Skip to main content

Showing 1–38 of 38 results for author: West, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.07340  [pdf, other

    cs.CY

    RIP Twitter API: A eulogy to its vast research contributions

    Authors: Ryan Murtfeldt, Naomi Alterman, Ihsan Kahveci, Jevin D. West

    Abstract: Since 2006, Twitter's Application Programming Interface (API) has been a treasure trove of high-quality data for researchers studying everything from the spread of misinformation, to social psychology and emergency management. However, in the spring of 2023, Twitter (now called X) began changing $42,000/month for its Enterprise access level, an essential death knell for researcher use. Lacking suf… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: 16 pages, 4 figures, 4 appendices

    ACM Class: J.4; K.4

  2. arXiv:2404.06422  [pdf, other

    cs.SI cs.CY

    Echo Chambers in the Age of Algorithms: An Audit of Twitter's Friend Recommender System

    Authors: Kayla Duskin, Joseph S. Schafer, Jevin D. West, Emma S. Spiro

    Abstract: The presence of political misinformation and ideological echo chambers on social media platforms is concerning given the important role that these sites play in the public's exposure to news and current events. Algorithmic systems employed on these platforms are presumed to play a role in these phenomena, but little is known about their mechanisms and effects. In this work, we conduct an algorithm… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

    Comments: To be published in ACM Web Science Conference (Websci 24). 11 pages, 6 figures

  3. arXiv:2403.19717  [pdf, other

    cs.LG cs.CR cs.CY

    A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok

    Authors: Jack West, Lea Thiemt, Shimaa Ahmed, Maggie Bartig, Kassem Fawaz, Suman Banerjee

    Abstract: Mobile apps have embraced user privacy by moving their data processing to the user's smartphone. Advanced machine learning (ML) models, such as vision models, can now locally analyze user images to extract insights that drive several functionalities. Capitalizing on this new processing model of locally analyzing user images, we analyze two popular social media apps, TikTok and Instagram, to reveal… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Comments: 18 pages, 13 figures, to appear at IEEE Symposium on Security and Privacy 2024

    ACM Class: K.4.2; C.4; D.2.2

  4. arXiv:2403.14018  [pdf, other

    cs.CR

    A Signal Injection Attack Against Zero Involvement Pairing and Authentication for the Internet of Things

    Authors: Isaac Ahlgren, Jack West, Kyuin Lee, George Thiruvathukal, Neil Klingensmith

    Abstract: Zero Involvement Pairing and Authentication (ZIPA) is a promising technique for autoprovisioning large networks of Internet-of-Things (IoT) devices. In this work, we present the first successful signal injection attack on a ZIPA system. Most existing ZIPA systems assume there is a negligible amount of influence from the unsecured outside space on the secured inside space. In reality, environmental… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

  5. arXiv:2402.11707  [pdf, other

    cs.IR cs.AI cs.CY

    Search Engines Post-ChatGPT: How Generative Artificial Intelligence Could Make Search Less Reliable

    Authors: Shahan Ali Memon, Jevin D. West

    Abstract: In this commentary, we discuss the evolving nature of search engines, as they begin to generate, index, and distribute content created by generative artificial intelligence (GenAI). Our discussion highlights challenges in the early stages of GenAI integration, particularly around factual inconsistencies and biases. We discuss how output from GenAI carries an unwarranted sense of credibility, while… ▽ More

    Submitted 18 February, 2024; originally announced February 2024.

    Comments: 9 pages, 5 figures

  6. arXiv:2312.03759  [pdf, ps, other

    cs.CL cs.AI cs.CY cs.DL

    How should the advent of large language models affect the practice of science?

    Authors: Marcel Binz, Stephan Alaniz, Adina Roskies, Balazs Aczel, Carl T. Bergstrom, Colin Allen, Daniel Schad, Dirk Wulff, Jevin D. West, Qiong Zhang, Richard M. Shiffrin, Samuel J. Gershman, Ven Popov, Emily M. Bender, Marco Marelli, Matthew M. Botvinick, Zeynep Akata, Eric Schulz

    Abstract: Large language models (LLMs) are being increasingly incorporated into scientific workflows. However, we have yet to fully grasp the implications of this integration. How should the advent of large language models affect the practice of science? For this opinion piece, we have invited four diverse groups of scientists to reflect on this query, sharing their perspectives and engaging in debate. Schu… ▽ More

    Submitted 5 December, 2023; originally announced December 2023.

  7. arXiv:2311.04433  [pdf, other

    cs.CR

    SyncBleed: A Realistic Threat Model and Mitigation Strategy for Zero-Involvement Pairing and Authentication (ZIPA)

    Authors: Isaac Ahlgren, Jack West, Kyuin Lee, George K. Thiruvathukal, Neil Klingensmith

    Abstract: Zero Involvement Pairing and Authentication (ZIPA) is a promising technique for auto-provisioning large networks of Internet-of-Things (IoT) devices. Presently, these networks use password-based authentication, which is difficult to scale to more than a handful of devices. To deal with this challenge, ZIPA enabled devices autonomously extract identical authentication or encryption keys from ambien… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

  8. arXiv:2308.16118  [pdf, other

    cs.CL cs.AI

    Response: Emergent analogical reasoning in large language models

    Authors: Damian Hodel, Jevin West

    Abstract: In their recent Nature Human Behaviour paper, "Emergent analogical reasoning in large language models," (Webb, Holyoak, and Lu, 2023) the authors argue that "large language models such as GPT-3 have acquired an emergent ability to find zero-shot solutions to a broad range of analogy problems." In this response, we provide counterexamples of the letter string analogies. In our tests, GPT-3 fails to… ▽ More

    Submitted 30 April, 2024; v1 submitted 30 August, 2023; originally announced August 2023.

    Comments: Response to publication in Nature Human Behaviour titled "Emergent analogical reasoning in large language models," (Webb, Holyoak, and Lu, 2023, arXiv:2212.09196). 14 pages

  9. arXiv:2204.06128  [pdf, other

    cs.CR

    Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps

    Authors: Yucheng Yang, Jack West, George K. Thiruvathukal, Neil Klingensmith, Kassem Fawaz

    Abstract: Video conferencing apps (VCAs) make it possible for previously private spaces -- bedrooms, living rooms, and kitchens -- into semi-public extensions of the office. For the most part, users have accepted these apps in their personal space without much thought about the permission models that govern the use of their private data during meetings. While access to a device's video camera is carefully c… ▽ More

    Submitted 12 April, 2022; originally announced April 2022.

    Comments: to be published in the 22nd Privacy Enhancing Technologies Symposium (PETS 2022)

  10. arXiv:2108.05669  [pdf, other

    cs.DL cs.CL cs.HC cs.IR

    Bursting Scientific Filter Bubbles: Boosting Innovation via Novel Author Discovery

    Authors: Jason Portenoy, Marissa Radensky, Jevin West, Eric Horvitz, Daniel Weld, Tom Hope

    Abstract: Isolated silos of scientific research and the growing challenge of information overload limit awareness across the literature and hinder innovation. Algorithmic curation and recommendation, which often prioritize relevance, can further reinforce these informational "filter bubbles." In response, we describe Bridger, a system for facilitating discovery of scholars and their work. We construct a fac… ▽ More

    Submitted 31 January, 2022; v1 submitted 12 August, 2021; originally announced August 2021.

    Comments: CHI 2022

  11. arXiv:2104.14618  [pdf, other

    cs.CR

    Moonshine: An Online Randomness Distiller for Zero-Involvement Authentication

    Authors: Jack West, Kyuin Lee, Suman Banerjee, Younghyun Kim, George K. Thiruvathukal, Neil Klingensmith

    Abstract: Context-based authentication is a method for transparently validating another device's legitimacy to join a network based on location. Devices can pair with one another by continuously harvesting environmental noise to generate a random key with no user involvement. However, there are gaps in our understanding of the theoretical limitations of environmental noise harvesting, making it difficult fo… ▽ More

    Submitted 29 April, 2021; originally announced April 2021.

    Comments: 16 pages, 5 figures, IPSN 2021

  12. arXiv:2101.02286  [pdf, other

    cs.DC

    Scalable Parallel Linear Solver for Compact Banded Systems on Heterogeneous Architectures

    Authors: Hang Song, Kristen V. Matsuno, Jacob R. West, Akshay Subramaniam, Aditya S. Ghate, Sanjiva K. Lele

    Abstract: A scalable algorithm for solving compact banded linear systems on distributed memory architectures is presented. The proposed method factorizes the original system into two levels of memory hierarchies, and solves it using parallel cyclic reduction on both distributed and shared memory. This method has a lower communication footprint across distributed memory partitions compared to conventional al… ▽ More

    Submitted 3 February, 2021; v1 submitted 29 December, 2020; originally announced January 2021.

  13. arXiv:2012.11055  [pdf, other

    cs.CY cs.SI

    Social Media COVID-19 Misinformation Interventions Viewed Positively, But Have Limited Impact

    Authors: Christine Geeng, Tiona Francisco, Jevin West, Franziska Roesner

    Abstract: Amidst COVID-19 misinformation spreading, social media platforms like Facebook and Twitter rolled out design interventions, including banners linking to authoritative resources and more specific "false information" labels. In late March 2020, shortly after these interventions began to appear, we conducted an exploratory mixed-methods survey (N = 311) to learn: what are social media users' attitude… ▽ More

    Submitted 20 December, 2020; originally announced December 2020.

  14. arXiv:2005.12668  [pdf, other

    cs.IR cs.DL cs.HC cs.LG

    SciSight: Combining faceted navigation and research group detection for COVID-19 exploratory scientific search

    Authors: Tom Hope, Jason Portenoy, Kishore Vasan, Jonathan Borchardt, Eric Horvitz, Daniel S. Weld, Marti A. Hearst, Jevin West

    Abstract: The COVID-19 pandemic has sparked unprecedented mobilization of scientists, generating a deluge of papers that makes it hard for researchers to keep track and explore new directions. Search engines are designed for targeted queries, not for discovery of connections across a corpus. In this paper, we present SciSight, a system for exploratory search of COVID-19 research integrating two key capabili… ▽ More

    Submitted 20 September, 2020; v1 submitted 20 May, 2020; originally announced May 2020.

    Comments: Accepted to EMNLP 2020

  15. arXiv:2004.00092  [pdf, other

    eess.SP cs.CR

    VoltKey: Using Power Line Noise for Zero-Involvement Pairing and Authentication (Demo Abstract)

    Authors: Jack West, Tien VoNguyen, Isaac Ahlgren, Iryna Motyashok, George K. Thiruvathukal, Neil Klingensmith

    Abstract: We present VoltKey, a method that transparently generates secret keys for colocated devices, leveraging spatiotemporally unique noise contexts observed in commercial power line infrastructure. VoltKey extracts randomness from power line noise and securely converts it into an authentication token. Nearby devices which observe the same noise patterns on the powerline generate identical keys. The uni… ▽ More

    Submitted 31 March, 2020; originally announced April 2020.

    Comments: Tools Demo: Accepted at Information Processing in Sensor Networks 2020

  16. arXiv:2003.12452  [pdf, other

    cs.DC cs.OS

    FLIC: A Distributed Fog Cache for City-Scale Applications

    Authors: Jack West, Neil Kingensmith, George K. Thiruvathukal

    Abstract: We present FLIC, a distributed software data caching framework for fogs that reduces network traffic and latency. FLICis targeted toward city-scale deployments of cooperative IoT devices in which each node gathers and shares data with surrounding devices. As machine learning and other data processing techniques that require large volumes of training data are ported to low-cost and low-power IoT sy… ▽ More

    Submitted 24 March, 2020; originally announced March 2020.

    Comments: Accepted at 2020 IEEE International Conference on Fog Computing

  17. arXiv:2001.00907  [pdf, other

    nlin.AO cs.MA

    Selfish Algorithm and Emergence of Collective Intelligence

    Authors: Korosh Mahmoodi, Bruce J. West, Cleotilde Gonzalez

    Abstract: We propose a model for demonstrating spontaneous emergence of collective intelligent behavior from selfish individual agents. Agents' behavior is modeled using our proposed selfish algorithm ($SA$) with three learning mechanisms: reinforced learning ($SAL$), trust ($SAT$) and connection ($SAC$). Each of these mechanisms provides a distinctly different way an agent can increase the individual benef… ▽ More

    Submitted 3 January, 2020; originally announced January 2020.

  18. arXiv:1908.07465  [pdf, other

    cs.DL cs.LG stat.ML

    Delineating Knowledge Domains in the Scientific Literature Using Visual Information

    Authors: Sean Yang, Po-shen Lee, Jevin D. West, Bill Howe

    Abstract: Figures are an important channel for scientific communication, used to express complex ideas, models and data in ways that words cannot. However, this visual information is mostly ignored in analyses of the scientific literature. In this paper, we demonstrate the utility of using scientific figures as markers of knowledge domains in science, which can be used for classification, recommender system… ▽ More

    Submitted 12 August, 2019; originally announced August 2019.

  19. arXiv:1907.13414  [pdf, other

    cs.DL cs.SI physics.soc-ph

    The demography of the peripatetic researcher: Evidence on highly mobile scholars from the Web of Science

    Authors: Samin Aref, Emilio Zagheni, Jevin West

    Abstract: The policy debate around researchers' geographic mobility has been moving away from a theorized zero-sum game in which countries can be winners (brain gain) or losers (brain drain), and toward the concept of brain circulation, which implies that researchers move in and out of countries and everyone benefits. Quantifying trends in researchers' movements is key to understanding the drivers of the mo… ▽ More

    Submitted 31 July, 2019; originally announced July 2019.

    Comments: Accepted author copy, 16 pages, 10 figures. Lecture Notes in Computer Science, (2019), Proceedings of the 11th International Conference on Social Informatics, Doha, Qatar

  20. arXiv:1903.12328  [pdf, other

    cs.LG stat.ML

    Improved Reinforcement Learning with Curriculum

    Authors: Joseph West, Frederic Maire, Cameron Browne, Simon Denman

    Abstract: Humans tend to learn complex abstract concepts faster if examples are presented in a structured manner. For instance, when learning how to play a board game, usually one of the first concepts learned is how the game ends, i.e. the actions that lead to a terminal state (win, lose or draw). The advantage of learning end-games first is that once the actions which lead to a terminal state are understo… ▽ More

    Submitted 10 June, 2019; v1 submitted 28 March, 2019; originally announced March 2019.

    Comments: Draft prior to submission to IEEE Trans on Games. Changed paper slightly

  21. arXiv:1812.03249  [pdf, ps, other

    cs.SI

    Measuring scientific buzz

    Authors: Kishore Vasan, Jevin West

    Abstract: Keywords are important for information retrieval. They are used to classify and sort papers. However, these terms can also be used to study trends within and across fields. We want to explore the lifecycle of new keywords. How often do new terms come into existence and how long till they fade out? In this paper, we present our preliminary analysis where we measure the burstiness of keywords within… ▽ More

    Submitted 7 December, 2018; originally announced December 2018.

    Comments: iConference 2019 poster

  22. arXiv:1809.09328  [pdf, other

    cs.HC

    Why scatter plots suggest causality, and what we can do about it

    Authors: Carl T. Bergstrom, Jevin D. West

    Abstract: Scatter plots carry an implicit if subtle message about causality. Whether we look at functions of one variable in pure mathematics, plots of experimental measurements as a function of the experimental conditions, or scatter plots of predictor and response variables, the value plotted on the vertical axis is by convention assumed to be determined or influenced by the value on the horizontal axis.… ▽ More

    Submitted 25 September, 2018; originally announced September 2018.

  23. arXiv:1809.04093  [pdf, other

    cs.SI cs.DL

    Is together better? Examining scientific collaborations across multiple authors, institutions, and departments

    Authors: Lovenoor Aulck, Kishore Vasan, Jevin West

    Abstract: Collaborations are an integral part of scientific research and publishing. In the past, access to large-scale corpora has limited the ways in which questions about collaborations could be investigated. However, with improvements in data/metadata quality and access, it is possible to explore the idea of research collaboration in ways beyond the traditional definition of multiple authorship. In this… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

    Journal ref: KDD: BigScholar 2018

  24. arXiv:1712.08980  [pdf

    cs.CY

    The Internet of Battle Things

    Authors: Alexander Kott, Ananthram Swami, Bruce J West

    Abstract: The battlefield of the future will be densely populated by a variety of entities ("things") -- some intelligent and some only marginally so -- performing a broad range of tasks: sensing, communicating, acting, and collaborating with each other and human warfighters. We call this the Internet of Battle Things, IoBT. In some ways, IoBT is already becoming a reality, but 20-30 years from now it is li… ▽ More

    Submitted 24 December, 2017; originally announced December 2017.

    Comments: This is a version of the article that appears in IEEE Computer as: Kott, Alexander, Ananthram Swami, and Bruce J. West. "The Internet of Battle Things." Computer 49.12 (2016): 70-75

    Journal ref: Computer 49.12 (2016): 70-75

  25. arXiv:1708.09344  [pdf, other

    stat.OT cs.CY physics.ed-ph stat.ML

    Stem-ming the Tide: Predicting STEM attrition using student transcript data

    Authors: Lovenoor Aulck, Rohan Aras, Lysia Li, Coulter L'Heureux, Peter Lu, Jevin West

    Abstract: Science, technology, engineering, and math (STEM) fields play growing roles in national and international economies by driving innovation and generating high salary jobs. Yet, the US is lagging behind other highly industrialized nations in terms of STEM education and training. Furthermore, many economic forecasts predict a rising shortage of domestic STEM-trained professions in the US for years to… ▽ More

    Submitted 28 August, 2017; originally announced August 2017.

  26. arXiv:1611.07135  [pdf, other

    cs.HC cs.DL cs.IR

    Leveraging Citation Networks to Visualize Scholarly Influence Over Time

    Authors: Jason Portenoy, Jessica Hullman, Jevin D. West

    Abstract: Assessing the influence of a scholar's work is an important task for funding organizations, academic departments, and researchers. Common methods, such as measures of citation counts, can ignore much of the nuance and multidimensionality of scholarly influence. We present an approach for generating dynamic visualizations of scholars' careers. This approach uses an animated node-link diagram showin… ▽ More

    Submitted 5 December, 2016; v1 submitted 21 November, 2016; originally announced November 2016.

    ACM Class: H.5.2

  27. arXiv:1607.00376  [pdf

    physics.soc-ph cs.DL

    Men Set Their Own Cites High: Gender and Self-citation across Fields and over Time

    Authors: Molly M. King, Carl T. Bergstrom, Shelley J. Correll, Jennifer Jacquet, Jevin D. West

    Abstract: How common is self-citation in scholarly publication, and does the practice vary by gender? Using novel methods and a data set of 1.5 million research papers in the scholarly database JSTOR published between 1779 and 2011, the authors find that nearly 10 percent of references are self-citations by a paper's authors. The findings also show that between 1779 and 2011, men cited their own papers 56 p… ▽ More

    Submitted 12 December, 2017; v1 submitted 30 June, 2016; originally announced July 2016.

    Comments: final published article

    Journal ref: Socius 3: 1-22 (2017)

  28. arXiv:1606.08534  [pdf, other

    cs.DL cs.IR

    Static Ranking of Scholarly Papers using Article-Level Eigenfactor (ALEF)

    Authors: Ian Wesley-Smith, Carl T. Bergstrom, Jevin D. West

    Abstract: Microsoft Research hosted the 2016 WSDM Cup Challenge based on the Microsoft Academic Graph. The goal was to provide static rankings for the articles that make up the graph, with the rankings to be evaluated against those of human judges. While the Microsoft Academic Graph provided metadata about many aspects of each scholarly document, we focused more narrowly on citation data and used this conte… ▽ More

    Submitted 27 June, 2016; originally announced June 2016.

  29. arXiv:1606.06364  [pdf, other

    stat.ML cs.CY

    Predicting Student Dropout in Higher Education

    Authors: Lovenoor Aulck, Nishant Velagapudi, Joshua Blumenstock, Jevin West

    Abstract: Each year, roughly 30% of first-year students at US baccalaureate institutions do not return for their second year and over $9 billion is spent educating these students. Yet, little quantitative research has analyzed the causes and possible remedies for student attrition. Here, we describe initial efforts to model student dropout using the largest known dataset on higher education attrition, which… ▽ More

    Submitted 7 March, 2017; v1 submitted 20 June, 2016; originally announced June 2016.

    Comments: Presented at 2016 ICML Workshop on #Data4Good: Machine Learning in Social Good Applications, New York, NY

  30. arXiv:1605.04951  [pdf, other

    cs.SI cs.CV cs.DL cs.IR

    Viziometrics: Analyzing Visual Information in the Scientific Literature

    Authors: Po-shen Lee, Jevin D. West, Bill Howe

    Abstract: Scientific results are communicated visually in the literature through diagrams, visualizations, and photographs. These information-dense objects have been largely ignored in bibliometrics and scientometrics studies when compared to citations and text. In this paper, we use techniques from computer vision and machine learning to classify more than 8 million figures from PubMed into 5 figure types… ▽ More

    Submitted 27 May, 2016; v1 submitted 16 May, 2016; originally announced May 2016.

  31. arXiv:1601.01228  [pdf

    cs.CR cs.AI

    Some Experimental Issues in Financial Fraud Detection: An Investigation

    Authors: J. West, Maumita Bhattacharya

    Abstract: Financial fraud detection is an important problem with a number of design aspects to consider. Issues such as algorithm selection and performance analysis will affect the perceived ability of proposed solutions, so for auditors and re-searchers to be able to sufficiently detect financial fraud it is necessary that these issues be thoroughly explored. In this paper we will revisit the key performan… ▽ More

    Submitted 6 January, 2016; originally announced January 2016.

    Comments: J. West and Maumita Bhattacharya. "Some Experimental Issues in Financial Fraud Detection: An Investigation", In the Proceedings of The 5th International Symposium on Cloud and Service Computing (SC2 2015), IEEE CS Press

    MSC Class: 68Txx

  32. arXiv:1510.07167  [pdf

    cs.CR cs.CY

    Mining Financial Statement Fraud: An Analysis of Some Experimental Issues

    Authors: J. West, Maumita Bhattacharya

    Abstract: Financial statement fraud detection is an important problem with a number of design aspects to consider. Issues such as (i) problem representation, (ii) feature selection, and (iii) choice of performance metrics all influence the perceived performance of detection algorithms. Efficient implementation of financial fraud detection methods relies on a clear understanding of these issues. In this pape… ▽ More

    Submitted 24 October, 2015; originally announced October 2015.

    Comments: Proceedings of The 10th IEEE Conference on Industrial Electronics and Applications (ICIEA 2015), IEEE Press

    MSC Class: 68U99

  33. arXiv:1510.07165  [pdf

    cs.CR

    Intelligent Financial Fraud Detection Practices: An Investigation

    Authors: J. West, Maumita Bhattacharya, R. Islam

    Abstract: Financial fraud is an issue with far reaching consequences in the finance industry, government, corporate sectors, and for ordinary consumers. Increasing dependence on new technologies such as cloud and mobile computing in recent years has compounded the problem. Traditional methods of detection involve extensive use of auditing, where a trained individual manually observes reports or transactions… ▽ More

    Submitted 24 October, 2015; originally announced October 2015.

    Comments: Proceedings of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014)

    MSC Class: 68U01

  34. arXiv:1506.04326  [pdf, other

    physics.soc-ph cs.SI

    The Value of Conflict in Stable Social Networks

    Authors: Pensri Pramukkul, Adam Svenkeson, Bruce J. West, Paolo Grigolini

    Abstract: A cooperative network model of sociological interest is examined to determine the sensitivity of the global dynamics to having a fraction of the members behaving uncooperatively, that is, being in conflict with the majority. We study a condition where in the absence of these uncooperative individuals, the contrarians, the control parameter exceeds a critical value and the network is frozen in a st… ▽ More

    Submitted 13 June, 2015; originally announced June 2015.

    Comments: 5 pages, 3 figures, 1 supplement

  35. arXiv:1305.4807  [pdf, other

    physics.soc-ph cs.SI

    Memory in network flows and its effects on spreading dynamics and community detection

    Authors: Martin Rosvall, Alcides V. Esquivel, Andrea Lancichinetti, Jevin D. West, Renaud Lambiotte

    Abstract: Random walks on networks is the standard tool for modelling spreading processes in social and biological systems. This first-order Markov approach is used in conventional community detection, ranking, and spreading analysis although it ignores a potentially important feature of the dynamics: where flow moves to may depend on where it comes from. Here we analyse pathways from different systems, and… ▽ More

    Submitted 12 August, 2014; v1 submitted 21 May, 2013; originally announced May 2013.

    Comments: 23 pages and 16 figures

    Journal ref: Nature Communications 5, 4630 (2014)

  36. arXiv:1211.1759  [pdf, other

    physics.soc-ph cs.DL

    The role of gender in scholarly authorship

    Authors: Jevin D. West, Jennifer Jacquet, Molly M. King, Shelley J. Correll, Carl T. Bergstrom

    Abstract: Gender disparities appear to be decreasing in academia according to a number of metrics, such as grant funding, hiring, acceptance at scholarly journals, and productivity, and it might be tempting to think that gender inequity will soon be a problem of the past. However, a large-scale analysis based on over eight million papers across the natural sciences, social sciences, and humanities re- revea… ▽ More

    Submitted 7 November, 2012; originally announced November 2012.

  37. arXiv:1207.1748  [pdf, other

    physics.soc-ph cs.SI nlin.AO

    Role of Committed Minorities in Times of Crisis

    Authors: Malgorzata Turalska, Bruce J. West, Paolo Grigolini

    Abstract: We use a Cooperative Decision Making (CDM) model to study the effect of committed minorities on group behavior in time of crisis. The CDM model has been shown to generate consensus through a phase-transition process that at criticality establishes long-range correlations among the individuals within a model society. In a condition of high consensus, the correlation function vanishes, thereby makin… ▽ More

    Submitted 6 July, 2012; originally announced July 2012.

  38. arXiv:0911.1807  [pdf, other

    cs.DL

    Big Macs and Eigenfactor Scores: Don't Let Correlation Coefficients Fool You

    Authors: Jevin West, Theodore Bergstrom, Carl Bergstrom

    Abstract: The Eigenfactor Metrics provide an alternative way of evaluating scholarly journals based on an iterative ranking procedure analogous to Google's PageRank algorithm. These metrics have recently been adopted by Thomson-Reuters and are listed alongside the Impact Factor in the Journal Citation Reports. But do these metrics differ sufficiently so as to be a useful addition to the bibliometric toolbo… ▽ More

    Submitted 29 April, 2010; v1 submitted 9 November, 2009; originally announced November 2009.

    Comments: Version 2 This is a response to Phil Davis's 2008 paper (arXiv:0807.2678)