Show simple item record

dc.contributor.authorRudolph, Larry
dc.contributor.authorZhenghao, Chen
dc.date.accessioned2005-12-14T19:42:37Z
dc.date.available2005-12-14T19:42:37Z
dc.date.issued2006-01
dc.identifier.urihttp://hdl.handle.net/1721.1/30288
dc.description.abstractSocial networks have been used to understand how information flows through an organization as well as identifying individuals that appear to have control over this information flow. Such individuals are identified as being central nodes in a graph representation of the social network and have high "betweenness" values. Rather than looking at graphs derived from email, on-line forums, or telephone connections, we consider sequences of bipartite graphs that represent face-to-face meetings between individuals, and define a new metric to identify the information elite individuals. We show that, in our simulations, individuals that attend many meetings with many different people do not always have high betweenness values, even though they seem to be the ones that control the information flow.en
dc.description.sponsorshipSingapore-MIT Alliance (SMA)en
dc.format.extent2219317 bytes
dc.format.mimetypeapplication/pdf
dc.language.isoenen
dc.relation.ispartofseriesComputer Science (CS)en
dc.subjectsocial networksen
dc.subjectuniversal hashingen
dc.subjectprivacyen
dc.subjectinformation flowen
dc.subjectpervasive computingen
dc.subjectface-to-face meetingsen
dc.subjectmodelsen
dc.subjectlocation trackingen
dc.titleModeling Information Flow in Face-to-Face Meetings while Protecting Privacyen
dc.typeArticleen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record