The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The proliferation of new social media technologies has changed the behavioral patterns of online users. This study aims at investigating the structure and dimensionality of the Online Social Network Dependency (OSN Dependency). We tested the competing models built upon the cognitive-behavioral model and the biopsychogical framework of addiction. Our findings suggested that OSN Dependency can be explained...
High definition video streams are gaining larger shares of the Internet usage for typical users on daily basis. This is an expected result of the current boom in the online standard and high definition (HD) video streaming services such as YouTube and Hulu. Because of these video streams' unique statistical characteristics and their high bandwidth requirements, they are considered to be a continuous...
Cross Site Scripting Worms, are malicious programs that propagates through visitors of a website in attempt to infect other visitors progressively. Cross site scripting vulnerabilities are exploited in many forms; one of the common forms is using worms on popular social websites, such as MySpace and Facebook. In this paper first we suggest a general model based on our discussions. Then we simulate...
Large scale simulation studies, such as routing in communication systems, rely on complex networks. However, the specific network structure of the application domain is often neglected in analysing network behaviour with the consequence of limited ability to conduct a sensitivity analyses. Network evolution models have been developed to account for structural properties of social graphs, such as the...
Random walk (RW) has been widely used as a strategy for searching in peer-to-peer networks. The boom of social network applications introduces new impact to the classical algorithms on the Internet. In this paper, we model the random walk algorithm in peer-to-peer networks when social information is available. We define the social relationship between two nodes as the knowledge about the resources...
Summary form only given. We summarize our ongoing integrated program to represent and reason about very large co-evolving social, technological, information and organization (STIO) networks. The program comprises of four basic elements: (i) a mathematical and computational theory of co-evolving STIO networks, (ii) methods for integrating diverse data sources to generate synthetic representations of...
Online social networking sites like YouTube are among the most popular sites on the Internet. Understanding these user sessions is important, both to improve current systems and to design new applications of online social networks. This paper reports on the results of a multiscale analysis of user session in traffic traces captured at the edge in campus network. The analyzed traffic is characterized...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.