Dissertations / Theses on the topic 'Preferential attachment'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 18 dissertations / theses for your research on the topic 'Preferential attachment.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Mönch, Christian. "Distances in preferential attachment networks." Thesis, University of Bath, 2013. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.607617.
Full textPeterson, Nicholas Richard. "On Random k-Out Graphs with Preferential Attachment." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1370527839.
Full textHébert-Dufresne, Laurent. "On the growth and structure of social systems following preferential attachment." Doctoral thesis, Université Laval, 2014. http://hdl.handle.net/20.500.11794/25331.
Full textSocial systems are notoriously unfair. In this thesis, we focus on the distribution and structure of shared resources and activities. Through this lens, their extreme inequalities tend to roughly follow a universal pattern known as scale independence which manifests itself through the absence of a characteristic scale. In physical systems, scale-independent organizations are known to occur at critical points in phase transition theory. The position of this critical behaviour being very specific, it is reasonable to expect that the distribution of a social resource might also imply specific mechanisms. This analogy is the basis of this work, whose goal is to apply tools of statistical physics to varied social activities. As a first step, we show that a system whose resource distribution is growing towards scale independence is subject to two constraints. The first is the well-known preferential attachment principle, a mathematical principle roughly stating that the rich get richer. The second is a new general form of delayed temporal scaling between the population size and the amount of available resource. These constraints pave a precise evolution path, such that even an instantaneous snapshot of a distribution is enough to reconstruct its temporal evolution and predict its future states. We validate our approach on diverse spheres of human activities ranging from scientific and artistic productivity, to sexual relations and online traffic. We then broaden our framework to not only focus on resource distribution, but to also consider the resulting structure. We thus apply our framework to the theory of complex networks which describes the connectivity structure of social, technological or biological systems. In so doing, we propose that an important class of complex systems can be modelled as a construction of potentially infinitely many levels of organization all following the same universal growth principle known as preferential attachment. We show how real complex networks can be interpreted as a projection of our model, from which naturally emerge not only their scale independence, but also their clustering or modularity, their hierarchy, their fractality and their navigability. Our results suggest that social networks can be quite simple, and that the apparent complexity of their structure is largely a reflection of the complex hierarchical nature of our world.
Chin-Lee, Jao-ke. "How to Win Ratings and Influence Reviewers: Preferential Attachment in Rating Systems." Thesis, Harvard University, 2015. http://nrs.harvard.edu/urn-3:HUL.InstRepos:14398548.
Full textYoussef, Bassant El Sayed. "Models for the Generation of Heterogeneous Complex Networks." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/54009.
Full textPh. D.
Maia, Rodrigo Filev. "Uma arquitetura de controle de qualidade de serviço aplicada a redes heterogêneas e serviços convergentes." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-16082010-130303/.
Full textOne of the targets of the next generation communication systems is to provide access to any service, to any user, anytime, anywhere, regardless the access network technology or type of user device (mobile phone, PDA, personal computer, and so on). This scenario is called convergence of services by heterogeneous networks, and in such scenario quality of service mechanisms presented in legacy communication systems do not provide mechanisms for interoperability between communication systems nor control data flows after control admission in the border of the communication systems. The heterogeneous handover is also not handled by such QoS architectures. This thesis proposes a QoS control architecture for an heterogeneous communication systems composed by IP backbones and several access networks for several kind of technologies. This architecture is composed by a multiagent system and has controls based on the local behavior of the communication system and supported by complex systems theory. The agent decision algorithm is based on preferential attachment concept and the experimentation results indicate that agents could identify a better path to handle a data flow according to QoS parameters. The agents decided to change the path used to transmit the flow data autonomously and according to quality of service contract between user and service provider. The measurements in the test based on preferential attachment algorithm was useful in order agent change flow data path during data flow transmission to other paths with better conditions according to QoS requisites. The agent decision is based on the parameter values defined between end user and service provider. Considering the control elements from proposed architecture it was achieved end-to-end distributed control.
Dabkowski, Matthew Francis. "Using Network Science to Estimate the Cost of Architectural Growth." Diss., The University of Arizona, 2016. http://hdl.handle.net/10150/612431.
Full textZheng, Huanyang. "SOCIAL NETWORK ARCHITECTURES AND APPLICATIONS." Diss., Temple University Libraries, 2017. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/470889.
Full textPh.D.
Rather than being randomly wired together, the components of complex network systems are recently reported to represent a scale-free architecture, in which the node degree distribution follows power-law. While social networks are scale-free, it is natural to utilize their structural properties in some social network applications. As a result, this dissertation explores social network architectures, and in turn, leverages these architectures to facilitate some influence and information propagation applications. Social network architectures are analyzed in two different aspects. The first aspect focuses on the node degree snowballing effects (i.e., degree growth effects) in social networks, which is based on an age-sensitive preferential attachment model. The impact of the initial links is explored, in terms of accelerating the node degree snowballing effects. The second aspect focuses on Nested Scale-Free Architectures (NSFAs) for social networks. The scale-free architecture is a classic concept, which means that the node degree distribution follows the power-law distribution. `Nested' indicates that the scale-free architecture is preserved when low-degree nodes and their associated connections are iteratively removed. NSFA has a bounded hierarchy. Based on the social network structure, this dissertation explores two influence propagation applications for the Social Influence Maximization Problem (SIMP). The first application is a friend recommendation strategy with the perspective of social influence maximization. For the system provider, the objective is to recommend a fixed number of new friends to a given user, such that the given user can maximize his/her social influence through making new friends. This problem is proved to be NP-hard by reduction from the SIMP. A greedy friend recommendation algorithm with an approximation ratio of $1-e^{-1}$ is proposed. The second application studies the SIMP with the crowd influence, which is NP-hard, monotone, non-submodular, and inapproximable in general graphs. However, since user connections in Online Social Networks (OSNs) are not random, approximations can be obtained by leveraging the structural properties of OSNs. The modularity, denoted by $\Delta$, is proposed to measure to what degree this problem violates the submodularity. Two approximation algorithms are proposed with ratios of $\frac{1}{\Delta+2}$ and $1-e^{-1/(\Delta+1)}$, respectively. Beside the influence propagation applications, this dissertation further explores three different information propagation applications. The first application is a social network quarantine strategy, which can eliminate epidemic outbreaks with minimal isolation costs. This problem is NP-hard. An approximation algorithm with a ratio of 2 is proposed through utilizing the problem properties of feasibility and minimality. The second application is a rating prediction scheme, called DynFluid, based on the fluid dynamics. DynFluid analogizes the rating reference among the users in OSNs to the fluid flow among containers. The third application is an information cascade prediction framework: given the social current cascade and social topology, the number of propagated users at a future time slot is predicted. To reduce prediction time complexities, the spatiotemporal cascade information (a larger size of data) is decomposed to user characteristics (a smaller size of data) for subsequent predictions. All these three applications are based on the social network structure.
Temple University--Theses
Luo, Hongwei, and Hongwei luo@rmit edu au. "Modelling and simulation of large-scale complex networks." RMIT University. Mathematical and Geospatial Sciences, 2007. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080506.142224.
Full textSantos, Bruno Vitorio dos. "Múltiplos assuntos no modelo de opiniões contínuas e ações discretas (CODA)." Universidade de São Paulo, 2013. http://www.teses.usp.br/teses/disponiveis/100/100132/tde-11122013-163456/.
Full textUnderstanding processes leading to extremism is invaluable to prevent violence outbursts. Models are useful tools that allow for identifying patterns related to those processes. Nevertheless, discrete models and bounded-confidence continuous models are unfit for studying diversion-based dynamics. We present a cultural extension of CODA model, with multiple subjects selected through a preferential attachment rule. Agents are influenced in their opinions and relevance attributed to different subjects. The most notable results of the dynamics are the establishment of local subject preferences and consensus, associated with more extreme opinions. On the other hand, there is persistence of immature undeveloped opinion in the locally less regarded subjects. The study of parametric space has shown that settings reducing the locality of interactions both increase the majority size and make opinions less extreme. Two distinct debate strategies were simulated. Zealots increase conversions when spread throughout the network. In contrast, subject avoiders decrease the number of unwanted interactions by grouping together. Some ideas for introducing media influence to the model were outlined
Ma, Qi. "Reinforcement in Biology : Stochastic models of group formation and network construction." Doctoral thesis, Uppsala universitet, Analys och tillämpad matematik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-186989.
Full textBetken, Carina. "Limit theorems in preferential attachment random graphs." Doctoral thesis, 2019. https://repositorium.ub.uni-osnabrueck.de/handle/urn:nbn:de:gbv:700-201905171547.
Full text(10177886), Valentina Concu. "Preferential Attachment and Language Change: werden in German." Thesis, 2021.
Find full textDuan, Cheng-Yu, and 段正有. "Exploring the impact of preferential attachment on social media." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/ghpgwh.
Full text輔仁大學
資訊管理學系碩士班
107
Nowdays, the social media and internet users are universal, users’ choice of social media is increasing, but users have different needs for choosing social media, in addition, does the users sharing of knowledge on social media have an impact on their personal needs? However, this study explore the perspectives of preferential attachment, self-referential value, group reference value and entertainment reference value, trying to explore the impact of preferential attachment , self-referential value, group reference value and entertainment reference on social media, three values have an impact on the choice and use of social media, and understand the users knowledge sharing intentions. This study sets the research community to the professional community members in the social media, and conduct an online survey by electronic questionnaire, this study assumes that the three facets of self-reference value, group reference value and entertainment reference will affect users choice of community media, community belonging and knowledge sharing intention; It is also assumed that the continued use of social media by users will affect the users sense of belonging to the community and the intention to share knowledge because of the preferential attachment. Measuring user preferential attachment, knowledge sharing intentions as a way to measure the impact of social media usage, after, this study will use the statistical analysis software to confirm the consistency, stability and reliability of the test results the reliability and validity of the questionnaire, in addition, this study also through Independent-Sample T test test this study whether have nonresponse error, to confirm the findings of this study. In the end, hypothetical inferences are analyzed through structural equation model to understand their statistical inferences. After collecting 155 usable responses, this study finding self-reference value, group reference value and entertainment reference had positive correlation with social belonging, the self-reference value, group reference value and entertainment reference had positive correlation with preferential attachment, the self-reference value, group reference value and entertainment reference had positive correlation with knowledge sharing intentions, the preferential attachment had positive correlation with knowledge sharing intentions, but preferential attachment had not positive correlation with social belonging, the entertainment reference had not positive correlation with preferential attachment, the social belonging had not positive correlation with knowledge sharing intentions. Finally in the practical meaning, we conclude about theortical and managerial implications propose discussion and conclusion.
Bloem-Reddy, Benjamin Michael. "Random Walk Models, Preferential Attachment, and Sequential Monte Carlo Methods for Analysis of Network Data." Thesis, 2017. https://doi.org/10.7916/D8348R5Q.
Full textWan, Phyllis. "Application of Distance Covariance to Extremes and Time Series and Inference for Linear Preferential Attachment Networks." Thesis, 2018. https://doi.org/10.7916/D8Q25GQB.
Full textChen, Po-Ting, and 陳柏廷. "A study to probe emotional feeling and preferential attachment toward different shapes of bonsai based on professional viewpoint." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/57790740351589923806.
Full text東海大學
景觀學系
99
There is a variety of plants in Taiwan bonsai. As a bonsai is a miniature of natural landscape, many people like to use it for gardening or indoor decoration. The bonsai is one part of plant growing, and the plant growing is an essential element in landscape. Over the past few years on discussing the landscape, most of the researches focused on the aesthetics and the space layout of plant growing, and most of the probes were made based on the linear and plane dimensions. As to the research on single element “bonsai”, the research cases were very few, and could be counted on the fingers of one hand. Taiwan bonsai has its unique characters. This essay will probe into the unique characters and the cultural values of the representative and valuable bonsai of Taiwan through the experts and the literature reviews. This essay is expected to be informative to the Taiwan bonsai creators. As to the general public, this essay is expected to be able to help them to discover the cultural values and the charm behind the bonsai when they make selections on bonsai.
Grining, Krzysztof. "Privacy-preserving protocols in unreliable distributed systems." Doctoral thesis, 2020. https://depotuw.ceon.pl/handle/item/3778.
Full textPrzedmiotem tej rozprawy s ˛a wybrane problemy agregacji danych z zachowaniem prywatnosci. Rozprawa jest oparta o ´ prywatnos´c ró ´ znicow ˛a ˙ (differential privacy), która, w odróznieniu od wcze ˙ sniejszych definicji prywatno ´ sci, jest oparta na for- ´ malizmie matematycznym. Prywatnos´c ró ´ znicowa wi ˛a ˙ ze si˛e z odpowiedni ˛a ran- ˙ domizacj ˛a wyniku. Interesuj ˛a nas praktyczne scenariusze, wi˛ec rozwazamy agre- ˙ gacje w rozproszonych systemach z zawodnymi w˛ezłami i niezaufanym agregatorem. Zaczniemy od przeanalizowania aktualnego rozwi ˛azania problemu i wskazania, ze pomimo dobrych asymptotycznych gwarancji dokładno ˙ sci, w wielu prakty- ´ cznych scenariuszach bł˛edy wynikaj ˛ace z dodanych szumów s ˛a nieakceptowalnie duze. Nast˛epnie proponujemy skonstruowany przez nas protokół, który wyko- ˙ rzystuje ograniczon ˛a, lokaln ˛a komunikacj˛e pomi˛edzy w˛ezłami. Pokazujemy, ze˙ nasz protokół zapewnia dowodliw ˛a prywatnos´c oraz jest znacznie dokładniejszy, ´ nawet gdy wiele w˛ezłów jest zawodnych. Nast˛epnie, aby nasze wyniki były uzyteczne w szerszej klasie scenariuszy, pokazu- ˙ jemy jak skonstruowac lokalne grupy ufaj ˛acych sobie w˛ezłów w realistycznych ´ sieciach. Rozwazamy rozproszony system składaj ˛acy si˛e z w˛ezłów, które musz ˛a ˙ stworzyc du ´ z ˛a, spójn ˛a grup˛e w sposób efektywny i bez znajomo ˙ sci topologii sieci. ´ Proponujemy i badamy lokalne strategie konstruowania duzych grup z małym ˙ narzutem komunikacyjnym i obliczeniowym. Ponadto udowadniamy niektóre własnosci prawdziwych sieci przy zało ´ zeniu, ˙ ze pochodz ˛a z modelu ˙ preferential attachment. Na koniec koncentrujemy si˛e na samej definicji prywatnosci. Rozwa ´ zamy, znane ˙ wczesniej, osłabienie prywatno ´ sci ró ´ znicowej, ˙ noiseless privacy, wykorzystuj ˛ace ograniczon ˛a losowos´c danych. Mo ´ ze ona równie ˙ z modelowa ˙ c niepewno ´ s´c adw- ´ ersarza. W odróznieniu od istniej ˛acych wyników, które skupiały si˛e na wynikach ˙ asymptotycznych, niezaleznych danych i konkretnych rozkładach danych, przed- ˙ stawiamy nieasymptotyczne gwarancje prywatnosci dla dowolnych rozkładów i ´ szerokiej klasy zalezno ˙ sci. Pokazujemy jak poł ˛aczy ´ c prywatno ´ s´c ró ´ znicow ˛a z ˙ noiseless privacy oraz przedstawiamy precyzyjne wyniki, które mog ˛a byc łatwo ´ wykorzystane w praktycznych zastosowaniach agregacji danych.