Slide 1

Slide 1 text

| Research Retreat | May 2011 | Matt Williams CS&I Research Retreat May 2011

Slide 2

Slide 2 text

| Research Retreat | May 2011 | Periodic Patterns in Human Encounters Matt Williams CS&I Research Retreat May 2011

Slide 3

Slide 3 text

| Research Retreat | May 2011 | Human encounters

Slide 4

Slide 4 text

| Research Retreat | May 2011 | Why study human encounters? opportunistic content sharing virus spreading patterns

Slide 5

Slide 5 text

| Research Retreat | May 2011 | Periodicity and patterns in human encounters

Slide 6

Slide 6 text

| Research Retreat | May 2011 | • How prevalent are periodic encounter patterns in human networks? • How does the presence of periodic encounters affect information flow? • Can periodic patterns be detected and used to improve content sharing in opportunistic networks? Research questions

Slide 7

Slide 7 text

| Research Retreat | May 2011 | How do we study human encounters? Smartphone Bluetooth encounters (@MIT) WiFi access point visits (@Dartmouth Campus) Foursquare venue visits (@Cardiff +others)

Slide 8

Slide 8 text

| Research Retreat | May 2011 | How do we study human encounters? Smartphone Bluetooth encounters (@MIT) WiFi access point visits (@Dartmouth Campus) Foursquare venue visits (@Cardiff +others)

Slide 9

Slide 9 text

| Research Retreat | May 2011 | • A group of nodes that regularly encounter one another with a given period Periodic encounter communities (PECs)

Slide 10

Slide 10 text

| Research Retreat | May 2011 | • In opportunistic networks, a decentralised algorithm is needed Detecting PECs in OppNets

Slide 11

Slide 11 text

| Research Retreat | May 2011 | Detecting PECs in OppNets

Slide 12

Slide 12 text

| Research Retreat | May 2011 | • Period: the gap between reappearances of the community (24 hrs, 7 days, etc.) • Diameter: the distance between the most distant nodes in the community Properties of PECs diameter = 4

Slide 13

Slide 13 text

| Research Retreat | May 2011 |

Slide 14

Slide 14 text

| Research Retreat | May 2011 | • Diameter and period give us a theoretical worst-case for the time needed for all nodes to send messages to each other • In practice, how does information sharing compare to the worst-case? Information sharing

Slide 15

Slide 15 text

| Research Retreat | May 2011 | in 75% of PECs, information sharing took less than 1/2 the worst-case time

Slide 16

Slide 16 text

| Research Retreat | May 2011 | • PEC detection relies on a crisp definition • Inherent uncertainty in encounter times poses a problem Limitations

Slide 17

Slide 17 text

| Research Retreat | May 2011 | • Dealing with fuzziness: borrow a technique from neuroscience! • Spike train synchrony: measures the similarity of bursting patterns of neurons Ongoing work: spike train methods Kreuz et al. 2009

Slide 18

Slide 18 text

| Research Retreat | May 2011 | Human encounter ‘trains’ Week 1 Week 2 Week 4 Week 3

Slide 19

Slide 19 text

| Research Retreat | May 2011 | Human encounter ‘trains’ Week 1 Week 2 Week 4 Week 3

Slide 20

Slide 20 text

| Research Retreat | May 2011 | Regions of regularity Kreuz et al. 2009

Slide 21

Slide 21 text

| Research Retreat | May 2011 | • Periodic encounter patterns exist and can be automatically detected • Evidence that periodic encounter patterns influence information flows in human encounter networks • Spike train methods are a promising solution for the detection of ‘fuzzy’ encounter patterns Summary Thanks for listening!

Slide 22

Slide 22 text

| Research Retreat | May 2011 | References M.J. Williams, R.M. Whitaker, S.M. Allen, Decentralised detection of periodic encounter communities in opportunistic networks, Ad Hoc Networks, 10.1016/j.adhoc.2011.07.008. T. Kreuz, D. Chicharro, R. G. Andrzejak, J. S. Haas, and H. D. I. Abarbanel, Measuring multiple spike train synchrony, Journal of Neuroscience Methods, vol. 183, no. 2, pp. 287–299, 2009. Attribution Library Courtyard. nevolution. http://www.flickr.com/photos/nevolution/ 2906377551/