-
Sha** Radio Access to Match Variable Wireless Fronthaul Quality in Next-Generation Networks
Authors:
Marcello Morini,
Eugenio Moro,
Ilario Filippini,
Danilo De Donno,
Antonio Capone
Abstract:
The emergence of Centralized-RAN (C-RAN) has revolutionized mobile network infrastructure, offering streamlined cell-site engineering and enhanced network management capabilities. As C-RAN gains momentum, the focus shifts to optimizing fronthaul links. While fiber fronthaul guarantees performance, wireless alternatives provide cost efficiency and scalability, making them preferable in densely urba…
▽ More
The emergence of Centralized-RAN (C-RAN) has revolutionized mobile network infrastructure, offering streamlined cell-site engineering and enhanced network management capabilities. As C-RAN gains momentum, the focus shifts to optimizing fronthaul links. While fiber fronthaul guarantees performance, wireless alternatives provide cost efficiency and scalability, making them preferable in densely urbanized areas. However, wireless fronthaul often requires expensive over-dimensioning to overcome the challenging atmospheric attenuation typical of high frequencies. We propose a framework designed to continuously align radio access capacity with fronthaul link quality to overcome this rigidity. By gradually adapting radio access capacity to available fronthaul capacity, the framework ensures smooth degradation rather than complete service loss. Various strategies are proposed, considering factors like functional split and beamforming technology and exploring the tradeoff between adaptation strategy complexity and end-to-end system performance. Numerical evaluations using experimental rain attenuation data illustrate the framework's effectiveness in optimizing radio access capacity under realistically variable fronthaul link quality, ultimately proving the importance of adaptive capacity management in maximizing C-RAN efficiency.
△ Less
Submitted 22 June, 2024;
originally announced June 2024.
-
Detecting and Mitigating Bias in Algorithms Used to Disseminate Information in Social Networks
Authors:
Vedran Sekara,
Ivan Dotu,
Manuel Cebrian,
Esteban Moro,
Manuel Garcia-Herranz
Abstract:
Social connections are a conduit through which individuals communicate, information propagates, and diseases spread. Identifying individuals that are more likely to adopt ideas or technologies and spread them to others is essential in order to develop effective information campaigns, fight epidemics, and to maximize the reach of limited resources. Consequently a lot of work has focused on identify…
▽ More
Social connections are a conduit through which individuals communicate, information propagates, and diseases spread. Identifying individuals that are more likely to adopt ideas or technologies and spread them to others is essential in order to develop effective information campaigns, fight epidemics, and to maximize the reach of limited resources. Consequently a lot of work has focused on identifying sets of influencers. Here we show that seeding information using these influence maximization methods, only benefits connected and central individuals, consistently leaving the most vulnerable behind. Our results highlights troublesome outcomes of influence maximization algorithms: they do not disseminate information in an equitable manner threatening to create an increasingly unequal society. To overcome this issue we devise a simple, multi-objective algorithm, which maximises both influence and information equity. Our work demonstrates how to find fairer influencer sets, highlighting that in our search for maximizing information, we do not need to compromise on information equality.
△ Less
Submitted 21 May, 2024;
originally announced May 2024.
-
Exploring Upper-6GHz and mmWave in Real-World 5G Networks: A Direct on-Field Comparison
Authors:
Marcello Morini,
Eugenio Moro,
Ilario Filippini,
Antonio Capone,
Danilo De Donno
Abstract:
The spectrum crunch challenge poses a vital threat to the progress of cellular networks and recently prompted the inclusion of millimeter wave (mmWave) and Upper 6GHz (U6G) in the 3GPP standards. These two bands promise to unlock a large portion of untapped spectrum, but the harsh propagation due to the increased carrier frequency might negatively impact the performance of urban Radio Access Netwo…
▽ More
The spectrum crunch challenge poses a vital threat to the progress of cellular networks and recently prompted the inclusion of millimeter wave (mmWave) and Upper 6GHz (U6G) in the 3GPP standards. These two bands promise to unlock a large portion of untapped spectrum, but the harsh propagation due to the increased carrier frequency might negatively impact the performance of urban Radio Access Network (RAN) deployments. Within the span of a year, two co-located 5G networks operating in these frequency bands were deployed at Politecnico di Milano, Milan, Italy, entirely dedicated to the dense urban performance assessment of the two systems. This paper presents an in-depth analysis of the measurement campaigns conducted on them, with the U6G campaign representing the first of its kind. A benchmark is provided by ray-tracing simulations. The results suggest that networks operating in these frequency bands provide good indoor and outdoor coverage and throughput in urban scenarios, even when deployed in the macro base station setup common to lower frequencies. In addition, a comparative performance analysis of these two key technologies is provided, offering insights on their relative strengths, weaknesses and improvement margins and informing on which bands is better suited for urban macro coverage.
△ Less
Submitted 1 March, 2024;
originally announced March 2024.
-
Human mobility is well described by closed-form gravity-like models learned automatically from data
Authors:
Oriol Cabanas-Tirapu,
Lluís Danús,
Esteban Moro,
Marta Sales-Pardo,
Roger Guimerà
Abstract:
Modeling of human mobility is critical to address questions in urban planning and transportation, as well as global challenges in sustainability, public health, and economic development. However, our understanding and ability to model mobility flows within and between urban areas are still incomplete. At one end of the modeling spectrum we have simple so-called gravity models, which are easy to in…
▽ More
Modeling of human mobility is critical to address questions in urban planning and transportation, as well as global challenges in sustainability, public health, and economic development. However, our understanding and ability to model mobility flows within and between urban areas are still incomplete. At one end of the modeling spectrum we have simple so-called gravity models, which are easy to interpret and provide modestly accurate predictions of mobility flows. At the other end, we have complex machine learning and deep learning models, with tens of features and thousands of parameters, which predict mobility more accurately than gravity models at the cost of not being interpretable and not providing insight on human behavior. Here, we show that simple machine-learned, closed-form models of mobility are able to predict mobility flows more accurately, overall, than either gravity or complex machine and deep learning models. At the same time, these models are simple and gravity-like, and can be interpreted in terms similar to standard gravity models. Furthermore, these models work for different datasets and at different scales, suggesting that they may capture the fundamental universal features of human mobility.
△ Less
Submitted 18 December, 2023;
originally announced December 2023.
-
An Open RAN Framework for the Dynamic Control of 5G Service Level Agreements
Authors:
Eugenio Moro,
Michele Polese,
Antonio Capone,
Tommaso Melodia
Abstract:
The heterogeneity of use cases that next-generation wireless systems need to support calls for flexible and programmable networks that can autonomously adapt to the application requirements. Specifically, traffic flows that support critical applications (e.g., vehicular control or safety communications) often come with a requirement in terms of guaranteed performance. At the same time, others are…
▽ More
The heterogeneity of use cases that next-generation wireless systems need to support calls for flexible and programmable networks that can autonomously adapt to the application requirements. Specifically, traffic flows that support critical applications (e.g., vehicular control or safety communications) often come with a requirement in terms of guaranteed performance. At the same time, others are more elastic and can adapt to the resources made available by the network (e.g., video streaming). To this end, the Open Radio Access Network (RAN) paradigm is seen as an enabler of dynamic control and adaptation of the protocol stack of 3rd Generation Partnership Project (3GPP) networks in the 5th Generation (5G) and beyond. Through its embodiment in the O-RAN alliance specifications, it introduces the Ran Intelligent Controllers (RICs), which enable closed-loop control, leveraging a rich set of RAN Key Performance Measurements (KPMs) to build a representation of the network and enforcing dynamic control through the configuration of 3GPP-defined stack parameters. In this paper, we leverage the Open RAN closed-loop control capabilities to design, implement, and evaluate multiple data-driven and dynamic Service Level Agreement (SLA) enforcement policies, capable of adapting the RAN semi-persistent scheduling patterns to match users requirements. To do so, we implement semi-persistent scheduling capabilities in the OpenAirInterface (OAI) 5G stack, as well as an easily extensible and customizable version of the Open RAN E2 interface that connects the OAI base stations to the near-real-time RIC. We deploy and test our framework on Colosseum, a large-scale hardware-in-the-loop channel emulator. Results confirm the effectiveness of the proposed Open RAN-based solution in managing SLA in near-real-time.
△ Less
Submitted 14 September, 2023;
originally announced September 2023.
-
AI exposure predicts unemployment risk
Authors:
Morgan Frank,
Yong-Yeol Ahn,
Esteban Moro
Abstract:
Is artificial intelligence (AI) disrupting jobs and creating unemployment? Despite many attempts to quantify occupations' exposure to AI, inconsistent validation obfuscates the relative benefits of each approach. A lack of disaggregated labor outcome data, including unemployment data, further exacerbates the issue. Here, we assess which models of AI exposure predict job separations and unemploymen…
▽ More
Is artificial intelligence (AI) disrupting jobs and creating unemployment? Despite many attempts to quantify occupations' exposure to AI, inconsistent validation obfuscates the relative benefits of each approach. A lack of disaggregated labor outcome data, including unemployment data, further exacerbates the issue. Here, we assess which models of AI exposure predict job separations and unemployment risk using new occupation-level unemployment data by occupation from each US state's unemployment insurance office spanning 2010 through 2020. Although these AI exposure scores have been used by governments and industry, we find that individual AI exposure models are not predictive of unemployment rates, unemployment risk, or job separation rates. However, an ensemble of those models exhibits substantial predictive power suggesting that competing models may capture different aspects of AI exposure that collectively account for AI's variable impact across occupations, regions, and time. Our results also call for dynamic, context-aware, and validated methods for assessing AI exposure. Interactive visualizations for this study are available at https://sites.pitt.edu/~mrfrank/uiRiskDemo/.
△ Less
Submitted 4 August, 2023;
originally announced August 2023.
-
Metropolitan Scale and Longitudinal Dataset of Anonymized Human Mobility Trajectories
Authors:
Takahiro Yabe,
Kota Tsubouchi,
Toru Shimizu,
Yoshihide Sekimoto,
Kaoru Sezaki,
Esteban Moro,
Alex Pentland
Abstract:
Modeling and predicting human mobility trajectories in urban areas is an essential task for various applications. The recent availability of large-scale human movement data collected from mobile devices have enabled the development of complex human mobility prediction models. However, human mobility prediction methods are often trained and tested on different datasets, due to the lack of open-sour…
▽ More
Modeling and predicting human mobility trajectories in urban areas is an essential task for various applications. The recent availability of large-scale human movement data collected from mobile devices have enabled the development of complex human mobility prediction models. However, human mobility prediction methods are often trained and tested on different datasets, due to the lack of open-source large-scale human mobility datasets amid privacy concerns, posing a challenge towards conducting fair performance comparisons between methods. To this end, we created an open-source, anonymized, metropolitan scale, and longitudinal (90 days) dataset of 100,000 individuals' human mobility trajectories, using mobile phone location data. The location **s are spatially and temporally discretized, and the metropolitan area is undisclosed to protect users' privacy. The 90-day period is composed of 75 days of business-as-usual and 15 days during an emergency. To promote the use of the dataset, we will host a human mobility prediction data challenge (`HuMob Challenge 2023') using the human mobility dataset, which will be held in conjunction with ACM SIGSPATIAL 2023.
△ Less
Submitted 7 July, 2023;
originally announced July 2023.
-
Are machine learning technologies ready to be used for humanitarian work and development?
Authors:
Vedran Sekara,
Márton Karsai,
Esteban Moro,
Dohyung Kim,
Enrique Delamonica,
Manuel Cebrian,
Miguel Luengo-Oroz,
Rebeca Moreno Jiménez,
Manuel Garcia-Herranz
Abstract:
Novel digital data sources and tools like machine learning (ML) and artificial intelligence (AI) have the potential to revolutionize data about development and can contribute to monitoring and mitigating humanitarian problems. The potential of applying novel technologies to solving some of humanity's most pressing issues has garnered interest outside the traditional disciplines studying and workin…
▽ More
Novel digital data sources and tools like machine learning (ML) and artificial intelligence (AI) have the potential to revolutionize data about development and can contribute to monitoring and mitigating humanitarian problems. The potential of applying novel technologies to solving some of humanity's most pressing issues has garnered interest outside the traditional disciplines studying and working on international development. Today, scientific communities in fields like Computational Social Science, Network Science, Complex Systems, Human Computer Interaction, Machine Learning, and the broader AI field are increasingly starting to pay attention to these pressing issues. However, are sophisticated data driven tools ready to be used for solving real-world problems with imperfect data and of staggering complexity? We outline the current state-of-the-art and identify barriers, which need to be surmounted in order for data-driven technologies to become useful in humanitarian and development contexts. We argue that, without organized and purposeful efforts, these new technologies risk at best falling short of promised goals, at worst they can increase inequality, amplify discrimination, and infringe upon human rights.
△ Less
Submitted 4 July, 2023;
originally announced July 2023.
-
Advancing O-RAN to Facilitate Intelligence in V2X
Authors:
Eugenio Moro,
Francesco Linsalata,
Maurizio Magarini,
Umberto Spagnolini,
Antonio Capone
Abstract:
Vehicular communications at high frequencies are envisioned to be a breakthrough application for the 6G cellular systems. Traditional Radio Access Networks (RANs) lack the flexibility to enable sophisticated control mechanisms that are demanded by the strict performance requirements of the dynamic vehicular environment. In contrast, the features of Open RAN (O-RAN) can be exploited to support adva…
▽ More
Vehicular communications at high frequencies are envisioned to be a breakthrough application for the 6G cellular systems. Traditional Radio Access Networks (RANs) lack the flexibility to enable sophisticated control mechanisms that are demanded by the strict performance requirements of the dynamic vehicular environment. In contrast, the features of Open RAN (O-RAN) can be exploited to support advanced use cases. Indeed, the emerging paradigm of O-RAN represents an ideal framework for the orchestration of vehicular communication. Although the high potential stemming from their integration can be easily seen and recognized, the effective combination of the two ecosystems is an open issue. This article pioneers the integration of the two strategies for seamlessly incorporating vehicle-to-everything (V2X) control within O-RAN's ecosystem. We propose and discuss an enabling architecture that tightly integrates V2X and O-RAN. In the proposed solution, an O-RAN-based control plane operates at low frequencies to achieve reliable and efficient connectivity among autonomous vehicles at higher frequencies. The technological feasibility of this integrated architecture is investigated. A detailed case study is presented and analyzed to demonstrate the design of an xApp to showcase a practical example of O-RAN solution for a specific V2X scenario.
△ Less
Submitted 3 July, 2023;
originally announced July 2023.
-
Toward Open Integrated Access and Backhaul with O-RAN
Authors:
Eugenio Moro,
Gabriele Gemmi,
Michele Polese,
Leonardo Maccari,
Antonio Capone,
Tommaso Melodia
Abstract:
Millimeter wave (mmWave) communications has been recently standardized for use in the fifth generation (5G) of cellular networks, fulfilling the promise of multi-gigabit mobile throughput of current and future mobile radio network generations. In this context, the network densification required to overcome the difficult mmWave propagation will result in increased deployment costs. Integrated Acces…
▽ More
Millimeter wave (mmWave) communications has been recently standardized for use in the fifth generation (5G) of cellular networks, fulfilling the promise of multi-gigabit mobile throughput of current and future mobile radio network generations. In this context, the network densification required to overcome the difficult mmWave propagation will result in increased deployment costs. Integrated Access and Backhaul (IAB) has been proposed as an effective mean of reducing densification costs by deploying a wireless mesh network of base stations, where backhaul and access transmissions share the same radio technology. However, IAB requires sophisticated control mechanisms to operate efficiently and address the increased complexity. The Open Radio Access Network (RAN) paradigm represents the ideal enabler of RAN intelligent control, but its current specifications are not compatible with IAB. In this work, we discuss the challenges of integrating IAB into the Open RAN ecosystem, detailing the required architectural extensions that will enable dynamic control of 5G IAB networks. We implement the proposed integrated architecture into the first publicly-available Open-RAN-enabled experimental framework, which allows prototy** and testing Open-RAN-based solutions over end-to-end 5G IAB networks. Finally, we validate the framework with both ideal and realistic deployment scenarios exploiting the large-scale testing capabilities of publicly available experimental platforms
△ Less
Submitted 10 May, 2023;
originally announced May 2023.
-
Open RAN-empowered V2X Architecture: Challenges, Opportunities, and Research Directions
Authors:
Francesco Linsalata,
Eugenio Moro,
Maurizio Magarini,
Umberto Spagnolini,
Antonio Capone
Abstract:
Advances in the automotive industry and the ever-increasing demand for Connected and Autonomous Vehicles (CAVs) are pushing for a new epoch of networked wireless systems. Vehicular communications, or Vehicle-to-Everything (V2X), are expected to be among the main actors of the future beyond 5G and 6G networks. However, the challenging application requirements, the fast variability of the vehicular…
▽ More
Advances in the automotive industry and the ever-increasing demand for Connected and Autonomous Vehicles (CAVs) are pushing for a new epoch of networked wireless systems. Vehicular communications, or Vehicle-to-Everything (V2X), are expected to be among the main actors of the future beyond 5G and 6G networks. However, the challenging application requirements, the fast variability of the vehicular environment, and the harsh propagation conditions of high frequencies call for sophisticated control mechanisms to ensure the success of such a disruptive technology. While traditional Radio Access Networks (RAN) lack the flexibility to support the required control primitives, the emergent concept of Open RAN (O-RAN) appears as an ideal enabler of V2X communication orchestration. However, effectively integrating the two ecosystems is still an open issue. This paper discusses possible integration strategies, highlighting the challenges and opportunities of leveraging O-RAN to enable real-time V2X control. Additionally, we enrich our discussion with potential research directions stemming from the current state-of-the-art, and we provide preliminary simulation results that validate the effectiveness of the proposed integration.
△ Less
Submitted 2 May, 2024; v1 submitted 13 March, 2023;
originally announced March 2023.
-
Complete Gröbner basis for lattice codes
Authors:
I. Álvarez-Barrientos,
M. Borges-Quintana,
M. A. Borges Trenard,
E. Martínez Moro,
J. A. Ornella
Abstract:
In this work, two algorithms are developed related to lattice codes. In the first one, an extended complete Gröbner basis is computed for the label code of a lattice. This basis supports all term orderings associated with a total degree order offering information about de label code of the lattice. The second one is a decoding algorithm that uses an extended complete Gröbner basis of the label cod…
▽ More
In this work, two algorithms are developed related to lattice codes. In the first one, an extended complete Gröbner basis is computed for the label code of a lattice. This basis supports all term orderings associated with a total degree order offering information about de label code of the lattice. The second one is a decoding algorithm that uses an extended complete Gröbner basis of the label code of the lattice for monomial reduction, this provides all the lattice vectors that constitute candidates for the solution of the Close Vector Problem for a given vector.
△ Less
Submitted 21 February, 2023;
originally announced February 2023.
-
Adverse weather amplifies social media activity
Authors:
Kelton Minor,
Esteban Moro,
Nick Obradovich
Abstract:
Humanity spends an increasing proportion of its time interacting online. Scholars are intensively investigating the societal drivers and resultant impacts of this collective shift in our allocation of time and attention. Yet, the external factors that regularly shape online behavior remain markedly understudied. Do environmental factors alter rates of online activity? Here we show that adverse met…
▽ More
Humanity spends an increasing proportion of its time interacting online. Scholars are intensively investigating the societal drivers and resultant impacts of this collective shift in our allocation of time and attention. Yet, the external factors that regularly shape online behavior remain markedly understudied. Do environmental factors alter rates of online activity? Here we show that adverse meteorological conditions markedly increase social media use in the United States. To do so, we employ climate econometric methods alongside over three and a half billion social media posts from tens of millions of individuals from both Facebook and Twitter between 2009 and 2016. We find that more extreme temperatures and added precipitation each independently amplify social media activity. Weather that is adverse on both the temperature and precipitation dimensions produces markedly larger increases in social media activity. On average across both platforms, compared to the temperate weather baseline, days colder than -5°C with 1.5-2cm of precipitation elevate social media activity by 35%. This effect is nearly three times the typical increase in social media activity observed on New Year's Eve in New York City. We observe meteorological effects on social media participation at both the aggregate and individual level, even accounting for individual-specific, temporal, and location-specific potential confounds.
△ Less
Submitted 16 February, 2023;
originally announced February 2023.
-
Identifying latent activity behaviors and lifestyles using mobility data to describe urban dynamics
Authors:
Yanni Yang,
Alex Pentland,
Esteban Moro
Abstract:
Urbanization and its problems require an in-depth and comprehensive understanding of urban dynamics, especially the complex and diversified lifestyles in modern cities. Digitally acquired data can accurately capture complex human activity, but it lacks the interpretability of demographic data. In this paper, we study a privacy-enhanced dataset of the mobility visitation patterns of 1.2 million peo…
▽ More
Urbanization and its problems require an in-depth and comprehensive understanding of urban dynamics, especially the complex and diversified lifestyles in modern cities. Digitally acquired data can accurately capture complex human activity, but it lacks the interpretability of demographic data. In this paper, we study a privacy-enhanced dataset of the mobility visitation patterns of 1.2 million people to 1.1 million places in 11 metro areas in the U.S. to detect the latent mobility behaviors and lifestyles in the largest American cities. Despite the considerable complexity of mobility visitations, we found that lifestyles can be automatically decomposed into only 12 latent interpretable activity behaviors on how people combine shop**, eating, working, or using their free time. Rather than describing individuals with a single lifestyle, we find that city dwellers' behavior is a mixture of those behaviors. Those detected latent activity behaviors are equally present across cities and cannot be fully explained by main demographic features. Finally, we find those latent behaviors are associated with dynamics like experienced income segregation, transportation, or healthy behaviors in cities, even after controlling for demographic features. Our results signal the importance of complementing traditional census data with activity behaviors to understand urban dynamics.
△ Less
Submitted 24 September, 2022;
originally announced September 2022.
-
Longitudinal Complex Dynamics of Labour Markets Reveal Increasing Polarisation
Authors:
Shahad Althobaiti,
Ahmad Alabdulkareem,
Judy Hanwen Shen,
Iyad Rahwan,
Morgan Frank,
Esteban Moro,
Alex Rutherford
Abstract:
In this paper we conduct a longitudinal analysis of the structure of labour markets in the US over 7 decades of technological, economic and policy change. We make use of network science, natural language processing and machine learning to uncover structural changes in the labour market over time. We find a steady rate of both disappearance of jobs and a shift in the required work tasks, despite mu…
▽ More
In this paper we conduct a longitudinal analysis of the structure of labour markets in the US over 7 decades of technological, economic and policy change. We make use of network science, natural language processing and machine learning to uncover structural changes in the labour market over time. We find a steady rate of both disappearance of jobs and a shift in the required work tasks, despite much technological and economic change over this time period. Machine learning is used to classify jobs as being predominantly cognitive or physical based on the textual description of the workplace tasks. We also measure increasing polarisation between these two classes of jobs, linked by the similarity of tasks, over time that could constrain workers wishing to move to different jobs.
△ Less
Submitted 14 April, 2022;
originally announced April 2022.
-
Generating synthetic mobility data for a realistic population with RNNs to improve utility and privacy
Authors:
Alex Berke,
Ronan Doorley,
Kent Larson,
Esteban Moro
Abstract:
Location data collected from mobile devices represent mobility behaviors at individual and societal levels. These data have important applications ranging from transportation planning to epidemic modeling. However, issues must be overcome to best serve these use cases: The data often represent a limited sample of the population and use of the data jeopardizes privacy.
To address these issues, we…
▽ More
Location data collected from mobile devices represent mobility behaviors at individual and societal levels. These data have important applications ranging from transportation planning to epidemic modeling. However, issues must be overcome to best serve these use cases: The data often represent a limited sample of the population and use of the data jeopardizes privacy.
To address these issues, we present and evaluate a system for generating synthetic mobility data using a deep recurrent neural network (RNN) which is trained on real location data. The system takes a population distribution as input and generates mobility traces for a corresponding synthetic population.
Related generative approaches have not solved the challenges of capturing both the patterns and variability in individuals' mobility behaviors over longer time periods, while also balancing the generation of realistic data with privacy. Our system leverages RNNs' ability to generate complex and novel sequences while retaining patterns from training data. Also, the model introduces randomness used to calibrate the variation between the synthetic and real data at the individual level. This is to both capture variability in human mobility, and protect user privacy.
Location based services (LBS) data from more than 22,700 mobile devices were used in an experimental evaluation across utility and privacy metrics. We show the generated mobility data retain the characteristics of the real data, while varying from the real data at the individual level, and where this amount of variation matches the variation within the real data.
△ Less
Submitted 4 January, 2022;
originally announced January 2022.
-
Boosting 5G mm-Wave IAB Reliability with Reconfigurable Intelligent Surfaces
Authors:
Paolo Fiore,
Eugenio Moro,
Ilario Filippini,
Antonio Capone,
Danilo De Donno
Abstract:
The introduction of the mm-Wave spectrum into 5G NR promises to bring about unprecedented data throughput to future mobile wireless networks but comes with several challenges. Network densification has been proposed as a viable solution to increase RAN resilience, and the newly introduced Integrated-Access-and-Backhaul (IAB) is considered a key enabling technology with compelling cost-reducing opp…
▽ More
The introduction of the mm-Wave spectrum into 5G NR promises to bring about unprecedented data throughput to future mobile wireless networks but comes with several challenges. Network densification has been proposed as a viable solution to increase RAN resilience, and the newly introduced Integrated-Access-and-Backhaul (IAB) is considered a key enabling technology with compelling cost-reducing opportunities for such dense deployments. Reconfigurable Intelligent Surfaces (RIS) have recently gained extreme popularity as they can create Smart Radio Environments by EM wave manipulation and behave as inexpensive passive relays. However, it is not yet clear what role this technology can play in a large RAN deployment. With the scope of filling this gap, we study the blockage resilience of realistic mm-Wave RAN deployments that use IAB and RIS. The RAN layouts have been optimised by means of a novel mm-Wave planning tool based on MILP formulation. Numerical results show how adding RISs to IAB deployments can provide high blockage resistance levels while significantly reducing the overall network planning cost.
△ Less
Submitted 20 January, 2022; v1 submitted 7 June, 2021;
originally announced June 2021.
-
Planning Mm-Wave Access Networks With Reconfigurable Intelligent Surfaces
Authors:
Eugenio Moro,
Ilario Filippini,
Antonio Capone,
Danilo De Donno
Abstract:
With the capability to support gigabit data rates, millimetre-wave (mm-Wave) communication is unanimously considered a key technology of future cellular networks. However, the harsh propagation at such high frequencies makes these networks quite susceptible to failures due to obstacle blockages. Recently introduced Reconfigurable Intelligent Surfaces (RISs) can enhance the coverage of mm-Wave comm…
▽ More
With the capability to support gigabit data rates, millimetre-wave (mm-Wave) communication is unanimously considered a key technology of future cellular networks. However, the harsh propagation at such high frequencies makes these networks quite susceptible to failures due to obstacle blockages. Recently introduced Reconfigurable Intelligent Surfaces (RISs) can enhance the coverage of mm-Wave communications by improving the received signal power and offering an alternative radio path when the direct link is interrupted. While several works have addressed this possibility from a communication standpoint, none of these has yet investigated the impact of RISs on large-scale mm-Wave networks. Aiming to fill this literature gap, we propose a new mathematical formulation of the coverage planning problem that includes RISs. Using well-established planning methods, we have developed a new optimization model where RISs can be installed alongside base stations to assist the communications, creating what we have defined as Smart Radio Connections. Our simulation campaigns show that RISs effectively increase both throughput and coverage of access networks, while further numerical results highlight additional benefits that the simplified scenarios analyzed by previous works could not reveal.
△ Less
Submitted 8 June, 2021; v1 submitted 25 May, 2021;
originally announced May 2021.
-
Joint Management of Compute and Radio Resources in Mobile Edge Computing: a Market Equilibrium Approach
Authors:
Eugenio Moro,
Ilario Filippini
Abstract:
Edge computing has been recently introduced as a way to bring computational capabilities closer to end users of modern network-based services, in order to support existent and future delay-sensitive applications by effectively addressing the high propagation delay issue that affects cloud computing. However, the problem of efficiently and fairly manage the system resources presents particular chal…
▽ More
Edge computing has been recently introduced as a way to bring computational capabilities closer to end users of modern network-based services, in order to support existent and future delay-sensitive applications by effectively addressing the high propagation delay issue that affects cloud computing. However, the problem of efficiently and fairly manage the system resources presents particular challenges due to the limited capacity of both edge nodes and wireless access networks, as well as the heterogeneity of resources and services' requirements. To this end, we propose a techno-economic market where service providers act as buyers, securing both radio and computing resources for the execution of their associated end users' jobs, while being constrained by a budget limit. We design an allocation mechanism that employs convex programming in order to find the unique market equilibrium point that maximizes fairness, while making sure that all buyers receive their preferred resource bundle. Additionally, we derive theoretical properties that confirm how the market equilibrium approach strikes a balance between fairness and efficiency. We also propose alternative allocation mechanisms and give a comparison with the market-based mechanism. Finally, we conduct simulations in order to numerically analyze and compare the performance of the mechanisms and confirm the theoretical properties of the market model.
△ Less
Submitted 17 November, 2020; v1 submitted 11 November, 2020;
originally announced November 2020.
-
Segregated interactions in urban and online space
Authors:
Xiaowen Dong,
Alfredo J. Morales,
Eaman Jahani,
Esteban Moro,
Bruno Lepri,
Burcin Bozkaya,
Carlos Sarraute,
Yaneer Bar-Yam,
Alex Pentland
Abstract:
Urban income segregation is a widespread phenomenon that challenges societies across the globe. Classical studies on segregation have largely focused on the geographic distribution of residential neighborhoods rather than on patterns of social behaviors and interactions. In this study, we analyze segregation in economic and social interactions by observing credit card transactions and Twitter ment…
▽ More
Urban income segregation is a widespread phenomenon that challenges societies across the globe. Classical studies on segregation have largely focused on the geographic distribution of residential neighborhoods rather than on patterns of social behaviors and interactions. In this study, we analyze segregation in economic and social interactions by observing credit card transactions and Twitter mentions among thousands of individuals in three culturally different metropolitan areas. We show that segregated interaction is amplified relative to the expected effects of geographic segregation in terms of both purchase activity and online communication. Furthermore, we find that segregation increases with difference in socio-economic status but is asymmetric for purchase activity, i.e., the amount of interaction from poorer to wealthier neighborhoods is larger than vice versa. Our results provide novel insights into the understanding of behavioral segregation in human interactions with significant socio-political and economic implications.
△ Less
Submitted 19 April, 2020; v1 submitted 10 November, 2019;
originally announced November 2019.
-
Towards a new social laboratory: An experimental study of search through community participation at Burning Man
Authors:
Ziv Epstein,
Micah Epstein,
Christian Almenar,
Matt Groh,
Niccolo Pescetelli,
Esteban Moro,
Nick Obradovich,
Manuel Cebrian,
Iyad Rahwan
Abstract:
The "small world phenomenon," popularized by Stanley Milgram, suggests that individuals from across a social network are connected via a short path of mutual friends and can leverage their local social information to efficiently traverse that network. Existing social search experiments are plagued by high rates of attrition, which prohibit comprehensive study of social search. We investigate this…
▽ More
The "small world phenomenon," popularized by Stanley Milgram, suggests that individuals from across a social network are connected via a short path of mutual friends and can leverage their local social information to efficiently traverse that network. Existing social search experiments are plagued by high rates of attrition, which prohibit comprehensive study of social search. We investigate this by conducting a small world experiment at Burning Man, an event located in the Black Rock Desert of Nevada, USA, known its unique social systems and community participation. We design location-tracking vessels that we routed through Burning Man towards the goal of finding a particular person. Along the way, the vessels logged individual information and GPS data. Two of fifteen vessels made it to their designated people, but a month after Burning Man. Our results suggest possible improvements to limit rates of attrition through community participation and a design methodology that emphasizes cultural practices to aid social experimentation.
△ Less
Submitted 11 March, 2019;
originally announced March 2019.
-
Leveraging Communication Topologies Between Learning Agents in Deep Reinforcement Learning
Authors:
Dhaval Adjodah,
Dan Calacci,
Abhimanyu Dubey,
Anirudh Goyal,
Peter Krafft,
Esteban Moro,
Alex Pentland
Abstract:
A common technique to improve learning performance in deep reinforcement learning (DRL) and many other machine learning algorithms is to run multiple learning agents in parallel. A neglected component in the development of these algorithms has been how best to arrange the learning agents involved to improve distributed search. Here we draw upon results from the networked optimization literatures s…
▽ More
A common technique to improve learning performance in deep reinforcement learning (DRL) and many other machine learning algorithms is to run multiple learning agents in parallel. A neglected component in the development of these algorithms has been how best to arrange the learning agents involved to improve distributed search. Here we draw upon results from the networked optimization literatures suggesting that arranging learning agents in communication networks other than fully connected topologies (the implicit way agents are commonly arranged in) can improve learning. We explore the relative performance of four popular families of graphs and observe that one such family (Erdos-Renyi random graphs) empirically outperforms the de facto fully-connected communication topology across several DRL benchmark tasks. Additionally, we observe that 1000 learning agents arranged in an Erdos-Renyi graph can perform as well as 3000 agents arranged in the standard fully-connected topology, showing the large learning improvement possible when carefully designing the topology over which agents communicate. We complement these empirical results with a theoretical investigation of why our alternate topologies perform better. Overall, our work suggests that distributed machine learning algorithms could be made more effective if the communication topology between learning agents was optimized.
△ Less
Submitted 11 March, 2020; v1 submitted 16 February, 2019;
originally announced February 2019.
-
Optimal Space-Time Block Code Designs Based on Irreducible Polynomials of Degree Two
Authors:
Carina Alves,
Eliton M. Moro
Abstract:
The main of this paper is to prove that in terms of normalized density, a space-time block code based on an irreducible quadratic polynomial over the Eisenstein integers is an optimal space-time block code compared with any quadratic space-time block code over the ring of integers of imaginary quadratic fields. In addition we find the optimal design of space-time block codes based on an irreducibl…
▽ More
The main of this paper is to prove that in terms of normalized density, a space-time block code based on an irreducible quadratic polynomial over the Eisenstein integers is an optimal space-time block code compared with any quadratic space-time block code over the ring of integers of imaginary quadratic fields. In addition we find the optimal design of space-time block codes based on an irreducible quadratic polynomial over some rings of imaginary quadratic fields.
△ Less
Submitted 18 January, 2019;
originally announced January 2019.
-
How to Organize your Deep Reinforcement Learning Agents: The Importance of Communication Topology
Authors:
Dhaval Adjodah,
Dan Calacci,
Abhimanyu Dubey,
Peter Krafft,
Esteban Moro,
Alex `Sandy' Pentland
Abstract:
In this empirical paper, we investigate how learning agents can be arranged in more efficient communication topologies for improved learning. This is an important problem because a common technique to improve speed and robustness of learning in deep reinforcement learning and many other machine learning algorithms is to run multiple learning agents in parallel. The standard communication architect…
▽ More
In this empirical paper, we investigate how learning agents can be arranged in more efficient communication topologies for improved learning. This is an important problem because a common technique to improve speed and robustness of learning in deep reinforcement learning and many other machine learning algorithms is to run multiple learning agents in parallel. The standard communication architecture typically involves all agents intermittently communicating with each other (fully connected topology) or with a centralized server (star topology). Unfortunately, optimizing the topology of communication over the space of all possible graphs is a hard problem, so we borrow results from the networked optimization and collective intelligence literatures which suggest that certain families of network topologies can lead to strong improvements over fully-connected networks. We start by introducing alternative network topologies to DRL benchmark tasks under the Evolution Strategies paradigm which we call Network Evolution Strategies. We explore the relative performance of the four main graph families and observe that one such family (Erdos-Renyi random graphs) empirically outperforms all other families, including the de facto fully-connected communication topologies. Additionally, the use of alternative network topologies has a multiplicative performance effect: we observe that when 1000 learning agents are arranged in a carefully designed communication topology, they can compete with 3000 agents arranged in the de facto fully-connected topology. Overall, our work suggests that distributed machine learning algorithms would learn more efficiently if the communication topology between learning agents was optimized.
△ Less
Submitted 2 March, 2019; v1 submitted 29 November, 2018;
originally announced November 2018.
-
Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network
Authors:
Marcin Waniek,
Kai Zhou,
Yevgeniy Vorobeychik,
Esteban Moro,
Tomasz P. Michalak,
Talal Rahwan
Abstract:
Link prediction is one of the fundamental research problems in network analysis. Intuitively, it involves identifying the edges that are most likely to be added to a given network, or the edges that appear to be missing from the network when in fact they are present. Various algorithms have been proposed to solve this problem over the past decades. For all their benefits, such algorithms raise ser…
▽ More
Link prediction is one of the fundamental research problems in network analysis. Intuitively, it involves identifying the edges that are most likely to be added to a given network, or the edges that appear to be missing from the network when in fact they are present. Various algorithms have been proposed to solve this problem over the past decades. For all their benefits, such algorithms raise serious privacy concerns, as they could be used to expose a connection between two individuals who wish to keep their relationship private. With this in mind, we investigate the ability of such individuals to evade link prediction algorithms. More precisely, we study their ability to strategically alter their connections so as to increase the probability that some of their connections remain unidentified by link prediction algorithms. We formalize this question as an optimization problem, and prove that finding an optimal solution is NP-complete. Despite this hardness, we show that the situation is not bleak in practice. In particular, we propose two heuristics that can easily be applied by members of the general public on existing social media. We demonstrate the effectiveness of those heuristics on a wide variety of networks and against a plethora of link prediction algorithms.
△ Less
Submitted 1 September, 2018;
originally announced September 2018.
-
MemeSequencer: Sparse Matching for Embedding Image Macros
Authors:
Abhimanyu Dubey,
Esteban Moro,
Manuel Cebrian,
Iyad Rahwan
Abstract:
The analysis of the creation, mutation, and propagation of social media content on the Internet is an essential problem in computational social science, affecting areas ranging from marketing to political mobilization. A first step towards understanding the evolution of images online is the analysis of rapidly modifying and propagating memetic imagery or `memes'. However, a pitfall in proceeding w…
▽ More
The analysis of the creation, mutation, and propagation of social media content on the Internet is an essential problem in computational social science, affecting areas ranging from marketing to political mobilization. A first step towards understanding the evolution of images online is the analysis of rapidly modifying and propagating memetic imagery or `memes'. However, a pitfall in proceeding with such an investigation is the current incapability to produce a robust semantic space for such imagery, capable of understanding differences in Image Macros. In this study, we provide a first step in the systematic study of image evolution on the Internet, by proposing an algorithm based on sparse representations and deep learning to decouple various types of content in such images and produce a rich semantic embedding. We demonstrate the benefits of our approach on a variety of tasks pertaining to memes and Image Macros, such as image clustering, image retrieval, topic prediction and virality prediction, surpassing the existing methods on each. In addition to its utility on quantitative tasks, our method opens up the possibility of obtaining the first large-scale understanding of the evolution and propagation of memetic imagery.
△ Less
Submitted 13 February, 2018;
originally announced February 2018.
-
Improved Learning in Evolution Strategies via Sparser Inter-Agent Network Topologies
Authors:
Dhaval Adjodah,
Dan Calacci,
Yan Leng,
Peter Krafft,
Esteban Moro,
Alex Pentland
Abstract:
We draw upon a previously largely untapped literature on human collective intelligence as a source of inspiration for improving deep learning. Implicit in many algorithms that attempt to solve Deep Reinforcement Learning (DRL) tasks is the network of processors along which parameter values are shared. So far, existing approaches have implicitly utilized fully-connected networks, in which all proce…
▽ More
We draw upon a previously largely untapped literature on human collective intelligence as a source of inspiration for improving deep learning. Implicit in many algorithms that attempt to solve Deep Reinforcement Learning (DRL) tasks is the network of processors along which parameter values are shared. So far, existing approaches have implicitly utilized fully-connected networks, in which all processors are connected. However, the scientific literature on human collective intelligence suggests that complete networks may not always be the most effective information network structures for distributed search through complex spaces. Here we show that alternative topologies can improve deep neural network training: we find that sparser networks learn higher rewards faster, leading to learning improvements at lower communication costs.
△ Less
Submitted 14 February, 2019; v1 submitted 29 November, 2017;
originally announced November 2017.
-
Analyzing gender inequality through large-scale Facebook advertising data
Authors:
David Garcia,
Yonas Mitike Kassa,
Angel Cuevas,
Manuel Cebrian,
Esteban Moro,
Iyad Rahwan,
Ruben Cuevas
Abstract:
Online social media are information resources that can have a transformative power in society. While the Web was envisioned as an equalizing force that allows everyone to access information, the digital divide prevents large amounts of people from being present online. Online social media in particular are prone to gender inequality, an important issue given the link between social media use and e…
▽ More
Online social media are information resources that can have a transformative power in society. While the Web was envisioned as an equalizing force that allows everyone to access information, the digital divide prevents large amounts of people from being present online. Online social media in particular are prone to gender inequality, an important issue given the link between social media use and employment. Understanding gender inequality in social media is a challenging task due to the necessity of data sources that can provide large-scale measurements across multiple countries. Here we show how the Facebook Gender Divide (FGD), a metric based on aggregated statistics of more than 1.4 Billion users in 217 countries, explains various aspects of worldwide gender inequality. Our analysis shows that the FGD encodes gender equality indices in education, health, and economic opportunity. We find gender differences in network externalities that suggest that using social media has an added value for women. Furthermore, we find that low values of the FGD are associated with increases in economic gender equality. Our results suggest that online social networks, while suffering evident gender imbalance, may lower the barriers that women have to access informational resources and help to narrow the economic gender gap.
△ Less
Submitted 24 March, 2019; v1 submitted 10 October, 2017;
originally announced October 2017.
-
Weather impacts expressed sentiment
Authors:
Patrick Baylis,
Nick Obradovich,
Yury Kryvasheyeu,
Haohui Chen,
Lorenzo Coviello,
Esteban Moro,
Manuel Cebrian,
James H. Fowler
Abstract:
We conduct the largest ever investigation into the relationship between meteorological conditions and the sentiment of human expressions. To do this, we employ over three and a half billion social media posts from tens of millions of individuals from both Facebook and Twitter between 2009 and 2016. We find that cold temperatures, hot temperatures, precipitation, narrower daily temperature ranges,…
▽ More
We conduct the largest ever investigation into the relationship between meteorological conditions and the sentiment of human expressions. To do this, we employ over three and a half billion social media posts from tens of millions of individuals from both Facebook and Twitter between 2009 and 2016. We find that cold temperatures, hot temperatures, precipitation, narrower daily temperature ranges, humidity, and cloud cover are all associated with worsened expressions of sentiment, even when excluding weather-related posts. We compare the magnitude of our estimates with the effect sizes associated with notable historical events occurring within our data.
△ Less
Submitted 31 August, 2017;
originally announced September 2017.
-
Temporal patterns behind the strength of persistent ties
Authors:
Henry Navarro,
Giovanna Miritello,
Arturo Canales,
Esteban Moro
Abstract:
Social networks are made out of strong and weak ties having very different structural and dynamical properties. But, what features of human interaction build a strong tie? Here we approach this question from an practical way by finding what are the properties of social interactions that make ties more persistent and thus stronger to maintain social interactions in the future. Using a large longitu…
▽ More
Social networks are made out of strong and weak ties having very different structural and dynamical properties. But, what features of human interaction build a strong tie? Here we approach this question from an practical way by finding what are the properties of social interactions that make ties more persistent and thus stronger to maintain social interactions in the future. Using a large longitudinal mobile phone database we build a predictive model of tie persistence based on intensity, intimacy, structural and temporal patterns of social interaction. While our results confirm that structural (embeddedness) and intensity (number of calls) are correlated with tie persistence, we find that temporal features of communication events are better and more efficient predictors for tie persistence. Specifically, although communication within ties is always bursty we find that ties that are more bursty than the average are more likely to decay, signaling that tie strength is not only reflected in the intensity or topology of the network, but also on how individuals distribute time or attention across their relationships. We also found that stable relationships have and require a constant rhythm and if communication is halted for more than 8 times the previous communication frequency, most likely the tie will decay. Our results not only are important to understand the strength of social relationships but also to unveil the entanglement between the different temporal scales in networks, from microscopic tie burstiness and rhythm to macroscopic network evolution.
△ Less
Submitted 19 June, 2017;
originally announced June 2017.
-
Channel-Specific Daily Patterns in Mobile Phone Communication
Authors:
Talayeh Aledavood,
Eduardo López,
Sam G. B. Roberts,
Felix Reed-Tsochas,
Esteban Moro,
Robin I. M. Dunbar,
Jari Saramäki
Abstract:
Humans follow circadian rhythms, visible in their activity levels as well as physiological and psychological factors. Such rhythms are also visible in electronic communication records, where the aggregated activity levels of e.g. mobile telephone calls or Wikipedia edits are known to follow their own daily patterns. Here, we study the daily communication patterns of 24 individuals over 18 months,…
▽ More
Humans follow circadian rhythms, visible in their activity levels as well as physiological and psychological factors. Such rhythms are also visible in electronic communication records, where the aggregated activity levels of e.g. mobile telephone calls or Wikipedia edits are known to follow their own daily patterns. Here, we study the daily communication patterns of 24 individuals over 18 months, and show that each individual has a different, persistent communication pattern. These patterns may differ for calls and text messages, which points towards calls and texts serving a different role in communication. For both calls and texts, evenings play a special role. There are also differences in the daily patterns of males and females both for calls and texts, both in how they communicate with individuals of the same gender vs. opposite gender, and also in how communication is allocated at social ties of different nature (kin ties vs. non-kin ties). Taken together, our results show that there is an unexpected richness to the daily communication patterns, from different types of ties being activated at different times of day to different roles of communication channels and gender differences.
△ Less
Submitted 16 July, 2015;
originally announced July 2015.
-
Nowcasting Disaster Damage
Authors:
Yury Kryvasheyeu,
Haohui Chen,
Nick Obradovich,
Esteban Moro,
Pascal Van Hentenryck,
James Fowler,
Manuel Cebrian
Abstract:
Could social media data aid in disaster response and damage assessment? Countries face both an increasing frequency and intensity of natural disasters due to climate change. And during such events, citizens are turning to social media platforms for disaster-related communication and information. Social media improves situational awareness, facilitates dissemination of emergency information, enable…
▽ More
Could social media data aid in disaster response and damage assessment? Countries face both an increasing frequency and intensity of natural disasters due to climate change. And during such events, citizens are turning to social media platforms for disaster-related communication and information. Social media improves situational awareness, facilitates dissemination of emergency information, enables early warning systems, and helps coordinate relief efforts. Additionally, spatiotemporal distribution of disaster-related messages helps with real-time monitoring and assessment of the disaster itself. Here we present a multiscale analysis of Twitter activity before, during, and after Hurricane Sandy. We examine the online response of 50 metropolitan areas of the United States and find a strong relationship between proximity to Sandy's path and hurricane-related social media activity. We show that real and perceived threats -- together with the physical disaster effects -- are directly observable through the intensity and composition of Twitter's message stream. We demonstrate that per-capita Twitter activity strongly correlates with the per-capita economic damage inflicted by the hurricane. Our findings suggest that massive online social networks can be used for rapid assessment ("nowcasting") of damage caused by a large-scale disaster.
△ Less
Submitted 26 April, 2015;
originally announced April 2015.
-
From seconds to months: multi-scale dynamics of mobile telephone calls
Authors:
Jari Saramaki,
Esteban Moro
Abstract:
Big Data on electronic records of social interactions allow approaching human behaviour and sociality from a quantitative point of view with unforeseen statistical power. Mobile telephone Call Detail Records (CDRs), automatically collected by telecom operators for billing purposes, have proven especially fruitful for understanding one-to-one communication patterns as well as the dynamics of social…
▽ More
Big Data on electronic records of social interactions allow approaching human behaviour and sociality from a quantitative point of view with unforeseen statistical power. Mobile telephone Call Detail Records (CDRs), automatically collected by telecom operators for billing purposes, have proven especially fruitful for understanding one-to-one communication patterns as well as the dynamics of social networks that are reflected in such patterns. We present an overview of empirical results on the multi-scale dynamics of social dynamics and networks inferred from mobile telephone calls. We begin with the shortest timescales and fastest dynamics, such as burstiness of call sequences between individuals, and "zoom out" towards longer temporal and larger structural scales, from temporal motifs formed by correlated calls between multiple individuals to long-term dynamics of social groups. We conclude this overview with a future outlook.
△ Less
Submitted 7 April, 2015;
originally announced April 2015.
-
Daily rhythms in mobile telephone communication
Authors:
Talayeh Aledavood,
Eduardo López,
Sam G. B. Roberts,
Felix Reed-Tsochas,
Esteban Moro,
Robin I. M. Dunbar,
Jari Saramäki
Abstract:
Circadian rhythms are known to be important drivers of human activity and the recent availability of electronic records of human behaviour has provided fine-grained data of temporal patterns of activity on a large scale. Further, questionnaire studies have identified important individual differences in circadian rhythms, with people broadly categorised into morning-like or evening-like individuals…
▽ More
Circadian rhythms are known to be important drivers of human activity and the recent availability of electronic records of human behaviour has provided fine-grained data of temporal patterns of activity on a large scale. Further, questionnaire studies have identified important individual differences in circadian rhythms, with people broadly categorised into morning-like or evening-like individuals. However, little is known about the social aspects of these circadian rhythms, or how they vary across individuals. In this study we use a unique 18-month dataset that combines mobile phone calls and questionnaire data to examine individual differences in the daily rhythms of mobile phone activity. We demonstrate clear individual differences in daily patterns of phone calls, and show that these individual differences are persistent despite a high degree of turnover in the individuals' social networks. Further, women's calls were longer than men's calls, especially during the evening and at night, and these calls were typically focused on a small number of emotionally intense relationships. These results demonstrate that individual differences in circadian rhythms are not just related to broad patterns of morningness and eveningness, but have a strong social component, in directing phone calls to specific individuals at specific times of day.
△ Less
Submitted 24 February, 2015;
originally announced February 2015.
-
Social media fingerprints of unemployment
Authors:
Alejandro Llorente,
Manuel Garcia-Herranz,
Manuel Cebrian,
Esteban Moro
Abstract:
Recent wide-spread adoption of electronic and pervasive technologies has enabled the study of human behavior at an unprecedented level, uncovering universal patterns underlying human activity, mobility, and inter-personal communication. In the present work, we investigate whether deviations from these universal patterns may reveal information about the socio-economical status of geographical regio…
▽ More
Recent wide-spread adoption of electronic and pervasive technologies has enabled the study of human behavior at an unprecedented level, uncovering universal patterns underlying human activity, mobility, and inter-personal communication. In the present work, we investigate whether deviations from these universal patterns may reveal information about the socio-economical status of geographical regions. We quantify the extent to which deviations in diurnal rhythm, mobility patterns, and communication styles across regions relate to their unemployment incidence. For this we examine a country-scale publicly articulated social media dataset, where we quantify individual behavioral features from over 145 million geo-located messages distributed among more than 340 different Spanish economic regions, inferred by computing communities of cohesive mobility fluxes. We find that regions exhibiting more diverse mobility fluxes, earlier diurnal rhythms, and more correct grammatical styles display lower unemployment rates. As a result, we provide a simple model able to produce accurate, easily interpretable reconstruction of regional unemployment incidence from their social-media digital fingerprints alone. Our results show that cost-effective economical indicators can be built based on publicly-available social media datasets.
△ Less
Submitted 19 November, 2014; v1 submitted 12 November, 2014;
originally announced November 2014.
-
Performance of Social Network Sensors During Hurricane Sandy
Authors:
Yury Kryvasheyeu,
Haohui Chen,
Esteban Moro,
Pascal Van Hentenryck,
Manuel Cebrian
Abstract:
Information flow during catastrophic events is a critical aspect of disaster management. Modern communication platforms, in particular online social networks, provide an opportunity to study such flow, and a mean to derive early-warning sensors, improving emergency preparedness and response. Performance of the social networks sensor method, based on topological and behavioural properties derived f…
▽ More
Information flow during catastrophic events is a critical aspect of disaster management. Modern communication platforms, in particular online social networks, provide an opportunity to study such flow, and a mean to derive early-warning sensors, improving emergency preparedness and response. Performance of the social networks sensor method, based on topological and behavioural properties derived from the "friendship paradox", is studied here for over 50 million Twitter messages posted before, during, and after Hurricane Sandy. We find that differences in user's network centrality effectively translate into moderate awareness advantage (up to 26 hours); and that geo-location of users within or outside of the hurricane-affected area plays significant role in determining the scale of such advantage. Emotional response appears to be universal regardless of the position in the network topology, and displays characteristic, easily detectable patterns, opening a possibility of implementing a simple "sentiment sensing" technique to detect and locate disasters.
△ Less
Submitted 20 June, 2014; v1 submitted 11 February, 2014;
originally announced February 2014.
-
Time allocation in social networks: correlation between social structure and human communication dynamics
Authors:
Giovanna Miritello,
Rubén Lara,
Esteban Moro
Abstract:
Recent research has shown the deep impact of the dynamics of human interactions (or temporal social networks) on the spreading of information, opinion formation, etc. In general, the bursty nature of human interactions lowers the interaction between people to the extent that both the speed and reach of information diffusion are diminished. Using a large database of 20 million users of mobile phone…
▽ More
Recent research has shown the deep impact of the dynamics of human interactions (or temporal social networks) on the spreading of information, opinion formation, etc. In general, the bursty nature of human interactions lowers the interaction between people to the extent that both the speed and reach of information diffusion are diminished. Using a large database of 20 million users of mobile phone calls we show evidence this effect is not homogeneous in the social network but in fact, there is a large correlation between this effect and the social topological structure around a given individual. In particular, we show that social relations of hubs in a network are relatively weaker from the dynamical point than those that are poorer connected in the information diffusion process. Our results show the importance of the temporal patterns of communication when analyzing and modeling dynamical process on social networks.
△ Less
Submitted 16 May, 2013;
originally announced May 2013.
-
The predictability of consumer visitation patterns
Authors:
Coco Krumme,
Alejandro Llorente,
Manuel Cebrián,
Alex,
Pentland,
Esteban Moro
Abstract:
We consider hundreds of thousands of individual economic transactions to ask: how predictable are consumers in their merchant visitation patterns? Our results suggest that, in the long-run, much of our seemingly elective activity is actually highly predictable. Notwithstanding a wide range of individual preferences, shoppers share regularities in how they visit merchant locations over time. Yet wh…
▽ More
We consider hundreds of thousands of individual economic transactions to ask: how predictable are consumers in their merchant visitation patterns? Our results suggest that, in the long-run, much of our seemingly elective activity is actually highly predictable. Notwithstanding a wide range of individual preferences, shoppers share regularities in how they visit merchant locations over time. Yet while aggregate behavior is largely predictable, the interleaving of shop** events introduces important stochastic elements at short time scales. These short- and long-scale patterns suggest a theoretical upper bound on predictability, and describe the accuracy of a Markov model in predicting a person's next location. We incorporate population-level transition probabilities in the predictive models, and find that in many cases these improve accuracy. While our results point to the elusiveness of precise predictions about where a person will go next, they suggest the existence, at large time-scales, of regularities across the population.
△ Less
Submitted 6 May, 2013;
originally announced May 2013.
-
Limited communication capacity unveils strategies for human interaction
Authors:
Giovanna Miritello,
Rubén Lara,
Manuel Cebrián,
Esteban Moro
Abstract:
Social connectivity is the key process that characterizes the structural properties of social networks and in turn processes such as navigation, influence or information diffusion. Since time, attention and cognition are inelastic resources, humans should have a predefined strategy to manage their social interactions over time. However, the limited observational length of existing human interactio…
▽ More
Social connectivity is the key process that characterizes the structural properties of social networks and in turn processes such as navigation, influence or information diffusion. Since time, attention and cognition are inelastic resources, humans should have a predefined strategy to manage their social interactions over time. However, the limited observational length of existing human interaction datasets, together with the bursty nature of dyadic communications have hampered the observation of tie dynamics in social networks. Here we develop a method for the detection of tie activation/deactivation, and apply it to a large longitudinal, cross-sectional communication dataset ($\approx$ 19 months, $\approx$ 20 million people). Contrary to the perception of ever-growing connectivity, we observe that individuals exhibit a finite communication capacity, which limits the number of ties they can maintain active. In particular we find that men have an overall higher communication capacity than women and that this capacity decreases gradually for both sexes over the lifespan of individuals (16-70 years). We are then able to separate communication capacity from communication activity, revealing a diverse range of tie activation patterns, from stable to exploratory. We find that, in simulation, individuals exhibiting exploratory strategies display longer time to receive information spreading in the network those individuals with stable strategies. Our principled method to determine the communication capacity of an individual allows us to quantify how strategies for human interaction shape the dynamical evolution of social networks.
△ Less
Submitted 7 April, 2013;
originally announced April 2013.
-
Time as a limited resource: Communication Strategy in Mobile Phone Networks
Authors:
Giovanna Miritello,
Esteban Moro,
Rubén Lara,
Rocío Martínez-López,
Sam G. B. Roberts,
Robin I. M. Dunbar
Abstract:
We used a large database of 9 billion calls from 20 million mobile users to examine the relationships between aggregated time spent on the phone, personal network size, tie strength and the way in which users distributed their limited time across their network (disparity). Compared to those with smaller networks, those with large networks did not devote proportionally more time to communication an…
▽ More
We used a large database of 9 billion calls from 20 million mobile users to examine the relationships between aggregated time spent on the phone, personal network size, tie strength and the way in which users distributed their limited time across their network (disparity). Compared to those with smaller networks, those with large networks did not devote proportionally more time to communication and had on average weaker ties (as measured by time spent communicating). Further, there were not substantially different levels of disparity between individuals, in that mobile users tend to distribute their time very unevenly across their network, with a large proportion of calls going to a small number of individuals. Together, these results suggest that there are time constraints which limit tie strength in large personal networks, and that even high levels of mobile communication do not fundamentally alter the disparity of time allocation across networks.
△ Less
Submitted 11 January, 2013;
originally announced January 2013.
-
Predicting human preferences using the block structure of complex social networks
Authors:
Roger Guimera,
Alejandro Llorente,
Esteban Moro,
Marta Sales-Pardo
Abstract:
With ever-increasing available data, predicting individuals' preferences and hel** them locate the most relevant information has become a pressing need. Understanding and predicting preferences is also important from a fundamental point of view, as part of what has been called a "new" computational social science. Here, we propose a novel approach based on stochastic block models, which have bee…
▽ More
With ever-increasing available data, predicting individuals' preferences and hel** them locate the most relevant information has become a pressing need. Understanding and predicting preferences is also important from a fundamental point of view, as part of what has been called a "new" computational social science. Here, we propose a novel approach based on stochastic block models, which have been developed by sociologists as plausible models of complex networks of social interactions. Our model is in the spirit of predicting individuals' preferences based on the preferences of others but, rather than fitting a particular model, we rely on a Bayesian approach that samples over the ensemble of all possible models. We show that our approach is considerably more accurate than leading recommender algorithms, with major relative improvements between 38% and 99% over industry-level algorithms. Besides, our approach sheds light on decision-making processes by identifying groups of individuals that have consistently similar preferences, and enabling the analysis of the characteristics of those groups.
△ Less
Submitted 3 October, 2012;
originally announced October 2012.
-
Branching Dynamics of Viral Information Spreading
Authors:
José Luis Iribarren,
Esteban Moro
Abstract:
Despite its importance for rumors or innovations propagation, peer-to-peer collaboration, social networking or Marketing, the dynamics of information spreading is not well understood. Since the diffusion depends on the heterogeneous patterns of human behavior and is driven by the participants' decisions, its propagation dynamics shows surprising properties not explained by traditional epidemic or…
▽ More
Despite its importance for rumors or innovations propagation, peer-to-peer collaboration, social networking or Marketing, the dynamics of information spreading is not well understood. Since the diffusion depends on the heterogeneous patterns of human behavior and is driven by the participants' decisions, its propagation dynamics shows surprising properties not explained by traditional epidemic or contagion models. Here we present a detailed analysis of our study of real Viral Marketing campaigns where tracking the propagation of a controlled message allowed us to analyze the structure and dynamics of a diffusion graph involving over 31,000 individuals. We found that information spreading displays a non-Markovian branching dynamics that can be modeled by a two-step Bellman-Harris Branching Process that generalizes the static models known in the literature and incorporates the high variability of human behavior. It explains accurately all the features of information propagation under the "tip**-point" and can be used for prediction and management of viral information spreading processes.
△ Less
Submitted 9 October, 2011;
originally announced October 2011.
-
Social features of online networks: the strength of intermediary ties in online social media
Authors:
Przemyslaw A. Grabowicz,
Jose J. Ramasco,
Esteban Moro,
Josep Pujol,
Victor M. Eguiluz
Abstract:
An increasing fraction of today social interactions occur using online social media as communication channels. Recent worldwide events, such as social movements in Spain or revolts in the Middle East, highlight their capacity to boost people coordination. Online networks display in general a rich internal structure where users can choose among different types and intensity of interactions. Despite…
▽ More
An increasing fraction of today social interactions occur using online social media as communication channels. Recent worldwide events, such as social movements in Spain or revolts in the Middle East, highlight their capacity to boost people coordination. Online networks display in general a rich internal structure where users can choose among different types and intensity of interactions. Despite of this, there are still open questions regarding the social value of online interactions. For example, the existence of users with millions of online friends sheds doubts on the relevance of these relations. In this work, we focus on Twitter, one of the most popular online social networks, and find that the network formed by the basic type of connections is organized in groups. The activity of the users conforms to the landscape determined by such groups. Furthermore, Twitter's distinction between different types of interactions allows us to establish a parallelism between online and offline social networks: personal interactions are more likely to occur on internal links to the groups (the weakness of strong ties), events transmitting new information go preferentially through links connecting different groups (the strength of weak ties) or even more through links connecting to users belonging to several groups that act as brokers (the strength of intermediary ties).
△ Less
Submitted 8 February, 2012; v1 submitted 20 July, 2011;
originally announced July 2011.
-
Affinity Paths and Information Diffusion in Social Networks
Authors:
José Luis Iribarren,
Esteban Moro
Abstract:
Widespread interest in the diffusion of information through social networks has produced a large number of Social Dynamics models. A majority of them use theoretical hypothesis to explain their diffusion mechanisms while the few empirically based ones average out their measures over many messages of different content. Our empirical research tracking the step-by-step email propagation of an invaria…
▽ More
Widespread interest in the diffusion of information through social networks has produced a large number of Social Dynamics models. A majority of them use theoretical hypothesis to explain their diffusion mechanisms while the few empirically based ones average out their measures over many messages of different content. Our empirical research tracking the step-by-step email propagation of an invariable viral marketing message delves into the content impact and has discovered new and striking features. The topology and dynamics of the propagation cascades display patterns not inherited from the email networks carrying the message. Their disconnected, low transitivity, tree-like cascades present positive correlation between their nodes probability to forward the message and the average number of neighbors they target and show increased participants' involvement as the propagation paths length grows. Such patterns not described before, nor replicated by any of the existing models of information diffusion, can be explained if participants make their pass-along decisions based uniquely on local knowledge of their network neighbors affinity with the message content. We prove the plausibility of such mechanism through a stylized, agent-based model that replicates the \emph{Affinity Paths} observed in real information diffusion cascades.
△ Less
Submitted 17 May, 2011;
originally announced May 2011.
-
The dynamical strength of social ties in information spreading
Authors:
Giovanna Miritello,
Esteban Moro,
Rubén Lara
Abstract:
We investigate the temporal patterns of human communication and its influence on the spreading of information in social networks. The analysis of mobile phone calls of 20 million people in one country shows that human communication is bursty and happens in group conversations. These features have opposite effects in information reach: while bursts hinder propagation at large scales, conversations…
▽ More
We investigate the temporal patterns of human communication and its influence on the spreading of information in social networks. The analysis of mobile phone calls of 20 million people in one country shows that human communication is bursty and happens in group conversations. These features have opposite effects in information reach: while bursts hinder propagation at large scales, conversations favor local rapid cascades. To explain these phenomena we define the dynamical strength of social ties, a quantity that encompasses both the topological and temporal patterns of human communication.
△ Less
Submitted 24 November, 2010;
originally announced November 2010.