Skip to main content

Showing 1–6 of 6 results for author: Mastrostefano, E

.
  1. arXiv:2306.00606  [pdf

    cs.SI cs.DS

    Scaling Expected Force: Efficient Identification of Key Nodes in Network-based Epidemic Models

    Authors: Paolo Sylos Labini, Andrej Jurco, Matteo Ceccarello, Stefano Guarino, Enrico Mastrostefano, Flavio Vella

    Abstract: Centrality measures are fundamental tools of network analysis as they highlight the key actors within the network. This study focuses on a newly proposed centrality measure, Expected Force (EF), and its use in identifying spreaders in network-based epidemic models. We found that EF effectively predicts the spreading power of nodes and identifies key nodes and immunization targets. However, its hig… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

  2. arXiv:2209.10439  [pdf, other

    physics.soc-ph cs.SI physics.data-an

    The Fitness-Corrected Block Model, or how to create maximum-entropy data-driven spatial social networks

    Authors: Massimo Bernaschi, Alessandro Celestini, Stefano Guarino, Enrico Mastrostefano, Fabio Saracco

    Abstract: Models of networks play a major role in explaining and reproducing empirically observed patterns. Suitable models can be used to randomize an observed network while preserving some of its features, or to generate synthetic graphs whose properties may be tuned upon the characteristics of a given population. In the present paper, we introduce the Fitness-Corrected Block Model, an adjustable-density… ▽ More

    Submitted 21 September, 2022; originally announced September 2022.

    Comments: 14 pages, 1 figure

    Journal ref: Sci Rep 12, 18206 (2022)

  3. Onion under Microscope: An in-depth analysis of the Tor network

    Authors: Massimo Bernaschi, Alessandro Celestini, Marco Cianfriglia, Stefano Guarino, Flavio Lombardi, Enrico Mastrostefano

    Abstract: Tor is an anonymity network that allows offering and accessing various kinds of resources, known as hidden services, while guaranteeing sender and receiver anonymity. The Tor web is the set of web resources that exist on the Tor network, and Tor websites are part of the so-called dark web. Recent research works have evaluated Tor security, evolution over time, and thematic organization. Neverthele… ▽ More

    Submitted 20 January, 2021; originally announced January 2021.

    Journal ref: World Wide Web volume 25 (2022)

  4. Inferring urban social networks from publicly available data

    Authors: Stefano Guarino, Enrico Mastrostefano, Massimo Bernaschi, Alessandro Celestini, Marco Cianfriglia, Davide Torre, Lena Zastrow

    Abstract: The emergence of social networks and the definition of suitable generative models for synthetic yet realistic social graphs are widely studied problems in the literature. By not being tied to any real data, random graph models cannot capture all the subtleties of real networks and are inadequate for many practical contexts -- including areas of research, such as computational epidemiology, which a… ▽ More

    Submitted 2 April, 2021; v1 submitted 11 December, 2020; originally announced December 2020.

    Journal ref: Future Internet 2021, 13(5)

  5. arXiv:1408.1605  [pdf, other

    cs.DC

    Parallel Distributed Breadth First Search on the Kepler Architecture

    Authors: Mauro Bisson, Massimo Bernaschi, Enrico Mastrostefano

    Abstract: We present the results obtained by using an evolution of our CUDA-based solution for the exploration, via a Breadth First Search, of large graphs. This latest version exploits at its best the features of the Kepler architecture and relies on a combination of techniques to reduce both the number of communications among the GPUs and the amount of exchanged data. The final result is a code that can v… ▽ More

    Submitted 23 December, 2014; v1 submitted 7 August, 2014; originally announced August 2014.

    Comments: In this revision we adopt a technique to reduce the size of exchanged messages that relies on the use of a bitmap. This change halves, by itself, the total execution time. Now the code reaches 800 GTEPS on 4096 Kepler GPUs. We also made some modifications to the Introduction and to the performance section. Added new references

  6. arXiv:1307.8276  [pdf, other

    physics.comp-ph cs.DC

    GPU peer-to-peer techniques applied to a cluster interconnect

    Authors: Roberto Ammendola, Massimo Bernaschi, Andrea Biagioni, Mauro Bisson, Massimiliano Fatica, Ottorino Frezza, Francesca Lo Cicero, Alessandro Lonardo, Enrico Mastrostefano, Pier Stanislao Paolucci, Davide Rossetti, Francesco Simula, Laura Tosoratto, Piero Vicini

    Abstract: Modern GPUs support special protocols to exchange data directly across the PCI Express bus. While these protocols could be used to reduce GPU data transmission times, basically by avoiding staging to host memory, they require specific hardware features which are not available on current generation network adapters. In this paper we describe the architectural modifications required to implement pee… ▽ More

    Submitted 31 July, 2013; originally announced July 2013.

    Comments: paper accepted to CASS 2013