skip to main content
10.1145/1287791.1287810acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article

Visualizing community detection in opportunistic networks

Authors Info & Claims
Published:14 September 2007Publication History

ABSTRACT

Community is an important attribute of Pocket Switched Networks (PSNs), since mobile devices are carried by people who tend to belong to communities in their social life. We discover the heterogeneity of human interactions such as community formation from real world human mobility traces. We have introduced novel distributed community detection approaches and evaluated with those traces [11]. This paper describes a series of visualizations to show characteristics of human mobility traces including community detection. We focus on extracting information related to levels of clustering, network transitivity, and strong community structure. The progression of the connection map along the community formation process is also visualized.

References

  1. Wireless Rope, http://sourceforge.net/projects/wirelessrope, 2006.Google ScholarGoogle Scholar
  2. A. Chaintreau et al. Impact of human mobility on the design of opportunistic forwarding algorithms. In Proc. INFOCOM, April 2006.Google ScholarGoogle ScholarCross RefCross Ref
  3. A. Clauset. Finding local community structure in networks. Physical Review E, 72:026132, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  4. D. College. A community resource for archiving wireless data at dartmouth, http://crawdad.cs.dartmouth.edu/index.php, 2007.Google ScholarGoogle Scholar
  5. L. Danon, J. Duch, A. Diaz-Guilera, and A. Arenas. Comparing community structure identification, 2005.Google ScholarGoogle Scholar
  6. C. Diot et al. Haggle Project, http://www.haggleproject.org, 2004.Google ScholarGoogle Scholar
  7. N. Eagle and A. Pentland. Reality mining: sensing complex social systems. Personal and Ubiquitous Computing, V10(4):255--268, May 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. K. Fall. A delay-tolerant network architecture for challenged internets. In Proc. SIGCOMM, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. P. Hui and J. Crowcroft. Bubble rap: Forwarding in small world dtns in every decreasing circles. Technical Report UCAM-CL-TR684, Univ. of Cambridge, 2007.Google ScholarGoogle Scholar
  10. P. Hui and J. Crowcroft. How small lables create big improvements. In Proc. IEEE ICMAN, March 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Hui, E.Yoneki, S. Chan, and J. Crowcroft. Distributed community detection in delay tolerant networks. In Proc. MobiArch, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. E. J.Newman. Analysis of weighted networks. Physical Review E, 70:056131, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  13. M. Newman. Detecting community structure in networks. Eur. Phys. J. B, 38:321--330, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  14. T. Nicolai, E. Yoneki, N. Behrens, and H. Kenn. Exploring social context with the wireless rope. In Proc. Workshop MONET: LNCS 4277, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. G. Palla et al. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435(7043):814--818, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  16. UCSD. Wireless topology discovery project, http://sysnet.ucsd.edu/wtd/wtd.html, 2004.Google ScholarGoogle Scholar

Index Terms

  1. Visualizing community detection in opportunistic networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHANTS '07: Proceedings of the second ACM workshop on Challenged networks
          September 2007
          108 pages
          ISBN:9781595937377
          DOI:10.1145/1287791

          Copyright © 2007 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 September 2007

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate61of159submissions,38%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader