-
Discrete Event Simulation: It's Easy with SimPy!
Authors:
Dmitry Zinoviev
Abstract:
This paper introduces the practicalities and benefits of using SimPy, a discrete event simulation (DES) module written in Python, for modeling and simulating complex systems. Through a step-by-step exploration of the classical Dining Philosophers Problem, we demonstrate how SimPy enables the efficient construction of discrete event models, emphasizing system states, transitions, and event handling…
▽ More
This paper introduces the practicalities and benefits of using SimPy, a discrete event simulation (DES) module written in Python, for modeling and simulating complex systems. Through a step-by-step exploration of the classical Dining Philosophers Problem, we demonstrate how SimPy enables the efficient construction of discrete event models, emphasizing system states, transitions, and event handling. We extend the scenario to introduce resources, such as chopsticks, to model contention and deadlock conditions, and showcase SimPy's capabilities in managing these scenarios. Furthermore, we explore the integration of SimPy with other Python libraries for statistical analysis, showcasing how simulation results inform system design and optimization. The versatility of SimPy is further highlighted through additional modeling scenarios, including resource constraints and customer service interactions, providing insights into the process of building, debugging, simulating, and optimizing models for a wide range of applications. This paper aims to make DES accessible to practitioners and researchers alike, emphasizing the ease with which complex simulations can be constructed, analyzed, and visualized using SimPy and the broader Python ecosystem.
△ Less
Submitted 3 April, 2024;
originally announced May 2024.
-
On completely regular self-dual codes with covering radius $ρ=2$
Authors:
J. Borges,
D. V. Zinoviev,
V. A. Zinoviev
Abstract:
We give a complete classification of completely regular self-dual codes with covering radius $ρ= 2$. More precisely, we prove that there are two sporadic such codes, of length $8$, and an infinite family, of length $4$.
We provide a description of all such codes and give the intersection arrays for all of them.
We give a complete classification of completely regular self-dual codes with covering radius $ρ= 2$. More precisely, we prove that there are two sporadic such codes, of length $8$, and an infinite family, of length $4$.
We provide a description of all such codes and give the intersection arrays for all of them.
△ Less
Submitted 28 April, 2024;
originally announced April 2024.
-
The "Non-Musk Effect" at Twitter
Authors:
Dmitry Zinoviev,
Arkapravo Sarkar,
Pelin Bicen
Abstract:
Elon Musk has long been known to significantly impact Wall Street through his controversial statements and actions, particularly through his own use of social media. An innovator and visionary entrepreneur, Musk is often considered a poster boy for all entrepreneurs worldwide. It is, thus, interesting to examine the effect that Musk might have on Main Street, i.e., on the social media activity of…
▽ More
Elon Musk has long been known to significantly impact Wall Street through his controversial statements and actions, particularly through his own use of social media. An innovator and visionary entrepreneur, Musk is often considered a poster boy for all entrepreneurs worldwide. It is, thus, interesting to examine the effect that Musk might have on Main Street, i.e., on the social media activity of other entrepreneurs. In this research, we study and quantify this "Musk Effect," i.e., the impact of Musk's recent and highly publicized acquisition of Twitter on the tweeting activity of entrepreneurs. Using a dataset consisting of 9.94 million actual tweets from 47,190 self-declared entrepreneurs from seven English-speaking countries (US, Australia, New Zealand, UK, Canada, South Africa, and Ireland) spanning 71 weeks and encompassing the entire period from the rumor that Musk may buy Twitter till the completion of the acquisition, we find that only about 2.5% of the entrepreneurs display a significant change in their tweeting behavior over the time.
We believe that our study is one of the first works to examine the effect of Musk's acquisition of Twitter on the actual tweeting behavior of Twitter users (entrepreneurs). By quantifying the impact of the Musk Effect on Main Street, we provide a comparison with the effect Musk's actions have on Wall Street. Finally, our systematic identification of the characteristics of entrepreneurs most affected by the Musk Effect has practical implications for academics and practitioners alike.
△ Less
Submitted 21 April, 2023;
originally announced April 2023.
-
On the classification of completely regular codes with covering radius two and antipodal dual
Authors:
J. Borges,
D. V. Zinoviev,
V. A. Zinoviev
Abstract:
We classify all linear completely regular codes which have covering radius $ρ= 2$ and whose dual are antipodal. For this, we firstly show several properties of such dual codes, which are two-weight codes.
We classify all linear completely regular codes which have covering radius $ρ= 2$ and whose dual are antipodal. For this, we firstly show several properties of such dual codes, which are two-weight codes.
△ Less
Submitted 21 February, 2023;
originally announced February 2023.
-
On Sylvester-type constructions of Hadamard matrices and their modifications
Authors:
Dmitrii Zinoviev,
Victor Zinoviev
Abstract:
Using the ideas of concatenation construction of codes over the $q$-ary alphabet, we modify the known generalized Sylvester-type construction of the Hadamard matrices. The new construction is based on two collections of the Hadamard matrices. In particular this construction involves $m$ Hadamard matrices of order $k$ and $k$ Hadamard matrices of order $m$. These matrices are not necessary differen…
▽ More
Using the ideas of concatenation construction of codes over the $q$-ary alphabet, we modify the known generalized Sylvester-type construction of the Hadamard matrices. The new construction is based on two collections of the Hadamard matrices. In particular this construction involves $m$ Hadamard matrices of order $k$ and $k$ Hadamard matrices of order $m$. These matrices are not necessary different. As a result we obtain a Hadamard matrix of order $km$. The new construction gives many possibilities for construction of the new Hadamard matrices with different ranks and dimension of kernel.
△ Less
Submitted 31 October, 2022;
originally announced November 2022.
-
Detecting People Interested in Non-Suicidal Self-Injury on Social Media
Authors:
Zaihan Yang,
Dmitry Zinoviev
Abstract:
We propose a supervised learning approach to detect people interested in Non-Suicidal Self-Injury (NSSI). We treat the task as a binary classification problem, and build classifiers based upon features extracted from people self-declared interests. Experimental evaluation on a real-world dataset, the LiveJournal social blogging networking platform, demonstrates the effectiveness of our proposed mo…
▽ More
We propose a supervised learning approach to detect people interested in Non-Suicidal Self-Injury (NSSI). We treat the task as a binary classification problem, and build classifiers based upon features extracted from people self-declared interests. Experimental evaluation on a real-world dataset, the LiveJournal social blogging networking platform, demonstrates the effectiveness of our proposed model.
△ Less
Submitted 10 July, 2022;
originally announced July 2022.
-
Complex Network Analysis of North American Institutions of Higher Education on Twitter
Authors:
Dmitry Zinoviev,
Shana Cote,
Robert Diaz
Abstract:
North American institutions of higher education (IHEs): universities, 4- and 2-year colleges, and trade schools -- are heavily present and followed on Twitter. An IHE Twitter account, on average, has 20,000 subscribers. Many of them follow more than one IHE, making it possible to construct an IHE network, based on the number of co-followers. In this paper, we explore the structure of a network of…
▽ More
North American institutions of higher education (IHEs): universities, 4- and 2-year colleges, and trade schools -- are heavily present and followed on Twitter. An IHE Twitter account, on average, has 20,000 subscribers. Many of them follow more than one IHE, making it possible to construct an IHE network, based on the number of co-followers. In this paper, we explore the structure of a network of 1,435 IHEs on Twitter. We discovered significant correlations between the network attributes: various centralities and clustering coefficients -- and IHEs' attributes, such as enrollment, tuition, and religious/racial/gender affiliations. We uncovered the community structure of the network linked to homophily -- such that similar followers follow similar colleges. Additionally, we analyzed the followers' self-descriptions and identified twelve overlap** topics that can be traced to the followers' group identities.
△ Less
Submitted 2 October, 2020;
originally announced October 2020.
-
Network Analysis of the 2016 Presidential Campaign Tweets
Authors:
Dmitry Zinoviev
Abstract:
We applied complex network analysis to ~27,000 tweets posted by the 2016 presidential election's principal participants in the USA. We identified the stages of the election campaigns and the recurring topics addressed by the candidates. Finally, we revealed the leader-follower relationships between the candidates. We conclude that Secretary Hillary Clinton's Twitter performance was subordinate to…
▽ More
We applied complex network analysis to ~27,000 tweets posted by the 2016 presidential election's principal participants in the USA. We identified the stages of the election campaigns and the recurring topics addressed by the candidates. Finally, we revealed the leader-follower relationships between the candidates. We conclude that Secretary Hillary Clinton's Twitter performance was subordinate to that of Donald Trump, which may have been one factor that led to her electoral defeat.
△ Less
Submitted 28 September, 2020;
originally announced September 2020.
-
A Social Network of Russian "Kompromat"
Authors:
Dmitry Zinoviev
Abstract:
"Kompromat" (the Russian word for "compromising material") has been efficiently used to harass Russian political and business elites since the days of the USSR. Online crowdsourcing projects such as "RuCompromat" made it possible to catalog and analyze kompromat using quantitative techniques -- namely, social network analysis. In this paper, we constructed a social network of 11,000 Russian and fo…
▽ More
"Kompromat" (the Russian word for "compromising material") has been efficiently used to harass Russian political and business elites since the days of the USSR. Online crowdsourcing projects such as "RuCompromat" made it possible to catalog and analyze kompromat using quantitative techniques -- namely, social network analysis. In this paper, we constructed a social network of 11,000 Russian and foreign nationals affected by kompromat in Russia in 1991 -- 2020. The network has an excellent modular structure with 62 dense communities. One community contains prominent American officials, politicians, and entrepreneurs (including President Donald Trump) and appears to concern Russia's controversial interference in the 2016 U.S. presidential elections. Various network centrality measures identify seventeen most central kompromat figures, with President Vladimir Putin solidly at the top. We further reveal four types of communities dominated by entrepreneurs, politicians, bankers, and law enforcement officials ("siloviks"), the latter disjointed from the first three.
△ Less
Submitted 18 September, 2020;
originally announced September 2020.
-
On two-weight codes
Authors:
P. G. Boyvalenkov,
K. V. Delchev,
D. V. Zinoviev,
V. A. Zinoviev
Abstract:
We consider $q$-ary (linear and nonlinear) block codes with exactly two distances: $d$ and $d+δ$. Several combinatorial constructions of optimal such codes are given. In the linear (but not necessary projective) case, we prove that under certain conditions the existence of such linear $2$-weight code with $δ> 1$ implies the following equality of great common divisors: $(d,q) = (δ,q)$. Upper bounds…
▽ More
We consider $q$-ary (linear and nonlinear) block codes with exactly two distances: $d$ and $d+δ$. Several combinatorial constructions of optimal such codes are given. In the linear (but not necessary projective) case, we prove that under certain conditions the existence of such linear $2$-weight code with $δ> 1$ implies the following equality of great common divisors: $(d,q) = (δ,q)$. Upper bounds for the maximum cardinality of such codes are derived by linear programming and from few-distance spherical codes. Tables of lower and upper bounds for small $q = 2,3,4$ and $q\,n < 50$ are presented.
△ Less
Submitted 30 November, 2020; v1 submitted 27 May, 2020;
originally announced May 2020.
-
On q-ary codes with two distances d and d+1
Authors:
P. Boyvalenkov,
K. Delchev,
D. Zinoviev,
V. Zinoviev
Abstract:
The $q$-ary block codes with two distances $d$ and $d+1$ are considered. Several constructions of such codes are given, as in the linear case all codes can be obtained by a simple modification of linear equidistant codes. Upper bounds for the maximum cardinality of such codes is derived. Tables of lower and upper bounds for small $q$ and $n$ are presented.
The $q$-ary block codes with two distances $d$ and $d+1$ are considered. Several constructions of such codes are given, as in the linear case all codes can be obtained by a simple modification of linear equidistant codes. Upper bounds for the maximum cardinality of such codes is derived. Tables of lower and upper bounds for small $q$ and $n$ are presented.
△ Less
Submitted 23 June, 2019;
originally announced June 2019.
-
Networks of Music Groups as Success Predictors
Authors:
Dmitry Zinoviev
Abstract:
More than 4,600 non-academic music groups emerged in the USSR and post-Soviet independent nations in 1960--2015, performing in 275 genres. Some of the groups became legends and survived for decades, while others vanished and are known now only to select music history scholars. We built a network of the groups based on sharing at least one performer. We discovered that major network measures serve…
▽ More
More than 4,600 non-academic music groups emerged in the USSR and post-Soviet independent nations in 1960--2015, performing in 275 genres. Some of the groups became legends and survived for decades, while others vanished and are known now only to select music history scholars. We built a network of the groups based on sharing at least one performer. We discovered that major network measures serve as reasonably accurate predictors of the groups' success. The proposed network-based success exploration and prediction methods are transferable to other areas of arts and humanities that have medium- or long-term team-based collaborations.
△ Less
Submitted 3 August, 2017;
originally announced September 2017.
-
On the number of Steiner triple systems S(2^m-1,3,2) of rank 2^m - m + 2 over GF(2)
Authors:
Dmitrii Zinoviev
Abstract:
We obtain the number of different Steiner triple systems S(2^m-1,3,2) of rank 2^m-m+2 over the field GF(2).
We obtain the number of different Steiner triple systems S(2^m-1,3,2) of rank 2^m-m+2 over the field GF(2).
△ Less
Submitted 16 April, 2018; v1 submitted 1 December, 2015;
originally announced December 2015.
-
Building Mini-Categories in Product Networks
Authors:
Dmitry Zinoviev,
Zhen Zhu,
Kate Li
Abstract:
We constructed a product network based on the sales data collected and provided by a Fortune 500 speciality retailer. The structure of the network is dominated by small isolated components, dense clique-based communities, and sparse stars and linear chains and pendants. We used the identified structural elements (tiles) to organize products into mini-categories -- compact collections of potentiall…
▽ More
We constructed a product network based on the sales data collected and provided by a Fortune 500 speciality retailer. The structure of the network is dominated by small isolated components, dense clique-based communities, and sparse stars and linear chains and pendants. We used the identified structural elements (tiles) to organize products into mini-categories -- compact collections of potentially complementary and substitute items. The mini-categories extend the traditional hierarchy of retail products (group - class - subcategory) and may serve as building blocks towards exploration of consumer projects and long-term customer behavior.
△ Less
Submitted 28 January, 2015; v1 submitted 9 January, 2015;
originally announced January 2015.
-
Mitigation of Delayed Management Costs in Transaction-Oriented Systems
Authors:
Dmitry Zinoviev,
Dan Stefanescu,
Hamid Benbrahim,
Greta Meszoely
Abstract:
Abundant examples of complex transaction-oriented networks (TONs) can be found in a variety of disciplines, including information and communication technology, finances, commodity trading, and real estate. A transaction in a TON is executed as a sequence of subtransactions associated with the network nodes, and is committed if every subtransaction is committed. A subtransaction incurs a two-fold o…
▽ More
Abundant examples of complex transaction-oriented networks (TONs) can be found in a variety of disciplines, including information and communication technology, finances, commodity trading, and real estate. A transaction in a TON is executed as a sequence of subtransactions associated with the network nodes, and is committed if every subtransaction is committed. A subtransaction incurs a two-fold overhead on the host node: the fixed transient operational cost and the cost of long-term management (e.g. archiving and support) that potentially grows exponentially with the transaction length. If the overall cost exceeds the node capacity, the node fails and all subtransaction incident to the node, and their parent distributed transactions, are aborted. A TON resilience can be measured in terms of either external workloads or intrinsic node fault rates that cause the TON to partially or fully choke. We demonstrate that under certain conditions, these two measures are equivalent. We further show that the exponential growth of the long-term management costs can be mitigated by adjusting the effective operational cost: in other words, that the future maintenance costs could be absorbed into the transient operational costs.
△ Less
Submitted 23 September, 2014;
originally announced September 2014.
-
Co-Evolution of Friendship and Publishing in Online Blogging Social Networks
Authors:
Dmitry Zinoviev,
Sarah Llewelyn
Abstract:
In the past decade, blogging web sites have become more sophisticated and influential than ever. Much of this sophistication and influence follows from their network organization. Blogging social networks (BSNs) allow individual bloggers to form contact lists, subscribe to other blogs, comment on blog posts, declare interests, and participate in collective blogs. Thus, a BSN is a bimodal venue, wh…
▽ More
In the past decade, blogging web sites have become more sophisticated and influential than ever. Much of this sophistication and influence follows from their network organization. Blogging social networks (BSNs) allow individual bloggers to form contact lists, subscribe to other blogs, comment on blog posts, declare interests, and participate in collective blogs. Thus, a BSN is a bimodal venue, where users can engage in publishing (post) as well as in social (make friends) activities. In this paper, we study the co-evolution of both activities. We observed a significant positive correlation between blogging and socializing. In addition, we identified a number of user archetypes that correspond to "mainly bloggers," "mainly socializers," etc. We analyzed a BSN at the level of individual posts and changes in contact lists and at the level of trajectories in the friendship-publishing space. Both approaches produced consistent results: the majority of BSN users are passive readers; publishing is the dominant active behavior in a BSN; and social activities complement blogging, rather than compete with it.
△ Less
Submitted 27 January, 2014;
originally announced January 2014.
-
Peer Ratings in Massive Online Social Networks
Authors:
Dmitry Zinoviev
Abstract:
Instant quality feedback in the form of online peer ratings is a prominent feature of modern massive online social networks (MOSNs). It allows network members to indicate their appreciation of a post, comment, photograph, etc. Some MOSNs support both positive and negative (signed) ratings. In this study, we rated 11 thousand MOSN member profiles and collected user responses to the ratings. MOSN us…
▽ More
Instant quality feedback in the form of online peer ratings is a prominent feature of modern massive online social networks (MOSNs). It allows network members to indicate their appreciation of a post, comment, photograph, etc. Some MOSNs support both positive and negative (signed) ratings. In this study, we rated 11 thousand MOSN member profiles and collected user responses to the ratings. MOSN users are very sensitive to peer ratings: 33% of the subjects visited the researcher's profile in response to rating, 21% also rated the researcher's profile picture, and 5% left a text comment. The grades left by the subjects are highly polarized: out of the six available grades, the most negative and the most positive are also the most popular. The grades fall into three almost equally sized categories: reciprocal, generous, and stingy. We proposed quantitative measures for generosity, reciprocity, and benevolence, and analyzed them with respect to the subjects' demographics.
△ Less
Submitted 21 January, 2014;
originally announced January 2014.
-
Simulating Resilience in Transaction-Oriented Networks
Authors:
Dmitry Zinoviev,
Hamid Benbrahim,
Greta Meszoely,
Dan Stefanescu
Abstract:
The power of networks manifests itself in a highly non-linear amplification of a number of effects, and their weakness - in propagation of cascading failures. The potential systemic risk effects can be either exacerbated or mitigated, depending on the resilience characteristics of the network. The goals of this paper are to study some characteristics of network amplification and resilience. We sim…
▽ More
The power of networks manifests itself in a highly non-linear amplification of a number of effects, and their weakness - in propagation of cascading failures. The potential systemic risk effects can be either exacerbated or mitigated, depending on the resilience characteristics of the network. The goals of this paper are to study some characteristics of network amplification and resilience. We simulate random Erdos-Renyi networks and measure amplification by varying node capacity, transaction volume, and expected failure rates. We discover that network throughput scales almost quadratically with respect to the node capacity and that the effects of excessive network load and random and irreparable node faults are equivalent and almost perfectly anticorrelated. This knowledge can be used by capacity planners to determine optimal reliability requirements that maximize the optimal operational regions.
△ Less
Submitted 23 March, 2013;
originally announced March 2013.
-
Clown: a Microprocessor Simulator for Operating System Studies
Authors:
Dmitry Zinoviev
Abstract:
In this paper, I present the design and implementation of Clown--a simulator of a microprocessor-based computer system specifically optimized for teaching operating system courses at undergraduate or graduate levels. The package includes the simulator itself, as well as a collection of basic I/O devices, an assembler, a linker, and a disk formatter. The simulator architecturally resembles mainstre…
▽ More
In this paper, I present the design and implementation of Clown--a simulator of a microprocessor-based computer system specifically optimized for teaching operating system courses at undergraduate or graduate levels. The package includes the simulator itself, as well as a collection of basic I/O devices, an assembler, a linker, and a disk formatter. The simulator architecturally resembles mainstream microprocessors from the Intel 80386 family, but is much easier to learn and program. The simulator is fast enough to be used as an emulator--in the direct user interaction mode.
△ Less
Submitted 21 July, 2012;
originally announced July 2012.
-
Semantic Networks of Interests in Online NSSI Communities
Authors:
Dmitry Zinoviev,
Dan Stefanescu,
Lance Swenson,
Gary Fireman
Abstract:
Persons who engage in non-suicidal self-injury (NSSI), often conceal their practices which limits the examination and understanding of those who engage in NSSI. The goal of this research is to utilize public online social networks (namely, in LiveJournal, a major blogging network) to observe the NSSI population's communication in a naturally occurring setting. Specifically, LiveJournal users can p…
▽ More
Persons who engage in non-suicidal self-injury (NSSI), often conceal their practices which limits the examination and understanding of those who engage in NSSI. The goal of this research is to utilize public online social networks (namely, in LiveJournal, a major blogging network) to observe the NSSI population's communication in a naturally occurring setting. Specifically, LiveJournal users can publicly declare their interests. We collected the self-declared interests of 22,000 users who are members of or participate in 43 NSSI-related communities. We extracted a bimodal socio-semantic network of users and interests based on their similarity. The semantic subnetwork of interests contains NSSI terms (such as "self-injury" and "razors"), references to music performers (such as "Nine Inch Nails"), and general daily life and creativity related terms (such as "poetry" and "boys"). Assuming users are genuine in their declarations, the words reveal distinct patterns of interest and may signal keys to NSSI.
△ Less
Submitted 24 June, 2012;
originally announced June 2012.
-
Parametric Estimation of the Ultimate Size of Hypercomputers
Authors:
Dmitry Zinoviev
Abstract:
The performance of the emerging petaflops-scale supercomputers of the nearest future (hypercomputers) will be governed not only by the clock frequency of the processing nodes or by the width of the system bus, but also by such factors as the overall power consumption and the geometric size. In this paper, we study the influence of such parameters on one of the most important characteristics of a g…
▽ More
The performance of the emerging petaflops-scale supercomputers of the nearest future (hypercomputers) will be governed not only by the clock frequency of the processing nodes or by the width of the system bus, but also by such factors as the overall power consumption and the geometric size. In this paper, we study the influence of such parameters on one of the most important characteristics of a general purpose computer - on the degree of multithreading that must be present in an application to make the use of the hypercomputer justifiable. Our major finding is that for the class of applications with purely random memory access patterns "super-fast computing" and "high-performance computing" are essentially synonyms for "massively-parallel computing."
△ Less
Submitted 18 November, 2011;
originally announced November 2011.
-
A Game Theoretical Approach to Broadcast Information Diffusion in Social Networks
Authors:
Dmitry Zinoviev,
Vy Duong
Abstract:
One major function of social networks (e.g., massive online social networks) is the dissemination of information, such as scientific knowledge, news, and rumors. Information can be propagated by the users of the network via natural connections in written, oral or electronic form. The information passing from a sender to receivers and back (in the form of comments) involves all of the actors consid…
▽ More
One major function of social networks (e.g., massive online social networks) is the dissemination of information, such as scientific knowledge, news, and rumors. Information can be propagated by the users of the network via natural connections in written, oral or electronic form. The information passing from a sender to receivers and back (in the form of comments) involves all of the actors considering their knowledge, trust, and popularity, which shape their publishing and commenting strategies. To understand such human aspects of the information dissemination, we propose a game theoretical model of a one-way information forwarding and feedback mechanism in a star-shaped social network that takes into account the personalities of the communicating actors.
△ Less
Submitted 25 June, 2011;
originally announced June 2011.
-
A Game Theoretical Approach to Modeling Full-Duplex Information Dissemination
Authors:
Dmitry Zinoviev,
Vy Duong
Abstract:
One major function of social networks (e.g., massive online social networks) is the dissemination of information such as scientific knowledge, news, and rumors. Information can be propagated by the users of the network via natural connections in written, oral or electronic form. The information passing from a sender to a receiver intrinsically involves both of them considering their self-perceived…
▽ More
One major function of social networks (e.g., massive online social networks) is the dissemination of information such as scientific knowledge, news, and rumors. Information can be propagated by the users of the network via natural connections in written, oral or electronic form. The information passing from a sender to a receiver intrinsically involves both of them considering their self-perceived knowledge, reputation, and popularity, which further determine their decisions of whether or not to forward the information and whether or not to provide feedback. To understand such human aspects of the information dissemination, we propose a game theoretical model of the two-way full duplex information forwarding and feedback mechanisms in a social network that take into account the personalities of the communicating actors (including their perceived knowledgeability, reputation, and desire for popularity) and the global characteristics of the network. The model demonstrates how the emergence of social networks can be explained in terms of maximizing game theoretical utility.
△ Less
Submitted 12 August, 2010;
originally announced August 2010.
-
A Game Theoretical Approach to Modeling Information Dissemination in Social Networks
Authors:
Dmitry Zinoviev,
Vy Duong,
Honggang Zhang
Abstract:
One major function of social networks (e.g., massive online social networks) is the dissemination of information such as scientific knowledge, news, and rumors. Information can be propagated by the users of the network via natural connections in written, oral or electronic form. The information passing from a sender to a receiver intrinsically involves both of them considering their self-perceived…
▽ More
One major function of social networks (e.g., massive online social networks) is the dissemination of information such as scientific knowledge, news, and rumors. Information can be propagated by the users of the network via natural connections in written, oral or electronic form. The information passing from a sender to a receiver intrinsically involves both of them considering their self-perceived knowledge, reputation, and popularity, which further determine their decisions of whether or not to forward the information and whether or not to provide feedback. To understand such human aspects of the information dissemination, we propose a game theoretical model of the information forwarding and feedback mechanisms in a social network that take into account the personalities of the sender and the receiver (including their perceived knowledgeability, reputation, and desire for popularity) and the global characteristics of the network.
△ Less
Submitted 28 June, 2010;
originally announced June 2010.
-
Toward Understanding Friendship in Online Social Networks
Authors:
Dmitry Zinoviev,
Vy Duong
Abstract:
All major on-line social networks, such as MySpace, Facebook, LiveJournal, and Orkut, are built around the concept of friendship. It is not uncommon for a social network participant to have over 100 friends. A natural question arises: are they all real friends of hers, or does she mean something different when she calls them "friends?" Speaking in other words, what is the relationship between of…
▽ More
All major on-line social networks, such as MySpace, Facebook, LiveJournal, and Orkut, are built around the concept of friendship. It is not uncommon for a social network participant to have over 100 friends. A natural question arises: are they all real friends of hers, or does she mean something different when she calls them "friends?" Speaking in other words, what is the relationship between off-line (real, traditional) friendship and its on-line (virtual) namesake? In this paper, we use sociological data to suggest that there is a significant difference between the concepts of virtual and real friendships. We further investigate the structure of on-line friendship and observe that it follows the Pareto (or double Pareto) distribution and is subject to age stratification but not to gender segregation. We introduce the concept of digital personality that quantifies the willingness of a social network participant to engage in virtual friendships.
△ Less
Submitted 26 February, 2009;
originally announced February 2009.
-
Topology and Geometry of Online Social Networks
Authors:
D. Zinoviev
Abstract:
In this paper, we study certain geometric and topological properties of online social networks using the concept of density and geometric vector spaces. "Moi Krug" ("My Circle"), a Russian social network that promotes the principle of the "six degrees of separation" and is positioning itself as a vehicle for professionals and recruiters seeking each others' services, is used as a test vehicle.
In this paper, we study certain geometric and topological properties of online social networks using the concept of density and geometric vector spaces. "Moi Krug" ("My Circle"), a Russian social network that promotes the principle of the "six degrees of separation" and is positioning itself as a vehicle for professionals and recruiters seeking each others' services, is used as a test vehicle.
△ Less
Submitted 25 July, 2008;
originally announced July 2008.
-
On poles of twisted tensor L-functions
Authors:
Yuval Z. Flicker,
Dmitrii Zinoviev
Abstract:
It is shown that the only possible pole of the twisted tensor L-functions in Re(s)\geq 1 is located at s=1 for all quadratic extensions of global fields.
It is shown that the only possible pole of the twisted tensor L-functions in Re(s)\geq 1 is located at s=1 for all quadratic extensions of global fields.
△ Less
Submitted 28 November, 2007;
originally announced November 2007.
-
On the symmetric square. Unstable Twisted Characters
Authors:
Yuval Z. Flicker,
Dmitrii Zinoviev
Abstract:
We provide a purely local computation of the (elliptic) twisted (by "transpose-inverse") character of the representation π=I(\1) of PGL(3) over a p-adic field induced from the trivial representation of the maximal parabolic subgroup. This computation is independent of the theory of the symmetric square lifting of [IV] of automorphic and admissible representations of SL(2) to PGL(3). It leads to…
▽ More
We provide a purely local computation of the (elliptic) twisted (by "transpose-inverse") character of the representation π=I(\1) of PGL(3) over a p-adic field induced from the trivial representation of the maximal parabolic subgroup. This computation is independent of the theory of the symmetric square lifting of [IV] of automorphic and admissible representations of SL(2) to PGL(3). It leads to a proof of the (unstable) fundamental lemma in the theory of the symmetric square lifting, namely that corresponding spherical functions (on PGL(2) and PGL(3)) are matching: they have matching orbital integrals.
△ Less
Submitted 28 November, 2007;
originally announced November 2007.
-
Relation of Orbital Integrals on SO(5) and PGL(2)
Authors:
Dmitrii Zinoviev
Abstract:
We relate the "Fourier" orbital integrals of corresponding spherical functions on the p-adic groups SO(5) and PGL(2). The correspondence is defined by a "lifting" of representations of these groups. This is a local "fundamental lemma" needed to compare the geometric sides of the global Fourier summation formulae (or relative trace formulae) on these two groups. This comparison leads to conclusio…
▽ More
We relate the "Fourier" orbital integrals of corresponding spherical functions on the p-adic groups SO(5) and PGL(2). The correspondence is defined by a "lifting" of representations of these groups. This is a local "fundamental lemma" needed to compare the geometric sides of the global Fourier summation formulae (or relative trace formulae) on these two groups. This comparison leads to conclusions about a well known lifting of representations from PGL(2) to PGSp(4). This lifting produces counter examples to the Ramanujan conjecture.
△ Less
Submitted 24 November, 2007;
originally announced November 2007.
-
Twisted character of a small representation
Authors:
Yuval Z. Flicker,
Dmitrii Zinoviev
Abstract:
This paper has been withdrawn by the author as it has already been submitted under the title "Twisted character of a small Representation of GL(4)".
This paper has been withdrawn by the author as it has already been submitted under the title "Twisted character of a small Representation of GL(4)".
△ Less
Submitted 28 November, 2007; v1 submitted 23 November, 2007;
originally announced November 2007.
-
Twisted character of a small representation of GL(4)
Authors:
Yuval Z. Flicker,
Dmitrii Zinoviev
Abstract:
We compute by a purely local method the (elliptic) twisted by transpose-inverse character χ_{π_Y} of the representation π_Y=I_{(3,1)}(1_3xχ_Y) of G=GL(4,F), where F is a p-adic field, p not 2, and Y is an unramified quadratic extension of F; χ_Y is the nontrivial character of F^\x/N_{Y/F}Y^x. The representation π_Y is normalizedly induced from \pmatrix m_3&\ast 0&m_1\endpmatrix \mapstoχ_Y(m_1),…
▽ More
We compute by a purely local method the (elliptic) twisted by transpose-inverse character χ_{π_Y} of the representation π_Y=I_{(3,1)}(1_3xχ_Y) of G=GL(4,F), where F is a p-adic field, p not 2, and Y is an unramified quadratic extension of F; χ_Y is the nontrivial character of F^\x/N_{Y/F}Y^x. The representation π_Y is normalizedly induced from \pmatrix m_3&\ast 0&m_1\endpmatrix \mapstoχ_Y(m_1), m_i in GL(i,F), on the maximal parabolic subgroup of type (3,1). We show that the twisted character χ_{π_Y} of π_Y is an unstable function: its value at a twisted regular elliptic conjugacy class with norm in C_Y=``GL(2,Y)/F^x'' is minus its value at the other class within the twisted stable conjugacy class. It is zero at the classes without norm in C_Y. Moreover π_Y is the endoscopic lift of the trivial representation of C_Y. We deal only with unramified Y/F, as globally this case occurs almost everywhere. Naturally this computation plays a role in the theory of lifting of C_Y and GSp(2) to GL(4) using the trace formula.
Our work extends -- to the context of nontrivial central characters -- the work of math.NT/0606262, where representations of PGL(4,F) are studied. In math.NT/0606262 a 4-dimensional analogue of the model of the small representation of PGL(3,F) introduced with Kazhdan in a 3-dimensional case is developed, and the local method of computation introduced by us in the 3-dimensional case is extended. As in math.NT/0606262 we use here the classification of twisted (stable) regular conjugacy classes in GL(4,F).
△ Less
Submitted 12 June, 2006;
originally announced June 2006.
-
Twisted character of a small representation of PGL(4)
Authors:
Yuval Z. Flicker,
Dmitrii Zinoviev
Abstract:
We compute by a purely local method the elliptic, twisted by transpose-inverse, character χ_πof the representation π=I_{(3,1)}(1_3) of PGL(4,F) normalizedly induced from the trivial representation of the maximal parabolic subgroup of type (3,1), where F is a p-adic field. Put C=(GL(2,F)xGL(2,F))'/F^x (F^x embeds diagonally, prime means equal determinants). It is a twisted elliptic endoscopic gro…
▽ More
We compute by a purely local method the elliptic, twisted by transpose-inverse, character χ_πof the representation π=I_{(3,1)}(1_3) of PGL(4,F) normalizedly induced from the trivial representation of the maximal parabolic subgroup of type (3,1), where F is a p-adic field. Put C=(GL(2,F)xGL(2,F))'/F^x (F^x embeds diagonally, prime means equal determinants). It is a twisted elliptic endoscopic group of PGL(4). We deduce from the computation that χ_πis an unstable function: its value at one twisted regular elliptic conjugacy class with norm in C is minus its value at the other class within the twisted stable conjugacy class, and zero at the classes without norm in C. Moreover πis the unstable endoscopic lift of the trivial representation of C. Naturally, this computation plays a role in the theory of lifting from C (=``SO(4,F)'') and PGp(2,F) to PGL(4,F) using the trace formula. Our work develops a 4-dimensional analogue of the model of the small representation of PGL(3,F) introduced by the first author with Kazhdan in a 3-dimensional case, and it uses the classification of twisted stable and unstable regular conjugacy classes in PGL(4,F). It extends the local method of computation introduced by us in the 3-dimensional case.
An extension math.NT/0606263 of our work here to apply to similar representations of GL(4,F) whose central character is nontrivial will appear in Int. J. Number Theory.
△ Less
Submitted 12 June, 2006;
originally announced June 2006.
-
Map** DEVS Models onto UML Models
Authors:
Dmitry Zinoviev
Abstract:
Discrete event simulation specification (DEVS) is a formalism designed to describe both discrete state and continuous state systems. It is a powerful abstract mathematical notation. However, until recently it lacked proper graphical representation, which made computer simulation of DEVS models a challenging issue. Unified modeling language (UML) is a multipurpose graphical modeling language, a d…
▽ More
Discrete event simulation specification (DEVS) is a formalism designed to describe both discrete state and continuous state systems. It is a powerful abstract mathematical notation. However, until recently it lacked proper graphical representation, which made computer simulation of DEVS models a challenging issue. Unified modeling language (UML) is a multipurpose graphical modeling language, a de-facto industrial modeling standard. There exist several commercial and open-source UML editors and code generators. Most of them can save UML models in XML-based XMI files ready for further automated processing. In this paper, we propose a map** of DEVS models onto UML state and component diagrams. This map** may lead to an eventual unification of the two modeling formalisms, combining the abstractness of DEVS and expressive power and ``computer friendliness'' of the UML.
△ Less
Submitted 29 August, 2005;
originally announced August 2005.