1 / 115

Davis Social Links

Davis Social Links. S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu http://www.cs.ucdavis.edu/~wu/. Internet Architecture & Routing. Applications with Tests. Internet Architecture & Routing.

anitra
Télécharger la présentation

Davis Social Links

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu http://www.cs.ucdavis.edu/~wu/

  2. Internet Architecture & Routing Applications with Tests

  3. Internet Architecture & Routing • Any identity (email address, IP, url) can communicate with any one else. • Email, web, bittorrent, warcraft, skype…

  4. Social-Control Routing Applications with Tests 3 2 1

  5. The value of the “Network” • A concern about a network losing its “value” • while we are unsure about how to quantify the true value…

  6. Open Issues • What is the “value” of this social network? • How would this “value” be distributed and allocated to each individual peers? • MySpace, Facebook, LinkedIn didn’t define the “game” for network formation and value allocation. • But, it is important to design the game such that the OSN will eventually converge to a state to best support the communities.

  7. Social Network Games

  8. Fighter’s Club • A Coalition game ~ like Warcraft • Team members who are Facebook friends receive higher fighting powers • ~1400 new friendships established daily • ~10% of users with >95% friendships purely based on this game.

  9. Facebook versus Personal Web Site • WWW: everybody can see it • Facebook: a selected set of people on your social network can see it

  10. Activities, Knowledge Sharing, and Social Relationship Scalability, Privacy, Trust, Robustness, Performance…

  11. Social Network Applications • Social-based collaborative filtering • Recommendation • Privacy-control • Advertising

  12. Urgent! Please contact me! FROM:MR.CHEUNG PUI Hang Seng Bank Ltd Sai Wan Ho Branch 171 Shaukiwan Road Hong Kong. Please contact me on my personal box [puicheungcheungpui@yahoo.com] Let me start by introducing myself. I am Mr. Cheung Pui, director of operations of the Hang Seng Bank Ltd,Sai Wan Ho Branch. I have a obscured business suggestion for you. Before the U.S and Iraqi war our client Major Fadi Basem who was with the Iraqi forces and also business man made a numbered fixed deposit for 18 calendar months, with a value of Twenty Four millions Five Hundred Thousand United State Dollars only in my branch. Upon maturity several notice was sent to him,…

  13. http://www.ebolamonkeyman.com/cheung.htm

  14. Pick your favor Spam Filter(s)

  15. This was considered a spam!

  16. This was considered a spam! Sometimes, the cost of False Positive may be very high…

  17. The Implication of FP’s • Spam-filters have to be conservative… • We will have some false negatives in our own inboxes. • We will use our own time to further filter.. • For me, 1~2 seconds per email

  18. The emails I received just THIS morning…

  19. You have about 1 second to decide……

  20. “Social Spams” • They might not be spams as we often overlooked the social values of them!

  21. Motivations • The value of social communication • To leverage • To protect

  22. Communicate: [A, D] B D A C As long as “A” knows “D’s routable identity”

  23. Hijackable Routable Identify

  24. [A,D] + social context B D A C “A” has to explicitly declare if there is any social context under this communication activity with “D”!

  25. Internet & Routable Identity • URL, IP address, email,…. • For ANYWHERE in the Internet • Without Routable Identity • Only available to certain parts of Social Networks • Using OSN to perform access control

  26. Who is Salma?

  27. Who is Salma?

  28. Who is Salma?

  29. My message to Salma

  30. The Social Path(s)

  31. “Optimality” • Not necessarily “the shortest path” • Social context consideration

  32. More Examples

  33. CyrusDSL • How do we accomplish these features? • How do we realize the concepts scaleable? • How will this system work against spams?

  34. Just a couple issues … • How to establish the social route? • How would “A” know about “D” (or “D’s identity”) ? • How to maintain this “reputation network”? • MessageReaper: A Feed-back Trust Control System (Spear/Lang/Lu)

  35. [A,D] + social context ?? B D A C “A” has to explicitly declare if there is any social context under this communication activity with “D”! But, “D” only cares if it is from “C” or not!

  36. Search on “OSN” • How to get to from ? • The Small world model • 6 degree separation (Milgram, 1967) • “existence of a short path” • How to find the short path? (Kleinberg, 2000)

  37. Re-wiring (Watts/Strogatz) Structured/Clustered 62 35 Trade off between D and Ccluster !

  38. Routing in a Small World • Common question: do short paths exist? • Algorithmic question: assuming short paths exist. How do people find them?

  39. Kleinberg’s results A decentralized routing problem • For nodes s,t with known lattice coordinates, find a short path from s to t. • At any step, can only use local information, • Kleinberg suggests a simple greedy algorithm and analyzes it:

  40. Kleinberg’s Model • Use only Local information, except the distance to the target. • However, what is the “global distance” in cyber space? Yet, the assumption behind is that the “edges” depend on the “relative distance”.

More Related