Networks from artefacts


Published on

Slides for a talk at Dumbarton Oaks, March 16th 2012, by Shawn Graham, Carleton University Ottawa Canada.

Published in: Education, Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Networks from artefacts

  1. 1. ...and a way to reanimate the same Shawn Graham Assistant Professor of Digital Humanities Carleton University, Ottawa Canada @electricarchaeo
  2. 2. 
  3. 3. • Tom Brughmans,
  4. 4.  Left to right, CIL XV.1 2194, 189, 861. Graham, 2006. <- typical brick stamp of Constantinople, Bardill 2004, type 6601.c. Ca 510/11
  5. 5.  The typical kinds of ties between two sites, here imagined 40 km distant from each other, and four clay sources. The relationships are based on co-appearance of names in different stamps, use of the same clay sources, and so on. The result is multiple overlapping and intersecting networks!Graham 2006, Figure 1.7
  6. 6. Bardill, 2004. Figures 1 & 2
  7. 7. NB. Network graph overlay onto real map of Constantinople is only approximate andnot formally georeferenced.
  8. 8. ‘Sugarscape’, as implemented in Netlogo. In this model, agents compete for a resource to explore the foundations of wealth distribution andinequality. - Li, J. and Wilensky, U. (2009). NetLogo Sugarscape 3 Wealth Distribution model. Center for Connected Learning and Computer-BasedModeling, Northwestern University, Evanston, IL.
  9. 9. to import-network clear-all set-default-shape turtles "circle" import-attributes layout-circle (sort turtles) (max-pxcor - 1) import-linksend Network Import Code Example, Netlogo. Wilensky, U. (1999). NetLogo. Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL.
  10. 10. to import-attributes ;; This opens the file, so we can use it.file-open "places-attributes-v3.txt“ ;; Read in all the data in the file ;; data on the line is in this order: ;; node-id attribute1 attribute2 while [not file-at-end?] [ ;; this reads a single line into a three-item list let items read-from-string (word "[" file-read-line "]") crt 1 [ set node-id item 0 items set size item 1 items set color item 2 items ] ] file-closeend
  11. 11. ;; This procedure reads in a file that contains all the links;; The file is simply 3 columns separated by spaces. In this;; example, the links are directed. The first column contains;; the node-id of the node originating the link. The second;; column the node-id of the node on the other end of the link.;; The third column is the strength of the import-links ‘Links’ & ‘Attributes’ files ;; This opens the file, so we can use it. file-open "place-to-place-links-v3.txt“ can be created by copying and pasting the;; Read in all the data in the file while [not file-at-end?] relevant information [ from a standard .net file ;; this reads a single line into a three-item list let items read-from-string (word "[" file-read-line "]") (csv >> gephi >> net) ask get-node (item 0 items) [ create-link-with get-node (item 1 items) [ set label item 2 items ] ] ] file-closeend
  12. 12. to play-games-of-patronage examine-status-of-friends-network pay-respects-to-higher-status receive-respect-from-lower-status gifts-and-favors recalculate-new-status-of-selfend
  13. 13. Model is a mashup of ‘Network Import’ & ‘Virus transmission on a network’, with theidea of modifying the virus to simulate ideas about social contagion (eventually).
  14. 14.  See Graham 2009, Behaviour Space: Simulating Roman Social Life and Civil Violence for detailsExplore this model, download the code at