Exploring User Social Behavior in Mobile Social Applications Konglin Zhu *, Pan Hui $, Yang Chen *, Xiaoming Fu *, Wenzhong Li + * University of Goettingen,

Slides:



Advertisements
Similar presentations
$ Network Support for Wireless Connectivity in the TV Bands Victor Bahl Ranveer Chandra Thomas Moscibroda Srihari Narlanka Yunnan Wu Yuan.
Advertisements

Milan Vojnović Joint work with: Jean-Yves Le Boudec Workshop on Clean Slate Network Design, Cambridge, UK, Sept 18, 2006 On the Origins of Power Laws in.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
Performance in Decentralized Filesharing Networks Theodore Hong Freenet Project.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Transportation-aware Routing in Delay Tolerant Networks (DTNs) Asia Future Internet 2008 Taekyoung Kwon Seoul National University.
1 Fault Analysis for Large-scale Campus-wide Wireless Networks Jian Chen Department of CS, Tsinghua University, Beijing, China.
Performance Evaluation Methodology & Key Technologies of New Generation Broadband Wireless Access Networking Zhiwei Gao Broadband Wireless Communication.
Challenges in Making Tomography Practical
Page 1 Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc Networks Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc.
Doc.: IEEE /1191r5 Submission November 2004 Mike Moreton, STMicroelectronicsSlide 1 AP Architecture Thoughts Mike Moreton, STMicroelectronics.
Enabling Inter-domain DTN Communications by Networked Static Gateways Ting He*, Nikoletta Sofra, Kang-Won Lee*, and Kin K Leung * IBM Imperial College.
1 A Static-Node Assisted Adaptive Routing Protocol in Vehicular Networks Yong Ding, Chen Wang, Li Xiao {dingyong, wangchen, Department.
Fundamental Relationship between Node Density and Delay in Wireless Ad Hoc Networks with Unreliable Links Shizhen Zhao, Luoyi Fu, Xinbing Wang Department.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
MobiClique: Middleware for Mobile Social Networking Anna-Kaisa Pietilainen (Thomson), with Earl Oliver (University of Waterloo), Jason LeBrun (UC Davis),
Scalable Routing In Delay Tolerant Networks
Joint ITU/ECA Regional Workshop on Information and Communication Technologies (ICT) Indicators Gaborone, Botswana October 2004
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Watching Television Over an IP Network & TV-Watching Behavior Research presented by Weiping He.
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
The internet. Background Created in 1969, connected computers at UCLA, Stanford Research Institute, U. of Utah, and UC at Santa Barbara With an estimated.
T IME SERIES MODELING OF TEMPORAL NETWORK Sandipan Sikdar CNeRG Retreat 14 1.
高度情報化社会を支えるネットワーキング技術 (大阪大学 工学部説明会資料)
Juan-Antonio CorderoPhilippe JacquetEmmanuel Baccelli Orlando, FL -- March 29 th, 2012 Impact of Jitter-based Techniques on Flooding over Wireless Ad hoc.
Thesis Presentation Supervisor: Prof. Jörg Ott Student: Junxi Yin Espoo,
Time Slicing in Mobile TV Broadcast Networks with Arbitrary Channel Bit Rates Cheng-Hsin Hsu Joint work with Mohamed Hefeeda April 23, 2009 Simon Fraser.
Media Use in Indonesia Findings from the 2012 International Audience Research Project.
Taming User-Generated Content in Mobile Networks via Drop Zones Ionut Trestian Supranamaya Ranjan Aleksandar Kuzmanovic Antonio Nucci Northwestern University.
Christophe Jelger – CS221 Network and Security - Universität Basel Christophe Jelger Post-doctoral researcher IP Multicasting.
April, 2008, IEEE ISCE Taehong Kim; Sukbin Seo; Chong Poh Kit; Kimseyoo, Y.; Seong-eun Yoo; Daeyoung Kim Experiments on mobile sink application in ZigBee.
On the Optimal Placement of Mix Zones Julien Freudiger, Reza Shokri and Jean-Pierre Hubaux PETS, 2009.
Mostafa Ammar, School of Computer Science Georgia Institute of Technology Atlanta, GA Mobile Computing in Cirrus Clouds: Mobile Computing in Cirrus Clouds:
Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
© S Haughton more than 3?
Scale Free Networks.
Opportunistic Multipath Forwarding in Publish/Subscribe Systems Reza Sherafat Kazemzadeh AND Hans-Arno Jacobsen Middleware Systems Research Group University.
1 Adaptive Bandwidth Allocation in TDD-CDMA Systems Derek J Corbett & Prof. David Everitt The University of Sydney.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I NETWORK LAYER AND IP Derived From CCNA Network Fundamentals.
Addition 1’s to 20.
25 seconds left…...
Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan Department of Computer Science Florida State University.
Week 1.
Location Services for Geographic Routing. Geographic Routing Three major components of geographic routing:  Location services (dissemination of location.
We will resume in: 25 Minutes.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Link-State Routing Protocols Routing Protocols and Concepts – Chapter.
Traversing symmetric NAT with predictable port allocation function SIN 2014 Dušan Klinec, Vashek Matyáš Faculty of Informatics, Masaryk University.
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
Social Media Overview — Fun with Facebook ℠, Twitter ℠, Ustream ℠, and FourSquare ℠ Jack Leblond Director of Internet Strategy and Operations TG.
Are You moved by Your Social Network Application? Abderrahmen Mtibaa, Augustin Chaintreau, Jason LeBrun, Earl Oliver, Anna-Kaisa Pietilainen, Christophe.
Opportunistic Networking (aka Pocket Switched Networking)
Bubble Rap: Social-based Forwarding in DTNs Pan Hui, Jon Crowcroft, Eiko Yoneki University of Cambridge, Computer Laboratory Slides by Alex Papadimitriou.
The FluPhone Study: Measuring Human Proximity using Mobile Phones Eiko Yoneki and Jon Crowcroft Systems Research Group University.
9. Demo Scenario #1 Behavioral profile upon discovering friends/enemies 1)No friends and enemies: search for friends.  Turn by 90 degree and go forward.
0 Mining call data to increase the robustness of cellular networks to DoS attacks Hui Zang and Jean Bolot Sprint
Pocket Switched Networks: Real-world Mobility and its Consequences for Opportunistic Forwarding Jon Crowcroft,Pan Hui (Ben) Augustin Chaintreau, James.
Introduction to Delay Tolerant Networks Tzu-Chieh Tsai Department of Computer Science, National Cheng Chi University.
1 CIS 6930: Workshop III Encounter-based Networks Presenter: Sapon Tanachaiwiwat Instructor: Dr. Helmy 2/5/2007.
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
Sungwook Moon, Ahmed Helmy 1 Mobile Testbeds with an Attitude Thanks to all the NOMAD group members for their great helps (U. Kumar, Y. Wang, G. Thakur,
© 2008 Frans Ekman Mobility Models for Mobile Ad Hoc Network Simulations Frans Ekman Supervisor: Jörg Ott Instructor: Jouni Karvo.
Comp. Lab. Univ. Cambridge
Presentation transcript:

Exploring User Social Behavior in Mobile Social Applications Konglin Zhu *, Pan Hui $, Yang Chen *, Xiaoming Fu *, Wenzhong Li + * University of Goettingen, $ Deutsche Telekom, + Nanjing University

Outline Background Motivation Mobile social application (MS app): Goose Experiment methodology User behavior analysis Information propagation in MS apps Conclusions 2

Background Mobile devices are increasing –1.2 billion mobile phones are sold in 2009 –There are around 5 billion mobile phone subscriptions worldwide Mobile social applications are popular –Mobile version of Facebook, Twitter April 2010: 62% mobile users in Twitter Facebook has 250 million mobile users –Location based mobile social applications Foursquare –Non-Internet social applications PeopleNet [1], Prism [2], Goose [3], … 3

Motivations Lack of knowledge on mobile social user behavior –Previous mobile devices deployment only investigates the user encounters, but no interactions Information propagation in mobile social networks –Most previous information propagation models are simulation based, no real deployment Our objectives: –Understand user behavior in mobile social applications User overall behavior User social behavior –Investigate information propagation in mobile social networks DTN routing efficiency Information epidemics 4

Mobile social application: Goose Goose –A mobile social application implemented on Nokia Symbian system Function of Goose –Exchange contact Exchange and update user profiles –Update status Post new status on the Goose wall –Message Unicast message via Bluetooth or SMS Broadcast message via Bluetooth –Search friends Search a specific friend from other friends contact lists 5

Experiment methodology Deployment –We deploy our software in two campuses 12 volunteers in University of Goettingen 15 volunteers in Nanjing University –The experiments last 15 days in each campus Data collection –Bluetooth MAC address –The time duration users run Goose –Cellular ID, nearby devices (every 2 minutes) –Incoming and outgoing events Message ID, message type, time received, sender, previous relays, message size 6

User behavior analysis User overall behavior –User activity –User sessions –User mobility –Message statistics User social behavior –User encounters –User interactions 7

User overall behavior (1) User activity –Active user is the user active at a certain time –It shows the periodicity bursts of active users (a) User activity in NJU (b) User activity in UGoe 8

User overall behavior (2) User sessions –A session is the time difference between switching on and switching off Goose –It reflects the frequency of using Goose 9 (a) User sessions in NJU (a) User sessions in UGoe

User overall behavior (3) User mobility on campus –Trace a users mobility by recording cellular ID –A typical users time duration on each cellular User time duration in each cellular 10

User overall behavior (4) Message statistics –Communication messages are more than other messages –UGoe has more event types than NJU Message statistics 11

User social behavior (1) Heavy tail of User encounters –Heavy tail distribution [4] It is known as scale-free network, it has been observed in many complex networks, such as Internet, WWW, sending –The number of encounters in a day by each user Encounters distribution in UGoe Encounters distribution in NJU 12

User social behavior (2) Pareto principles of user interaction –Pareto principle Known as rule: 80% of the effects comes from 20% of causes –Both encounters and interactions show Pareto principle –More encounters suggest more interactions between users User interactions vs. user encounters 13

User social behavior (2) Pareto principles of user interaction –Pareto principle Known as rule: 80% of the effects comes from 20% of causes –Both encounters and interactions shows Pareto principle –More encounters suggests more interactions between users User interactions vs. user encounters 14 Pareto principle of user interactions

Information propagation in MS apps (1) Small world phenomenon [5] –The distance between two people is within 6 hops –Most of messages are sent to destination within 6 hops 15 Relays of messages

Information propagation in MS apps (2) DTN routing efficiency –Goose uses Bubble Rap [6] as the routing strategy for message forwarding Forward the message based on the popularity of nodes –It shows the number of messages sent and received Delays of messages 16 StatusUnicastBroadcast Messages sent Total message received Unique messages received Messages sent vs. messages received

Information propagation in MS apps (3) 17 Message delays –Varies from 0 minutes to 10,000 minutes –Unicast messages have shorter delay than broadcast and status updates Delays of messages

Information epidemics [7] –Susceptible-Infectious- Susceptible Each node can be: –Susceptible –Infectious An infectious node can infect others with λ –We initialized an epidemic message in one device in UGoe –The infectious scale reach 50% in a short term, and 80% in the long run Information epidemics 18 Information propagation in MS apps (4)

Conclusions We study the user overall behavior and find that the user activity is similar as human work pattern We explore the user social behavior in which the user encounters follows a heavy tail distribution and user interactions follows Pareto principle We demonstrate the information propagation efficiency by DTN routing and information epidemics model in mobile social networks We expect to extend the function of Goose and have a larger size of deployment 19

References [1] M. Motani, V. Srinivasan, and P. Nuggehalli, PeopleNet: Engineering a Wireless Virtual Social Network. In Proc. of MobiCom, 2005 [2] T. Das, P. Mohan, V. N. Padmanabhan, R. Ramjee and A. Sharma, PRISM: Platform for RemoteSensing using Mobile Smartphones. MobiSys [3] N. V. Rodriguez, P. Hui and J. Crowcroft, Has Anyone Seen My Goose? Social Network Services in Developing Regions. CSE 2009 [4] A. L. Barabasi, The Origin of Bursts and Heavy Tails in Human Dynamics. Nature [5] D. J. Watts and S. H. Strogatz, Collective Dynamics of Small-world Networks, Nature [6] P. Hui, J. Crowcroft, and E. Yoneki. Bubble rap: Social-based forwardingin delay tolerant networks. MobiHoc [7] A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass and J. Scott, Impact of human mobility on opportunistic forwarding algorithms. IEEE Trans. Mob. Comp,

Questions? 21