SlideShare a Scribd company logo
GUEST EDITORIAL


Online Social Networks




    Michalis Faloutsos   Thomas Karagiannis         Sue Moon




T      he popularity and complexity of online social net-
       works (OSNs) continues to grow unabatedly with the
       most popular applications featuring hundreds of mil-
lions of active users. Ranging from social communities and
discussion groups, to recommendation engines, tagging sys-
                                                                  • User activity: What are the characteristics of user online
                                                                     time in popular OSNs?
                                                                  • Population of online services: How can we model,
                                                                     describe, and sample OSNs when they are dynamic and
                                                                     large, and obtaining a complete snapshot is often impos-
tems, mobile social networks, games, and virtual worlds,             sible?
OSN applications have not only shifted the focus of appli-        • Profile characterization: How do people use OSNs, can
cation developers to the human factor, but have also trans-          we reverse engineer behavior, and can we identify pro-
formed traditional application paradigms such as the way             files based, say, on gender?
users communicate and navigate in the Internet. Indeed,              In the first article of this issue, Yang et al. explore the
understanding user behavior is now an integral part of            problem of modeling human mobility by exploiting under-
online services and applications, with system and algorithm       lying social norms. The authors’ key insight is that individu-
design becoming in effect user-centric. As expected, this         al people’s movements depend on their social interactions;
paradigm shift has not left the research community unaf-          as a result, the social network consists of overlapping com-
fected, triggering intense research interest in the analysis of   munities. However, instead of forming or detecting com-
the structure and properties of online communities.               munities in generated graphs, the authors propose a
   While the first phase of OSN research heavily focused          bottom-up approach by first forming individual communi-
on characterizing the properties of the social graph, cur-        ties, and then establishing their overlapping structure. By
rently, the research community has shown an increased             comparing the proposed model with real traces of human
interest in how basic properties of social network theory         mobility, the authors show that their model can approxi-
can 1) explain observed online human behavior and 2) be           mate properties such as the inter-contact time or degree
exploited to drive the design of algorithms and large-scale       distributions, arguing that social structures play a signifi-
distributed systems. Indeed, this second phase of OSN             cant role in human mobility.
research is also reflected in the current special issue of           The potential of exploiting large-scale OSN services for
IEEE Network. The special issue features an ensemble of           malicious activities is the subject of the article by Makri-
interesting articles demonstrating the breadth and variety        dakis et al. The authors show how the widespread growth of
of OSN applications, such as location-based social network        such services, the underlying trust they establish among
services, security and privacy of OSNs, and human mobility        users, and their “open platform” architecture are the ideal
models based on social network theory.                            properties for turning OSNs into new vectors of attack.
In particular, this special issue attempts to provide insights    The authors expose the feasibility of converting Facebook
with respect to the following questions:                          applications to denial of service platforms, demonstrate
• Human mobility: Could social network theory explain             how to retrieve remote files from a user’s machine, and
   properties of human mobility, and, if so, which of these       expose potential leakage of private information despite the
   properties can be replicated in the proposed models?           relevant privacy settings. Overall, the article provides sim-
• Security: Following the abuse of email and websites, can        ple proof-of-concept examples of misuses in popular OSNs,
   OSNs be used as a new vector of attack to propagate            and stresses the importance of advanced protection mecha-
   malware and compromise user machines?                          nisms tailored to these services.
• Privacy: How do users perceive their privacy in location-          The article by Li et al. further explores how users per-
   based social network services?                                 ceive privacy but in a different context. Specifically, shar-


4                                                                                         IEEE Network • September/October 2010
GUEST EDITORIAL

ing location information is an important feature of OSNs        and blog content. The study highlights how commercial
that is gaining increasing attention among OSN users.           profiles, whose particular aim is to attract users, feature
Location-based OSNs, or “LSNs,” as referred to by the           unique properties from those of individual user profiles.
authors, are explored in the third article of this special         Concluding this editorial, we would like to thank the
issue. The article provides a brief description of some pop-    Editor-in-Chief, Tom Chen, for his valuable support and
ular services in the space, summarizes their features, and      guidance throughout this special issue. We are also grateful
examines how private information might be exposed in            to all the reviewers whose efforts and comments made this
such services. The authors study how privacy concerns           special issue possible.
depend on different users groups, user ages, access meth-
ods, or geographical regions.
                                                                Biographies
   The characterization of user online activity in several      MICHALIS FALOUTSOS (michalis@cs.ucr.edu) is a faculty member in the Computer
popular OSNs is the subject of a study by Gyarmati et al.       Science Department at the University of California, Riverside. He got his Bache-
The study uses PlanetLab as a measurement infrastructure        lor’s degree from the National Technical University of Athens, and his M.Sc and
                                                                Ph.D. from the University of Toronto. His interests include Internet protocols and mea-
monitoring thousands of user profiles for BeBo, MySpace,        surements, network security, and routing in ad hoc networks. With his two
Netlog, and Tagged. The article characterizes access pat-       brothers, he co-authored the paper “On Power Laws of the Internet Topology”
terns of users in these OSNs, covering aspects related to       (SIGCOMM’99), which received the “Test of Time” award from ACM SIG-
                                                                COMM. His work has been supported by several NSF and DAPRA grants,
the user online time, duration of user sessions, and user       including the prestigious NSF CAREER award with a cumulative of more than $5
activity time. The authors perform a statistical analysis of    million in grants. He has been authoring the popular column “You Must Be Jok-
                                                                ing...” in ACM SIGCOMM Computer Communication Review , which reaches
the distributions of specific properties, and expose the fact   9000 downloads. He is the co-founder of stopthehacker.com, a web security
that attracting the interest of users who have recently         startup.
joined an OSN may not be trivial.
                                                                THOMAS KARAGIANNIS (thomkar@microsoft.com) is a researcher with the Systems
   The fraction of active and “non-active” users and the        and Networking group of Microsoft Research Cambridge, United Kingdom. He
size of OSNs is under study also in the article by Rejaie et    received his Ph.D. in computer science from the University of California, River-
al. The authors devise strategies to estimate the number of     side and his B.S from the Applied Informatics Department of the University of
                                                                Macedonia, Thessaloniki, Greece. Before joining Microsoft, he was with Intel Research
users for MySpace and Twitter by exploiting information         and the Cooperative Association for Internet Data Analysis (CAIDA). He has
about the allocation of numeric user IDs. By inferring this     served as a chair and steering committee member for the Workshop on Online Social
                                                                Networks (WOSN), and as a TPC member for several conferences such as SIG-
allocation strategy, the authors can estimate the total popu-   COMM, IMC, and INFOCOM. His research interests include Internet measure-
lation of users at the time a user joined. The authors fur-     ments and modeling, analysis and characterization of the traffic of Internet applications,
ther present information regarding the number of deleted        and peer-to-peer and social networks.
accounts and their corresponding lifespans. Overall, the        SUE MOON (sbmoon@kaist.edu) received her B.S. and M.S. from Seoul National
study reports that the active population of these OSNs is an    University, Korea, in 1988 and 1990, respectively, both in computer engineer-
order of magnitude smaller than their reported population       ing. She received a Ph.D. degree in computer science from the University of
                                                                Massachusetts at Amherst in 2000. From 1999 to 2003 she worked in the
sizes.                                                          IPMON project at Sprint ATL, Burlingame, California. In August 2003 she
   Finally, Gauvin et al. study how user profile characteris-   joined KAIST and now teaches in Daejeon, Korea. She has served as TPC co-
                                                                chair for ACM Multimedia and ACM SIGCOMM MobiArch Workshop, general
tics depend on user gender in MySpace. The authors              chair for PAM, and TPC for many conferences, including SIGCOMM 2010,
explore several properties such as the effect of user age,      NSDI 2008 and 2010, WWW 2007–2008, INFOCOM 2004–2006, and IMC
the correlation between the number of friends and number        2009. She won the best paper award at ACM SIGCOMM Internet Measurement
                                                                Conference 2007 and was awarded the Amore Pacific Woman Scientist Award
of publishers (e.g., friends that publish on a user’s wall),    in 2009. Her research interests are: network performance measurement and
age similarity between interacting users, temporal patterns,    analysis, online social networks, and networked systems.




IEEE Network • September/October 2010                                                                                                                   5

More Related Content

What's hot

Summary of my Doctoral Research, Interests
Summary of my Doctoral Research, InterestsSummary of my Doctoral Research, Interests
Summary of my Doctoral Research, InterestsMeena Nagarajan
 
Detecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervisionDetecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervision
Suresh S
 
How to utilize ‘big data’ on SNS for academic purpose?
How to utilize ‘big data’ on SNS  for academic purpose?How to utilize ‘big data’ on SNS  for academic purpose?
How to utilize ‘big data’ on SNS for academic purpose?
Han Woo PARK
 
Social Networks and Social Capital
Social Networks and Social CapitalSocial Networks and Social Capital
Social Networks and Social CapitalGiorgos Cheliotis
 
2000-ACM SIGCHI-The social life of small graphical chat spaces
2000-ACM SIGCHI-The social life of small graphical chat spaces2000-ACM SIGCHI-The social life of small graphical chat spaces
2000-ACM SIGCHI-The social life of small graphical chat spacesMarc Smith
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
IOSR Journals
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
CSCJournals
 
Overview of Social Networks
Overview of Social NetworksOverview of Social Networks
Overview of Social Networks
Paolo Nesi
 
Social Network Analysis power point presentation
Social Network Analysis power point presentation Social Network Analysis power point presentation
Social Network Analysis power point presentation
Ratnesh Shah
 
An imperative focus on semantic
An imperative focus on semanticAn imperative focus on semantic
An imperative focus on semantic
ijasa
 
Reality Mining
Reality MiningReality Mining
Reality Mining
CI&T
 
Profiling User Interests on the Social Semantic Web
Profiling User Interests on the Social Semantic WebProfiling User Interests on the Social Semantic Web
Profiling User Interests on the Social Semantic Web
Fabrizio Orlandi
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3
Dave King
 
Reality Mining (Nathan Eagle)
Reality Mining (Nathan Eagle)Reality Mining (Nathan Eagle)
Reality Mining (Nathan Eagle)Jan Sifra
 
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detection
vivatechijri
 
Cb4301449454
Cb4301449454Cb4301449454
Cb4301449454
IJERA Editor
 
20111103 con tech2011-marc smith
20111103 con tech2011-marc smith20111103 con tech2011-marc smith
20111103 con tech2011-marc smith
Marc Smith
 

What's hot (19)

Summary of my Doctoral Research, Interests
Summary of my Doctoral Research, InterestsSummary of my Doctoral Research, Interests
Summary of my Doctoral Research, Interests
 
Detecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervisionDetecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervision
 
Overview Of Wcu Research (16 Dec2009)Sj
Overview Of Wcu Research (16 Dec2009)SjOverview Of Wcu Research (16 Dec2009)Sj
Overview Of Wcu Research (16 Dec2009)Sj
 
How to utilize ‘big data’ on SNS for academic purpose?
How to utilize ‘big data’ on SNS  for academic purpose?How to utilize ‘big data’ on SNS  for academic purpose?
How to utilize ‘big data’ on SNS for academic purpose?
 
Social Networks and Social Capital
Social Networks and Social CapitalSocial Networks and Social Capital
Social Networks and Social Capital
 
2000-ACM SIGCHI-The social life of small graphical chat spaces
2000-ACM SIGCHI-The social life of small graphical chat spaces2000-ACM SIGCHI-The social life of small graphical chat spaces
2000-ACM SIGCHI-The social life of small graphical chat spaces
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
Overview of Social Networks
Overview of Social NetworksOverview of Social Networks
Overview of Social Networks
 
Social Network Analysis power point presentation
Social Network Analysis power point presentation Social Network Analysis power point presentation
Social Network Analysis power point presentation
 
An imperative focus on semantic
An imperative focus on semanticAn imperative focus on semantic
An imperative focus on semantic
 
Reality Mining
Reality MiningReality Mining
Reality Mining
 
Profiling User Interests on the Social Semantic Web
Profiling User Interests on the Social Semantic WebProfiling User Interests on the Social Semantic Web
Profiling User Interests on the Social Semantic Web
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3
 
Reality Mining (Nathan Eagle)
Reality Mining (Nathan Eagle)Reality Mining (Nathan Eagle)
Reality Mining (Nathan Eagle)
 
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detection
 
Cb4301449454
Cb4301449454Cb4301449454
Cb4301449454
 
Research Paper On Correlation
Research Paper On CorrelationResearch Paper On Correlation
Research Paper On Correlation
 
20111103 con tech2011-marc smith
20111103 con tech2011-marc smith20111103 con tech2011-marc smith
20111103 con tech2011-marc smith
 

Viewers also liked

Archeologie film
Archeologie filmArcheologie film
Archeologie film
Bauke Veenstra
 
Resultados novel
Resultados novelResultados novel
Resultados novel
Clau Corvera
 
Sabedoria breve manual do usuário sammis reachers
Sabedoria breve manual do usuário   sammis reachersSabedoria breve manual do usuário   sammis reachers
Sabedoria breve manual do usuário sammis reachersEvandro Santos
 
Grace h
Grace hGrace h
Grace hkneddo
 
Levantamiento de pesas
Levantamiento de pesasLevantamiento de pesas
Levantamiento de pesasmarijose1309
 
Technisches Forum Sicherheit: Antwort auf Frage 94 - Nutzungskonflikte nach m...
Technisches Forum Sicherheit: Antwort auf Frage 94 - Nutzungskonflikte nach m...Technisches Forum Sicherheit: Antwort auf Frage 94 - Nutzungskonflikte nach m...
Technisches Forum Sicherheit: Antwort auf Frage 94 - Nutzungskonflikte nach m...
Eidgenössisches Nuklearsicherheitsinspektorat ENSI
 
Cuadro comparativo 2 temas junior urbina el sambo
Cuadro comparativo 2 temas  junior urbina el samboCuadro comparativo 2 temas  junior urbina el sambo
Cuadro comparativo 2 temas junior urbina el sambo
tkmmellisa
 
4º Meritt CC - Economia Doméstica
4º Meritt CC - Economia Doméstica4º Meritt CC - Economia Doméstica
4º Meritt CC - Economia Doméstica
Meritt - Cada Aluno é Único
 
SENSE: Vorschlagsgenerierung bei freier Oberflächenkomposition
SENSE: Vorschlagsgenerierung bei freier OberflächenkompositionSENSE: Vorschlagsgenerierung bei freier Oberflächenkomposition
SENSE: Vorschlagsgenerierung bei freier Oberflächenkomposition
Fink & Partner Media Services GmbH
 
Study Visit
Study VisitStudy Visit
Study VisitUrvin
 
Santosh gadia resume
Santosh gadia resumeSantosh gadia resume
Santosh gadia resumeSantosh Gadia
 
Ruta de consulta demanda de inconstitucionalidad 2
Ruta de consulta demanda de inconstitucionalidad 2Ruta de consulta demanda de inconstitucionalidad 2
Ruta de consulta demanda de inconstitucionalidad 2Desarrollo Ucaldas
 

Viewers also liked (17)

Archeologie film
Archeologie filmArcheologie film
Archeologie film
 
Resume[1]
Resume[1]Resume[1]
Resume[1]
 
Resultados novel
Resultados novelResultados novel
Resultados novel
 
20140604101544869 (1)
20140604101544869 (1)20140604101544869 (1)
20140604101544869 (1)
 
Sabedoria breve manual do usuário sammis reachers
Sabedoria breve manual do usuário   sammis reachersSabedoria breve manual do usuário   sammis reachers
Sabedoria breve manual do usuário sammis reachers
 
Initial ideas
Initial ideasInitial ideas
Initial ideas
 
Grace h
Grace hGrace h
Grace h
 
Levantamiento de pesas
Levantamiento de pesasLevantamiento de pesas
Levantamiento de pesas
 
Technisches Forum Sicherheit: Antwort auf Frage 94 - Nutzungskonflikte nach m...
Technisches Forum Sicherheit: Antwort auf Frage 94 - Nutzungskonflikte nach m...Technisches Forum Sicherheit: Antwort auf Frage 94 - Nutzungskonflikte nach m...
Technisches Forum Sicherheit: Antwort auf Frage 94 - Nutzungskonflikte nach m...
 
Cuadro comparativo 2 temas junior urbina el sambo
Cuadro comparativo 2 temas  junior urbina el samboCuadro comparativo 2 temas  junior urbina el sambo
Cuadro comparativo 2 temas junior urbina el sambo
 
4º Meritt CC - Economia Doméstica
4º Meritt CC - Economia Doméstica4º Meritt CC - Economia Doméstica
4º Meritt CC - Economia Doméstica
 
SENSE: Vorschlagsgenerierung bei freier Oberflächenkomposition
SENSE: Vorschlagsgenerierung bei freier OberflächenkompositionSENSE: Vorschlagsgenerierung bei freier Oberflächenkomposition
SENSE: Vorschlagsgenerierung bei freier Oberflächenkomposition
 
Study Visit
Study VisitStudy Visit
Study Visit
 
Santosh gadia resume
Santosh gadia resumeSantosh gadia resume
Santosh gadia resume
 
Ruta de consulta demanda de inconstitucionalidad 2
Ruta de consulta demanda de inconstitucionalidad 2Ruta de consulta demanda de inconstitucionalidad 2
Ruta de consulta demanda de inconstitucionalidad 2
 
lyyyyy
lyyyyylyyyyy
lyyyyy
 
Publipoema
PublipoemaPublipoema
Publipoema
 

Similar to Online social network

Sampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social NetworkSampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social Network
Editor IJCATR
 
Network Structure For Social Network
Network Structure For Social NetworkNetwork Structure For Social Network
Network Structure For Social Network
Vaibhav Sathe
 
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorIAEME Publication
 
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
Rick Vogel
 
Paper id 152013128
Paper id 152013128Paper id 152013128
Paper id 152013128IJRAT
 
1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in CyberspaceMarc Smith
 
Online social network mining current trends and research issues
Online social network mining current trends and research issuesOnline social network mining current trends and research issues
Online social network mining current trends and research issues
eSAT Publishing House
 
2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networksMarc Smith
 
Travel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingTravel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social Networking
IRJET Journal
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
Marc Smith
 
2009-Social computing-First steps to netviz nirvana
2009-Social computing-First steps to netviz nirvana2009-Social computing-First steps to netviz nirvana
2009-Social computing-First steps to netviz nirvanaMarc Smith
 
D0351020025
D0351020025D0351020025
D0351020025
inventionjournals
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
IRJET Journal
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
eSAT Publishing House
 
Content Based Message Filtering For OSNS Using Machine Learning Classifier
Content Based Message Filtering For OSNS Using Machine  Learning ClassifierContent Based Message Filtering For OSNS Using Machine  Learning Classifier
Content Based Message Filtering For OSNS Using Machine Learning Classifier
IJMER
 
Proposal.docx
Proposal.docxProposal.docx
Proposal.docx
AmitabhSrivastava23
 
E223539
E223539E223539
E223539
irjes
 
CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL...
CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL...CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL...
CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL...
Nexgen Technology
 
Short Web 3 0 Yke 09 30 09
Short Web 3 0 Yke 09 30 09Short Web 3 0 Yke 09 30 09
Short Web 3 0 Yke 09 30 09
YanaKE
 

Similar to Online social network (20)

Q046049397
Q046049397Q046049397
Q046049397
 
Sampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social NetworkSampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social Network
 
Network Structure For Social Network
Network Structure For Social NetworkNetwork Structure For Social Network
Network Structure For Social Network
 
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behavior
 
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
 
Paper id 152013128
Paper id 152013128Paper id 152013128
Paper id 152013128
 
1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in Cyberspace
 
Online social network mining current trends and research issues
Online social network mining current trends and research issuesOnline social network mining current trends and research issues
Online social network mining current trends and research issues
 
2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks
 
Travel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingTravel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social Networking
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
2009-Social computing-First steps to netviz nirvana
2009-Social computing-First steps to netviz nirvana2009-Social computing-First steps to netviz nirvana
2009-Social computing-First steps to netviz nirvana
 
D0351020025
D0351020025D0351020025
D0351020025
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
 
Content Based Message Filtering For OSNS Using Machine Learning Classifier
Content Based Message Filtering For OSNS Using Machine  Learning ClassifierContent Based Message Filtering For OSNS Using Machine  Learning Classifier
Content Based Message Filtering For OSNS Using Machine Learning Classifier
 
Proposal.docx
Proposal.docxProposal.docx
Proposal.docx
 
E223539
E223539E223539
E223539
 
CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL...
CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL...CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL...
CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL...
 
Short Web 3 0 Yke 09 30 09
Short Web 3 0 Yke 09 30 09Short Web 3 0 Yke 09 30 09
Short Web 3 0 Yke 09 30 09
 

More from ingenioustech

Supporting efficient and scalable multicasting
Supporting efficient and scalable multicastingSupporting efficient and scalable multicasting
Supporting efficient and scalable multicasting
ingenioustech
 
Monitoring service systems from
Monitoring service systems fromMonitoring service systems from
Monitoring service systems from
ingenioustech
 
Locally consistent concept factorization for
Locally consistent concept factorization forLocally consistent concept factorization for
Locally consistent concept factorization for
ingenioustech
 
Measurement and diagnosis of address
Measurement and diagnosis of addressMeasurement and diagnosis of address
Measurement and diagnosis of address
ingenioustech
 
Impact of le arrivals and departures on buffer
Impact of  le arrivals and departures on bufferImpact of  le arrivals and departures on buffer
Impact of le arrivals and departures on buffer
ingenioustech
 
Exploiting dynamic resource allocation for
Exploiting dynamic resource allocation forExploiting dynamic resource allocation for
Exploiting dynamic resource allocation for
ingenioustech
 
Efficient computation of range aggregates
Efficient computation of range aggregatesEfficient computation of range aggregates
Efficient computation of range aggregates
ingenioustech
 
Dynamic measurement aware
Dynamic measurement awareDynamic measurement aware
Dynamic measurement aware
ingenioustech
 
Design and evaluation of a proxy cache for
Design and evaluation of a proxy cache forDesign and evaluation of a proxy cache for
Design and evaluation of a proxy cache foringenioustech
 
Throughput optimization in
Throughput optimization inThroughput optimization in
Throughput optimization in
ingenioustech
 
Tcp
TcpTcp
Privacy preserving
Privacy preservingPrivacy preserving
Privacy preserving
ingenioustech
 
Phish market protocol
Phish market protocolPhish market protocol
Phish market protocol
ingenioustech
 
Peering equilibrium multi path routing
Peering equilibrium multi path routingPeering equilibrium multi path routing
Peering equilibrium multi path routing
ingenioustech
 
Peace
PeacePeace
On the quality of service of crash recovery
On the quality of service of crash recoveryOn the quality of service of crash recovery
On the quality of service of crash recovery
ingenioustech
 
Layered approach
Layered approachLayered approach
Layered approach
ingenioustech
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computing
ingenioustech
 
Intrution detection
Intrution detectionIntrution detection
Intrution detection
ingenioustech
 
Bayesian classifiers programmed in sql
Bayesian classifiers programmed in sqlBayesian classifiers programmed in sql
Bayesian classifiers programmed in sql
ingenioustech
 

More from ingenioustech (20)

Supporting efficient and scalable multicasting
Supporting efficient and scalable multicastingSupporting efficient and scalable multicasting
Supporting efficient and scalable multicasting
 
Monitoring service systems from
Monitoring service systems fromMonitoring service systems from
Monitoring service systems from
 
Locally consistent concept factorization for
Locally consistent concept factorization forLocally consistent concept factorization for
Locally consistent concept factorization for
 
Measurement and diagnosis of address
Measurement and diagnosis of addressMeasurement and diagnosis of address
Measurement and diagnosis of address
 
Impact of le arrivals and departures on buffer
Impact of  le arrivals and departures on bufferImpact of  le arrivals and departures on buffer
Impact of le arrivals and departures on buffer
 
Exploiting dynamic resource allocation for
Exploiting dynamic resource allocation forExploiting dynamic resource allocation for
Exploiting dynamic resource allocation for
 
Efficient computation of range aggregates
Efficient computation of range aggregatesEfficient computation of range aggregates
Efficient computation of range aggregates
 
Dynamic measurement aware
Dynamic measurement awareDynamic measurement aware
Dynamic measurement aware
 
Design and evaluation of a proxy cache for
Design and evaluation of a proxy cache forDesign and evaluation of a proxy cache for
Design and evaluation of a proxy cache for
 
Throughput optimization in
Throughput optimization inThroughput optimization in
Throughput optimization in
 
Tcp
TcpTcp
Tcp
 
Privacy preserving
Privacy preservingPrivacy preserving
Privacy preserving
 
Phish market protocol
Phish market protocolPhish market protocol
Phish market protocol
 
Peering equilibrium multi path routing
Peering equilibrium multi path routingPeering equilibrium multi path routing
Peering equilibrium multi path routing
 
Peace
PeacePeace
Peace
 
On the quality of service of crash recovery
On the quality of service of crash recoveryOn the quality of service of crash recovery
On the quality of service of crash recovery
 
Layered approach
Layered approachLayered approach
Layered approach
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computing
 
Intrution detection
Intrution detectionIntrution detection
Intrution detection
 
Bayesian classifiers programmed in sql
Bayesian classifiers programmed in sqlBayesian classifiers programmed in sql
Bayesian classifiers programmed in sql
 

Recently uploaded

Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
amberjdewit93
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
MERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDFMERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDF
scholarhattraining
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
kitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptxkitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptx
datarid22
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
MERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDFMERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDF
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
kitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptxkitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 

Online social network

  • 1. GUEST EDITORIAL Online Social Networks Michalis Faloutsos Thomas Karagiannis Sue Moon T he popularity and complexity of online social net- works (OSNs) continues to grow unabatedly with the most popular applications featuring hundreds of mil- lions of active users. Ranging from social communities and discussion groups, to recommendation engines, tagging sys- • User activity: What are the characteristics of user online time in popular OSNs? • Population of online services: How can we model, describe, and sample OSNs when they are dynamic and large, and obtaining a complete snapshot is often impos- tems, mobile social networks, games, and virtual worlds, sible? OSN applications have not only shifted the focus of appli- • Profile characterization: How do people use OSNs, can cation developers to the human factor, but have also trans- we reverse engineer behavior, and can we identify pro- formed traditional application paradigms such as the way files based, say, on gender? users communicate and navigate in the Internet. Indeed, In the first article of this issue, Yang et al. explore the understanding user behavior is now an integral part of problem of modeling human mobility by exploiting under- online services and applications, with system and algorithm lying social norms. The authors’ key insight is that individu- design becoming in effect user-centric. As expected, this al people’s movements depend on their social interactions; paradigm shift has not left the research community unaf- as a result, the social network consists of overlapping com- fected, triggering intense research interest in the analysis of munities. However, instead of forming or detecting com- the structure and properties of online communities. munities in generated graphs, the authors propose a While the first phase of OSN research heavily focused bottom-up approach by first forming individual communi- on characterizing the properties of the social graph, cur- ties, and then establishing their overlapping structure. By rently, the research community has shown an increased comparing the proposed model with real traces of human interest in how basic properties of social network theory mobility, the authors show that their model can approxi- can 1) explain observed online human behavior and 2) be mate properties such as the inter-contact time or degree exploited to drive the design of algorithms and large-scale distributions, arguing that social structures play a signifi- distributed systems. Indeed, this second phase of OSN cant role in human mobility. research is also reflected in the current special issue of The potential of exploiting large-scale OSN services for IEEE Network. The special issue features an ensemble of malicious activities is the subject of the article by Makri- interesting articles demonstrating the breadth and variety dakis et al. The authors show how the widespread growth of of OSN applications, such as location-based social network such services, the underlying trust they establish among services, security and privacy of OSNs, and human mobility users, and their “open platform” architecture are the ideal models based on social network theory. properties for turning OSNs into new vectors of attack. In particular, this special issue attempts to provide insights The authors expose the feasibility of converting Facebook with respect to the following questions: applications to denial of service platforms, demonstrate • Human mobility: Could social network theory explain how to retrieve remote files from a user’s machine, and properties of human mobility, and, if so, which of these expose potential leakage of private information despite the properties can be replicated in the proposed models? relevant privacy settings. Overall, the article provides sim- • Security: Following the abuse of email and websites, can ple proof-of-concept examples of misuses in popular OSNs, OSNs be used as a new vector of attack to propagate and stresses the importance of advanced protection mecha- malware and compromise user machines? nisms tailored to these services. • Privacy: How do users perceive their privacy in location- The article by Li et al. further explores how users per- based social network services? ceive privacy but in a different context. Specifically, shar- 4 IEEE Network • September/October 2010
  • 2. GUEST EDITORIAL ing location information is an important feature of OSNs and blog content. The study highlights how commercial that is gaining increasing attention among OSN users. profiles, whose particular aim is to attract users, feature Location-based OSNs, or “LSNs,” as referred to by the unique properties from those of individual user profiles. authors, are explored in the third article of this special Concluding this editorial, we would like to thank the issue. The article provides a brief description of some pop- Editor-in-Chief, Tom Chen, for his valuable support and ular services in the space, summarizes their features, and guidance throughout this special issue. We are also grateful examines how private information might be exposed in to all the reviewers whose efforts and comments made this such services. The authors study how privacy concerns special issue possible. depend on different users groups, user ages, access meth- ods, or geographical regions. Biographies The characterization of user online activity in several MICHALIS FALOUTSOS (michalis@cs.ucr.edu) is a faculty member in the Computer popular OSNs is the subject of a study by Gyarmati et al. Science Department at the University of California, Riverside. He got his Bache- The study uses PlanetLab as a measurement infrastructure lor’s degree from the National Technical University of Athens, and his M.Sc and Ph.D. from the University of Toronto. His interests include Internet protocols and mea- monitoring thousands of user profiles for BeBo, MySpace, surements, network security, and routing in ad hoc networks. With his two Netlog, and Tagged. The article characterizes access pat- brothers, he co-authored the paper “On Power Laws of the Internet Topology” terns of users in these OSNs, covering aspects related to (SIGCOMM’99), which received the “Test of Time” award from ACM SIG- COMM. His work has been supported by several NSF and DAPRA grants, the user online time, duration of user sessions, and user including the prestigious NSF CAREER award with a cumulative of more than $5 activity time. The authors perform a statistical analysis of million in grants. He has been authoring the popular column “You Must Be Jok- ing...” in ACM SIGCOMM Computer Communication Review , which reaches the distributions of specific properties, and expose the fact 9000 downloads. He is the co-founder of stopthehacker.com, a web security that attracting the interest of users who have recently startup. joined an OSN may not be trivial. THOMAS KARAGIANNIS (thomkar@microsoft.com) is a researcher with the Systems The fraction of active and “non-active” users and the and Networking group of Microsoft Research Cambridge, United Kingdom. He size of OSNs is under study also in the article by Rejaie et received his Ph.D. in computer science from the University of California, River- al. The authors devise strategies to estimate the number of side and his B.S from the Applied Informatics Department of the University of Macedonia, Thessaloniki, Greece. Before joining Microsoft, he was with Intel Research users for MySpace and Twitter by exploiting information and the Cooperative Association for Internet Data Analysis (CAIDA). He has about the allocation of numeric user IDs. By inferring this served as a chair and steering committee member for the Workshop on Online Social Networks (WOSN), and as a TPC member for several conferences such as SIG- allocation strategy, the authors can estimate the total popu- COMM, IMC, and INFOCOM. His research interests include Internet measure- lation of users at the time a user joined. The authors fur- ments and modeling, analysis and characterization of the traffic of Internet applications, ther present information regarding the number of deleted and peer-to-peer and social networks. accounts and their corresponding lifespans. Overall, the SUE MOON (sbmoon@kaist.edu) received her B.S. and M.S. from Seoul National study reports that the active population of these OSNs is an University, Korea, in 1988 and 1990, respectively, both in computer engineer- order of magnitude smaller than their reported population ing. She received a Ph.D. degree in computer science from the University of Massachusetts at Amherst in 2000. From 1999 to 2003 she worked in the sizes. IPMON project at Sprint ATL, Burlingame, California. In August 2003 she Finally, Gauvin et al. study how user profile characteris- joined KAIST and now teaches in Daejeon, Korea. She has served as TPC co- chair for ACM Multimedia and ACM SIGCOMM MobiArch Workshop, general tics depend on user gender in MySpace. The authors chair for PAM, and TPC for many conferences, including SIGCOMM 2010, explore several properties such as the effect of user age, NSDI 2008 and 2010, WWW 2007–2008, INFOCOM 2004–2006, and IMC the correlation between the number of friends and number 2009. She won the best paper award at ACM SIGCOMM Internet Measurement Conference 2007 and was awarded the Amore Pacific Woman Scientist Award of publishers (e.g., friends that publish on a user’s wall), in 2009. Her research interests are: network performance measurement and age similarity between interacting users, temporal patterns, analysis, online social networks, and networked systems. IEEE Network • September/October 2010 5