment & Media Outlook 2018 2022 www.pwc.com/outlook Perspectives: 2018 Outlook report summary Trending now: convergence, connections and trust PwC 2 Perspectives report So what s trending
More informationDigital EAGLEs. Outlook and perspectives
2016 Digital EAGLEs Outlook and perspectives Fixed and Mobile broadband adoption rates in the next decade Changes in Fixed-Broadband penetration 2014-25 Changes in Mobile-Broadband penetration 2014-25
More informationColoring Signed Graphs
Coloring Signed Graphs Lynn Takeshita May 12, 2016 Abstract This survey paper provides an introduction to signed graphs, focusing on coloring. We shall introduce the concept of signed graphs, a proper
More informationIncubating ideas in R&D capabilities abroad
Incubating ideas in R&D capabilities abroad European Commission - 21 October 2009 José Valerdi Tormo Head of Orange Labs R&D Spain Local markets develop break through innovations 2 inspired by innovative
More informationRates. Local Call Rates. Overseas Call Rates (v019) Monday to Friday 8:00pm to 7:59am 8 per min Saturday and Sunday All Day
Rates Local Call Rates Monday to Friday 8:00pm to 7:59am 8 per min Saturday and Sunday All Day Rounded to the nearest cent 16 per min Monday to Friday 8:00am 7:59pm Rounded to the nearest cent Overseas
More informationV2: Measures and Metrics (II)
- Betweenness Centrality V2: Measures and Metrics (II) - Groups of Vertices - Transitivity - Reciprocity - Signed Edges and Structural Balance - Similarity - Homophily and Assortative Mixing 1 Betweenness
More informationCharacterizing Graphs (3) Characterizing Graphs (1) Characterizing Graphs (2) Characterizing Graphs (4)
S-72.2420/T-79.5203 Basic Concepts 1 S-72.2420/T-79.5203 Basic Concepts 3 Characterizing Graphs (1) Characterizing Graphs (3) Characterizing a class G by a condition P means proving the equivalence G G
More informationService withdrawal: Selected IBM ServicePac offerings
Announcement ZS09-0086, dated April 21, 2009 Service withdrawal: Selected IBM offerings Table of contents 1 Overview 9 Announcement countries 8 Withdrawal date Overview Effective April 21, 2009, IBM will
More informationCSE 158 Lecture 11. Web Mining and Recommender Systems. Social networks
CSE 158 Lecture 11 Web Mining and Recommender Systems Social networks Assignment 1 Due 5pm next Monday! (Kaggle shows UTC time, but the due date is 5pm, Monday, PST) Assignment 1 Assignment 1 Social networks
More informationAllianz SE Reinsurance Branch Asia Pacific Systems Requirements & Developments. Dr. Lutz Füllgraf
Allianz SE Reinsurance Branch Asia Pacific Systems Requirements & Developments Dr. Lutz Füllgraf Technology and Innovation for Insurance Conference 2007, Sydney 22 March 2007 Contents 1 Importance of a
More informationVerwaltung und Qualitätssicherung von BIM-Modellen via IFCWebServer.org Data Server
Verwaltung und Qualitätssicherung von BIM-Modellen via IFCWebServer.org Data Server Ali Ismail M.Sc. TU Dresden Institut für Bauinformatik Development Leader @ IFCWebServer.org Content Short introduction
More informationINTERNATIONAL ELECTROTECHNICAL COMMISSION. IEC TC57 WG15 Data and Communication Security Status & Roadmap. May, Frances Cleveland.
INTERNATIONAL ELECTROTECHNICAL COMMISSION IEC TC57 WG15 Data and Communication Security Status & Roadmap May, 2013 Frances Cleveland Convenor WG15 Mission and Scope of WG15 on Cybersecurity Undertake the
More informationCMSC 201 Spring 2017 Project 1 Number Classifier
CMSC 201 Spring 2017 Project 1 Number Classifier Assignment: Project 1 Number Classifier Due Date: Design Document: Saturday, March 11th, 2017 by 8:59:59 PM Project: Friday, March 17th, 2017 by 8:59:59
More informationStandard Pricing Table
Catch Connect Prepaid Services Standard Pricing Table Click on the page number of the section that you are interested in 1. About this Standard Pricing Table 2 2. General Information 2 2.1 How do we calculate
More information* Please note that recovery will only be provided free-of-charge if you hold valid cover via Honda.
FAQs March 2017 How can I change my PIN? You will be sent an automatically-generated PIN when you register for My Honda, it s not a problem though to change this to something you can remember more easily.
More informationENHANCED INTERIOR GATEWAY ROUTING PROTOCOL STUB ROUTER FUNCTIONALITY
APPLICATION NOTE ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL STUB ROUTER FUNCTIONALITY OVERVIEW Enhanced Interior Gateway Routing Protocol (EIGRP).Stub Router functionality, which Cisco introduced in Cisco
More informationEND-OF-SALE AND END-OF-LIFE ANNOUNCEMENT FOR THE CISCO MEDIA CONVERGENCE SERVER 7845H-2400
END-OF-LIFE NOTICE, NO. 2566 END-OF-SALE AND END-OF-LIFE ANNOUNCEMENT FOR THE CISCO MEDIA CONVERGENCE SERVER 7845H-2400 Cisco Systems announces the end of life of the Cisco Media Convergence Server 7845H-2400.
More informationSUUNTO SPARTAN ULTRA QUICK GUIDE
SUUNTO SPARTAN ULTRA QUICK GUIDE Read complete User Guide www.suunto.com/support EN, DE, FR, ES, IT, NL, PT, EL, SV, FI, ET, NO, DA, RU, SK, SL, PL, CS, HU, BG, TR, ZHTW, KO, ID, TL, TH GETTING STARTED
More informationPRICE LIST FEBRUARY 2017 SOFTWARE LICENSES
SOFTWARE LICENSES INLOOX PM PERSONAL LICENSES 1 InLoox PM 9 Personal single workplace license without network/server support InLoox PM 9 Personal Plus for use on a desktop and laptop computer without network/server
More informationJoining Collaborative and Content-based Filtering
Joining Collaborative and Content-based Filtering 1 Patrick Baudisch Integrated Publication and Information Systems Institute IPSI German National Research Center for Information Technology GMD 64293 Darmstadt,
More informationPRICE LIST JULY 2018 SOFTWARE LICENSES
SOFTWARE LICENSES INLOOX PM PERSONAL LICENSES 1 InLoox PM 10 Personal single workplace license without network/server support InLoox PM 10 Personal Plus for use on a desktop and laptop computer without
More informationCountry Large Bundle Minutes Small Bundle Minutes Total Monthly Minutes United Kingdom 1, ,140
1. What is ACN Globe Call? ACN Globe Call is a new tariff plan for the ACN Digital Phone Service (DPS) proposition. Customers now have a choice of selecting either ACN Globe Call or ACN Smart, depending
More informationMoving Professionals Forward. World Leader In Competence Based Certification
Moving Professionals Forward World Leader In Competence Based Certification Professionalism in a changing world The world is changing and project management is changing with it. IPMA is adapting: to the
More informationThe IECEx Ticket to Global Markets
The IECEx Ticket to Global Markets Extract from the tutorial at PCIC Europe 2008 Rudolf Pommé KEMA Quality NL Karel Neleman BARTEC NL With special thanks to co-authors: Mario Colpa BACAB CH Frédérique
More informationAdvanced Relational Database Management MISM Course S A3 Spring 2019 Carnegie Mellon University
Advanced Relational Database Management MISM Course S19-95736 A3 Spring 2019 Carnegie Mellon University Instructor: Randy Trzeciak Office: HBH 1104C Office hours: By Appointment Phone: 412-268-7040 E-mail:
More informationAlibi Routing. D. Levin, Y. Lee, L. Valenta Z. Li, V. Lai, C. Lumezanu N. Spring, B. Bhattacharjee SIGCOMM 2015
Alibi Routing D. Levin, Y. Lee, L. Valenta Z. Li, V. Lai, C. Lumezanu N. Spring, B. Bhattacharjee SIGCOMM 2015 Sniff sniff State agencies censor and log citizens internet traffic Abundant in certain regions
More informationTechnical Note. Programming the SST-PB3-VME-x for a Master or Slave in a VME Controller. Version: 1.1 Document #:
Technical Programming the SST-PB3-VME-x for a Master or Slave in a VME Controller Version: 1.1 Document #: 716-0014 Version: 1.1 Date: June 4, 2010 This document applies to the SST-PB3-VME-x interface
More informationTHE POWER OF A STRONG PARTNERSHIP.
THE POWER OF A STRONG PARTNERSHIP. Now you can harness a network of resources. Connections, knowledge, and expertise. All focused on your success. The Cisco Channel Partner Program. BE CONNECTED. Great
More informationStarTeamMPX Server. Publish/Subscribe Technology for StarTeam. By the Development Resources Platform Team. March, A Borland White Paper
Publish/Subscribe Technology for StarTeam A Borland White Paper By the Development Resources Platform Team March, 2003 Contents ebusiness Challenges... 3 /Server Challenges... 3 The StarTeam Solution...
More informationCorrectness of specifications. Correctness. Correctness of specifications (2) Example of a Correctness Proof. Testing versus Correctness Proofs
CS 390 Lecture 17 Correctness A product is correct if it satisfies its output specifications when operated under permitted conditions Correctness of specifications Incorrect specification for a sort (Figure
More informationKeysight Technologies 5G RF DVT Toolset. Solution Brief
Keysight Technologies 5G RF DVT Toolset Solution Brief 02 Keysight 5G RF DVT Toolset - Solution Brief The Fastest Path to 5G 5G brings a vast variety of services classified under three use case categories:
More informationFinding the Bias and Prestige of Nodes in Networks based on Trust Scores
WWW 2 Session: Social Network Analysis March 28 April, 2, Hyderabad, India Finding the Bias and Prestige of Nodes in Networks based on Trust Scores ABSTRACT Abhinav Mishra Dept. of Computer Science and
More informationAlgorithms: Graphs. Amotz Bar-Noy. Spring 2012 CUNY. Amotz Bar-Noy (CUNY) Graphs Spring / 95
Algorithms: Graphs Amotz Bar-Noy CUNY Spring 2012 Amotz Bar-Noy (CUNY) Graphs Spring 2012 1 / 95 Graphs Definition: A graph is a collection of edges and vertices. Each edge connects two vertices. Amotz
More informationComputer Science 280 Fall 2002 Homework 10 Solutions
Computer Science 280 Fall 2002 Homework 10 Solutions Part A 1. How many nonisomorphic subgraphs does W 4 have? W 4 is the wheel graph obtained by adding a central vertex and 4 additional "spoke" edges
More informationCS224W: Analysis of Networks Jure Leskovec, Stanford University
CS224W: Analysis of Networks Jure Leskovec, Stanford University http://cs224w.stanford.edu Chile Angola Gabon Ecuador Colombia Venezuela Canada Denmark Sweden Belgium-Lux Argentina Brazil Kuwait Untd Arab
More informationIPv6 Task Force Comment on Opinion 2/2002 Art. 29 Data Protection Working Party. February 25 th 2003 Brussels
IPv6 Task Force Comment on Opinion 2/2002 Art. 29 Data Protection Working Party February 25 th 2003 Brussels 1 Who is the IPv6 Task Force? The issue The IPv6 Task Force Position 2 3 IPv6 Task Force initiated
More informationBDI The Voice of German Industry. Mittelstand companies in the German economy
BDI The Voice of German Industry Mittelstand in the German economy Material for the conference of the Hellenic Federation of Enterprises (SEV): Roadmap for the growth of SMEs in Greece Athens, 21.02.2018
More informationProduct overview DETECT. PROTECT Connect.
Product overview DETECT. PROTECT Connect. ABOUT US Since 70 successful years always there for you BERNSTEIN AG, headquartered in Porta Westfalica, looks back on an eventful past that is linked directly
More informationMa/CS 6b Class 10: Ramsey Theory
Ma/CS 6b Class 10: Ramsey Theory By Adam Sheffer The Pigeonhole Principle The pigeonhole principle. If n items are put into m containers, such that n > m, then at least one container contains more than
More informationIsrael Internet Security Threat Profile
Israel Internet Security Threat Profile Worldwide Ranking.%.%.%.%.%.%.%.%.%.%.% Overall Average Spam Zombies Malicious Code Phishing Hosts Bots Network Attacking Countries Copyright Symantec Corporation.
More information1 01-Jan Jan Jan Jan Jan Jan Jan Feb Feb Feb Feb Feb-14
All page impressions from the same computer are summarised as one visit. The visits are uniquely identified on the basis of the IP address and the browser ID. As several people may share a computer (e.g.
More informationCENTER FOR SECURITY STUDIES
CENTER FOR SECURITY STUDIES Swiss Federal Institute of Technology (ETH Zurich) A Generic National Framework for Critical Information Infrastructure Protection 2nd WSIS Action Line C5 Meeting ITU Headquarters,
More informationSOCIAL media has become the primary platform for the
360 IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, VOL. 9, NO. 2, MARCH 2015 Using Social Sensors for Influence Propagation in Networks With Positive and Negative Relationships Basak Guler, Student
More informationBroadband Britain a mobile perspective
Broadband Britain a mobile perspective Professor Michael Walker Vodafone Executive Technology Advisor and Vodafone Professor of Telecommunications, Royal Holloway, University of London NICC Open Forum,
More informationGeocaching. The Crean Award: The Activity: Objective: To try out geocaching with your patrol. SPICES Intellectual Character
The Crean Award: Discovery: Patrol Activity Skills Endurance: Planning Develop Teamwork Skills SPICES Intellectual Character Geocaching Terra Nova: Task/Role in Patrol Patrol Activity Skills Polar: Skills
More informationLecture 4: Petersen Graph 2/2; also, Friendship is Magic!
Spectral Graph Theory Instructor: Padraic Bartlett Lecture 4: Petersen Graph /; also, Friendship is Magic! Week 4 Mathcamp 0 We did a ton of things yesterday! Here s a quick recap:. If G is a n, k, λ,
More informationEnterprise price plan guide Vodafone One Net Business
This Price Plan Guide applies to the price plans and is incorporated into the Commercial Terms between Vodafone and Customer and, together with the One Net General Terms and Conditions and Mobile Service
More informationMa/CS 6b Class 12: Ramsey Theory
Ma/CS 6b Class 12: Ramsey Theory By Adam Sheffer The Pigeonhole Principle The pigeonhole principle. If n items are put into m containers, such that n > m, then at least one container contains more than
More informationG52CON: Concepts of Concurrency
G52CON: Concepts of Concurrency Lecture 6: Algorithms for Mutual Natasha Alechina School of Computer Science nza@cs.nott.ac.uk Outline of this lecture mutual exclusion with standard instructions example:
More informationCISCO 7304 SERIES ROUTER PORT ADAPTER CARRIER CARD
DATA SHEET CISCO 7304 SERIES ROUTER PORT ADAPTER CARRIER CARD The Cisco 7304 Router, part of the industry-leading Cisco 7000 Series, is optimized to deliver flexible, high-performance IP and Multiprotocol
More informationAlgorithms, Games, and Networks February 21, Lecture 12
Algorithms, Games, and Networks February, 03 Lecturer: Ariel Procaccia Lecture Scribe: Sercan Yıldız Overview In this lecture, we introduce the axiomatic approach to social choice theory. In particular,
More informationEconomics of Information Networks
Economics of Information Networks Stephen Turnbull Division of Policy and Planning Sciences Lecture 4: December 7, 2017 Abstract We continue discussion of the modern economics of networks, which considers
More informationTie strength, social capital, betweenness and homophily. Rik Sarkar
Tie strength, social capital, betweenness and homophily Rik Sarkar Networks Position of a node in a network determines its role/importance Structure of a network determines its properties 2 Today Notion
More informationStep 1: New Portal User User ID Created Using IdentityIQ (IIQ)
Rockwell Automation PartnerNetwork Portal Single Sign-on (SSO) Login to Rockwell Automation PartnerNewtork Portal for Commercial Programs Participants Scope: This job aid provides instructions on how to
More informationLesson 18: There is Only One Line Passing Through a Given Point with a Given
Lesson 18: There is Only One Line Passing Through a Given Point with a Given Student Outcomes Students graph equations in the form of using information about slope and intercept. Students know that if
More informationALL-IN-ONE PRESENTATION SYSTEMS
ALL-IN-ONE PRESENTATION SYSTEMS VS-88UT VS-622DT KramerAV.com WHEN KRAMER SET OUT TO BUILD THE AV INDUSTRIES MOST VERSATILE FAMILY OF ALL-IN-ONE PRESENTATION SYSTEMS THE GOAL WAS SIMPLE, CREATE A LINE
More informationDistributed Key Value Store Utilizing CRDT to Guarantee Eventual Consistency
Distributed Key Value Store Utilizing CRDT to Guarantee Eventual Consistency CPSC 416 Project Proposal n6n8: Trevor Jackson, u2c9: Hayden Nhan, v0r5: Yongnan (Devin) Li, x5m8: Li Jye Tong Introduction
More informationAdvanced Relational Database Management MISM Course F A Fall 2017 Carnegie Mellon University
Advanced Relational Database Management MISM Course F17-95736A Fall 2017 Carnegie Mellon University Instructor: Randy Trzeciak Office: HBH 1104C Office hours: By Appointment Phone: 412-268-7040 E-mail:
More informationAlgorithms and Applications in Social Networks. 2017/2018, Semester B Slava Novgorodov
Algorithms and Applications in Social Networks 2017/2018, Semester B Slava Novgorodov 1 Lesson #1 Administrative questions Course overview Introduction to Social Networks Basic definitions Network properties
More information2009 HMMT Team Round. Writing proofs. Misha Lavrov. ARML Practice 3/2/2014
Writing proofs Misha Lavrov ARML Practice 3/2/2014 Warm-up / Review 1 (From my research) If x n = 2 1 x n 1 for n 2, solve for x n in terms of x 1. (For a more concrete problem, set x 1 = 2.) 2 (From this
More informationComputer
2011-2014 Computer 2014.12. Contents 1. 2011-2013 China Computer Export Trend Analysis... 3 1.1. 2011-2013 China Computer Export Quantity Trend Analysis... 3 1.2. 2011-2013 China Computer Export Amount
More informationLATIN SQUARES AND TRANSVERSAL DESIGNS
LATIN SQUARES AND TRANSVERSAL DESIGNS *Shirin Babaei Department of Mathematics, University of Zanjan, Zanjan, Iran *Author for Correspondence ABSTRACT We employ a new construction to show that if and if
More informationOpenStack Changing the shape of Open Source Cloud Computing. Tom Fifield Community Manager, OpenStack Foundation
1 OpenStack Changing the shape of Open Source Cloud Computing Tom Fifield Community Manager, OpenStack Foundation tom@openstack.org 3 What is OpenStack? More than cloud infrastructure software a global
More informationLecture 13 Geometry and Computational Geometry
Lecture 13 Geometry and Computational Geometry Euiseong Seo (euiseong@skku.edu) 1 Geometry a Branch of mathematics concerned with questions of shape, size, relative position of figures, and the properties
More informationClimbing Towards Trust, Privacy and Identity Management in Emerging ICT-based Scenarios
Climbing Towards Trust, Privacy and Identity Management in Emerging ICT-based Scenarios First Endeavour: Requirements 26 November 2008 @ ICT 2008, Lyon Katja Liesebach Chair for Mobile Business & Multilateral
More informationMeasures of prestige
A. Mrvar: Network Analysis using Pajek 1 Measures of prestige Prestige measures are usually computed for directed networks only, since for this measures the direction is important property of the relation.
More informationGraph theory. Po-Shen Loh. June We begin by collecting some basic facts which can be proved via bare-hands techniques.
Graph theory Po-Shen Loh June 013 1 Basic results We begin by collecting some basic facts which can be proved via bare-hands techniques. 1. The sum of all of the degrees is equal to twice the number of
More informationGerman Research Strategy in the Area of Civil Security Research
8th Interdisciplinary Workshop on Global Security WISG 2014 German Research Strategy in the Area of Civil Security Research Eckhart Curtius Federal Ministry of Education and Research Division Security
More informationOverview of Organizational Structures and System Architectures. Joel Moses February 2006
Overview of Organizational Structures and System Architectures Joel Moses February 2006 Some assumptions/biases Generic system architectures and generic organizational structures have much in common A
More informationEventBuilder.com. International Audio Conferencing Access Guide. This guide contains: :: International Toll-Free Access Dialing Instructions
EventBuilder.com International Audio Conferencing Access Guide TM This guide contains: :: International Toll-Free Access Dialing Instructions :: ATFS (Access Toll-Free Service) Dialing Instructions ::
More informationCS224W: Analysis of Networks Jure Leskovec, Stanford University
CS224W: Analysis of Networks Jure Leskovec, Stanford University http://cs224w.stanford.edu 11/13/17 Jure Leskovec, Stanford CS224W: Analysis of Networks, http://cs224w.stanford.edu 2 Observations Models
More informationGlobal Education Challenge Help Guides. Part 1 Setup and Use Office365
Global Education Challenge Help Guides Part 1 Setup and Use Office365 Contents 1 Sign in to Office 365 2 Check and reply to Email 3 Using Lync, and downloading the app 4 Installing Office 5 Using Yammer
More informationAlgorithms. Graphs. Algorithms
Algorithms Graphs Algorithms Graphs Definition: A graph is a collection of edges and vertices. Each edge connects two vertices. Algorithms 1 Graphs Vertices: Nodes, points, computers, users, items,...
More informationKeysight Technologies Using Source/Measure Unit as an Ammeter
Keysight Technologies Using Source/Measure Unit as an Ammeter B2900A Precision Source/Measure Unit Demo Guide 02 Keysight Using Source/Measure Unit as an Ammeter Demo Guide Introduction The Keysight B2900A
More informationASME Conformity Assessment: Statistics, Process, and CA Connect. Dan Sharp Manager, Process Management Dept. August 10, 2016
ASME Conformity Assessment: Statistics, Process, and CA Connect Dan Sharp Manager, Process Management Dept. August 10, 2016 Topics ASME Conformity Assessment Statistics Overview of the Certification Process
More informationThe State of Mobile Advertising Q2 2012
Q2 2012 Executive summary In our first edition of the State of Mobile Advertising report, we take an in-depth look at the monetization of mobile advertising from four perspectives within the ad delivery
More informationCS249: ADVANCED DATA MINING
CS249: ADVANCED DATA MINING Recommender Systems II Instructor: Yizhou Sun yzsun@cs.ucla.edu May 31, 2017 Recommender Systems Recommendation via Information Network Analysis Hybrid Collaborative Filtering
More informationThe 6net project An IPv6 testbed for the European Community Gunter Van de Velde, Cisco Systems
The 6net project An IPv6 testbed for the European Community Gunter Van de Velde, gvandeve@cisco.com Infrastructure of the 6NET-Project What is the initial goal? To keep initial setup simple Create awareness
More information