2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2011
DOI: 10.1109/infcomw.2011.5928936
|View full text |Cite
|
Sign up to set email alerts
|

A complex network analysis of human mobility

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
53
0
2

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 79 publications
(56 citation statements)
references
References 19 publications
1
53
0
2
Order By: Relevance
“…In the six communication systems examined in this study, the distributions of the strengths of social relationships d showed power law distributions (Fig. 1), similar to those observed in previous studies (Arnaboldi et al, 2012;Song et al, 2012;Fujihara and Miwa, 2014;Hossmann et al, 2011;Hu et al, 2012). Individuals selected social grooming partners in proportion to the strength of their social relationships, that is, the individuals tended to reinforce their strong social relationships; these power law distributions were generated by the Yule-Simon process (Yule, 1925;Simon, 1955;Newman, 2005) (Fig.…”
Section: Introductionsupporting
confidence: 89%
See 3 more Smart Citations
“…In the six communication systems examined in this study, the distributions of the strengths of social relationships d showed power law distributions (Fig. 1), similar to those observed in previous studies (Arnaboldi et al, 2012;Song et al, 2012;Fujihara and Miwa, 2014;Hossmann et al, 2011;Hu et al, 2012). Individuals selected social grooming partners in proportion to the strength of their social relationships, that is, the individuals tended to reinforce their strong social relationships; these power law distributions were generated by the Yule-Simon process (Yule, 1925;Simon, 1955;Newman, 2005) (Fig.…”
Section: Introductionsupporting
confidence: 89%
“…O n the basis of the social brain hypothesis (Byrne and Whiten, 1989;Whiten and Byrne, 1997;Dunbar, 2000;Dunbar, 2003), an explanation of social structures, which are typical for humankind, is expected to offer knowledge about human origins, such as the limitation on the number of social relationships (Dunbar, 2000;Dunbar, 2003;Hill and Dunbar, 2003;Gonçalves et al, 2011;Arnaboldi et al, 2013a) and the skewness of social relationships (Zhou et al, 2005;Hossmann et al, 2011;Arnaboldi et al, 2012;Hu et al, 2012;Song et al, 2012;Arnaboldi et al, 2013b;Fujihara and Miwa, 2014), that is, its distributions following a power law (Hossmann et al, 2011;Arnaboldi et al, 2012;Hu et al, 2012;Pachur et al, 2012;Song et al, 2012;Fujihara and Miwa, 2014). These social structures may be caused by human beings' social grooming strategies (Dunbar, 2004).…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…For the detection of some network packets, judge the port and the data segment content directly, the detection efficiency is relatively high. But because the intrusion system is aimed at all packet are detected one by one to determine whether exhibit aggressive behavior, so should follow t he common features of first detection of all attacks and then the individual characteristics of the principle, for example: if the first detection of 1P address [14], once found that does not belong to the detection range, immediately detects the next data package and not continue to test the data packets in the other field. This ensures that the efficiency of the whole detection system, but also improves the real-time alarm.…”
Section: Establishing a Model To Describementioning
confidence: 99%