This document provides an overview of social network analysis and the Sylva software. It begins with key concepts in social network analysis including social structure, social networks, nodes, linkages, and additional terminology. It then discusses what makes social network analysis unique and provides examples of ego-centered and community-centered network analysis. Finally, it describes the features and capabilities of the Sylva software for collecting, storing, visualizing, and analyzing social network data.
Social network analysis [SNA] is the mapping and measuring of relationships and flows between people, groups, organizations, computers, URLs, and other connected information/knowledge entities. SNA provides both a visual and a mathematical analysis of human relationships.
UNIT II MODELING AND VISUALIZATION
Visualizing Online Social Networks - A Taxonomy of Visualizations - Graph Representation -
Centrality- Clustering - Node-Edge Diagrams - Visualizing Social Networks with Matrix-Based
Representations- Node-Link Diagrams - Hybrid Representations - Modelling and aggregating
social network data – Random Walks and their Applications –Use of Hadoop and Map Reduce -
Ontological representation of social individuals and relationships.
Social network analysis [SNA] is the mapping and measuring of relationships and flows between people, groups, organizations, computers, URLs, and other connected information/knowledge entities. SNA provides both a visual and a mathematical analysis of human relationships.
UNIT II MODELING AND VISUALIZATION
Visualizing Online Social Networks - A Taxonomy of Visualizations - Graph Representation -
Centrality- Clustering - Node-Edge Diagrams - Visualizing Social Networks with Matrix-Based
Representations- Node-Link Diagrams - Hybrid Representations - Modelling and aggregating
social network data – Random Walks and their Applications –Use of Hadoop and Map Reduce -
Ontological representation of social individuals and relationships.
Power no longer resides exclusively (if at all) in states, institutions, or large corporations. It is located in the networks that structure society. Social network analysis seeks to understand networks and their participants and has two main focuses: the actors and the relationships between them in a specific social context.
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Lauri Eloranta
Seventh lecture of the course CSS01: Introduction to Computational Social Science at the University of Helsinki, Spring 2015.(http://blogs.helsinki.fi/computationalsocialscience/).
Lecturer: Lauri Eloranta
Questions & Comments: https://twitter.com/laurieloranta
How to conduct a social network analysis: A tool for empowering teams and wor...Jeromy Anglim
Slides and details available at: http://jeromyanglim.blogspot.com/2009/10/how-to-conduct-social-network-analysis.html
A talk on using social network analysis as a team development tool.
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...Denis Parra Santander
- First version was a guest lecture about Network Visualization in the class "Data Visualization" taught by Dr. Sharon Hsiao in the QMSS program at Columbia University http://www.columbia.edu/~ih2240/dataviz/index.htm
- This updated version was delivered in our class on SNA at PUC Chile in the MPGI master program.
Power no longer resides exclusively (if at all) in states, institutions, or large corporations. It is located in the networks that structure society. Social network analysis seeks to understand networks and their participants and has two main focuses: the actors and the relationships between them in a specific social context.
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Lauri Eloranta
Seventh lecture of the course CSS01: Introduction to Computational Social Science at the University of Helsinki, Spring 2015.(http://blogs.helsinki.fi/computationalsocialscience/).
Lecturer: Lauri Eloranta
Questions & Comments: https://twitter.com/laurieloranta
How to conduct a social network analysis: A tool for empowering teams and wor...Jeromy Anglim
Slides and details available at: http://jeromyanglim.blogspot.com/2009/10/how-to-conduct-social-network-analysis.html
A talk on using social network analysis as a team development tool.
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...Denis Parra Santander
- First version was a guest lecture about Network Visualization in the class "Data Visualization" taught by Dr. Sharon Hsiao in the QMSS program at Columbia University http://www.columbia.edu/~ih2240/dataviz/index.htm
- This updated version was delivered in our class on SNA at PUC Chile in the MPGI master program.
In this talk we shall introduce the main ideas of TruSIS (Trust in Social Internetworking System), a Marie Curie Fellowhsip financed by European Union and hosted at VU University, Department of Computer Science, Business and Web group. The goal of TruSIS is to study the baheviour of users who affiliate to multiple social networking sites and
are active in them (e.g., users may publish personal profiles on sites like MySpace and post videos on sites like YouTube). We briefly called this scenario as SIS (Social Internetworking system).
As a first research contribution, we implemented a crawler to gather data about users and link their profiles on multiple social networking websites. To this purpose we used Google Social Graph API, a powerful API released by Google in 2008. We obtained a sample of about 1.3 millions of user accounts and 36 millions of connections between them.
Parameters from social network theory (like average clustering coefficient, network modularity and so on) were used to study the structural properties of the gathered sample and how these properties depend on user behavious.
A second contribution is about the computation of distance between two users in a SIS on the basis of their social ties. We used a popular parameter from Social Network Theory known as Katz coeffcient and
provide a computationally afficient approach to computing Katz coefficient which relies on the usage of a popular tool from linear algebra known as Sherman- Morrison formula.
Finally, we shall describe our work on extending the notion of trust from single social networks to a SIS. We describe the main research challenges tied to the definition of trust and how they relate to Semantic Web technologies.
Slides for talk at ConTech 2011 the International Symposium on Convergence Technology (ConTech 2011) – Smart & Humane World – on November 3rd in Seoul, South Korea.
Date: 2011 November 3 (Thurs)
Place: COEX Grand Ballroom, Seoul, Korea
Organized by Advanced Institutes of Convergence Technologies (AICT), Seoul National University (SNU)
In Cooperation with Ministry of Knowledge Economy, Ministry of Education, Science and Technology, National Research Foundation of Korea, Graduate School of Convergence Science and Technology (GSCST)
LSS'11: Charting Collections Of Connections In Social MediaLocal Social Summit
Keynote Title: Charting Collections of Connections in Social Media: Creating Maps and Measures with NodeXL
Abstract: Networks are a data structure common found across all social media services that allow populations to author collections of connections. The Social Media Research Foundation‘s NodeXL project makes analysis of social media networks accessible to most users of the Excel spreadsheet application. With NodeXL, Networks become as easy to create as pie charts. Applying the tool to a range of social media networks has already revealed the variations present in online social spaces. A review of the tool and images of Twitter, flickr, YouTube, and email networks will be presented.
Data Mining In Social Networks Using K-Means Clustering Algorithmnishant24894
This topic deals with K-Means Clustering Algorithm which is used to categorize the data set into clusters depending upon their similarities like common interest or organization or colleges, etc. It categorize the data into clusters on the basis of mutual friendship.
Social Network Analysis & an Introduction to ToolsPatti Anklam
This presentation was delivered as part of an intense knowledge management curriculum. It covers the basics of network analysis and then goes into the different types of tool that support analyzing networks.
2010 june - personal democracy forum - marc smith - mapping political socia...Marc Smith
Marc Smith's presentation to the Personal Democracy Forum 2010 in New York City on June 4th, 2010 about the use of NodeXL, a social media network analysis tool, to map political topics in services like Twitter.
NodeXL is available from http://nodexl.codeplex.com
Everything is connected: people, information, events and places. A practical way of making sense of the tangle of connections is to analyze them as networks. The objective of this workshop is to introduce the essential concepts of Social Network Analysis (SNA). It also seeks to show how SNA may help organizations unlock and mobilize these informal networks in order to achieve sustainable strategic goals. After discussing the essential concepts in theory of SNA, the computational tools for modeling and analysis of social networks will also be introduced in this presentation.
Gephi is an open source software for graph and network analysis. It uses a 3D render engine to display large networks in real-time and to speed up the exploration. A flexible and multi-task architecture brings new pos- sibilities to work with complex data sets and produce valuable visual results. We present several key features of Gephi in the context of interactive exploration and interpretation of networks. It provides easy and broad access to network data and allows for spatializing, fil- tering, navigating, manipulating and clustering
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
1. Social Network Analysis with Sylva
Social Network Analysis with Sylva
Juan Luis Suárez & Anabel Quan-Haase
Western University
2. Overview of Workshop
• General overview of the social network
approach
• Key terminology
• Uniqueness of collecting and analyzing
social network data
• Entering data into Sylva
• Importing/exporting data into Sylva
• Example I:
• Example II:
• Understanding limitations and problems
• Future Work and Gephi.org
3. What is SNA?
Social network analysis is focused on uncovering
the patterning of people’s interaction.…Network
analysts believe that how an individual lives
depends in large part on how that individual is
tied into the larger web of social connections.
Many believe, moreover, that the success or
failure of societies and organizations often
depends on the patterning of their internal
structure (Freeman, 1998, November 11).
4.
5. What is Unique about SNA?
Social science research and theory tends to
focus on social actors’:
•attributes
•attitudes
•opinions
•behavior
Focus is on individual level of analysis,
less on network-structural level.
7. Key Terminology
• 1. Social structure
• 2. Social network
• 3. Nodes
• 4. Linkages/relations
• 5. Additional terms of relevance:
– Nodes & edges
– Directed graphs vs. undirected graphs
– Ego
– Alter
– Homophily
8. 1. Social Structure
• Sociological inquiry consists of understanding
the constraining influence of social structure
on social action
• BUT; how do we study social structure?
Attributes Networks
9. 2. Social Network
Social Actors
Ties
Figure 2: Social Structure as Social Network
10. 3. Nodes
• The actors considered in a social network are
exclusively social (alternatively referred to as
agents, nodes, or social entities).
• These include individuals, organizations,
institutions, nations, or groups (Wasserman &
Faust, 1994).
11. Blurred Nodes
• Social actors can therefore be distinguished
from non-social actors – e.g., neurons
comprising a neural network.
• On occasion, the distinction between a social
and a non-social actor is not absolute. For
example, computer networks represent a
hybrid type of network.
12. Node Attributes
• Every single node can have one or more
attributes.
• These attributes describe the nodes and allow
researchers to conduct complex queries of the
database.
• Node attributes can include the time of
publication of a book, its length, the number
of authors, etc.
13. One-mode vs. Two-mode
• Most social network analysis methods allow only one type
of social actor (for instance, individuals or corporations) in
their analysis; these are referred to as one-mode networks
(Wasserman & Faust, 1994).
• However, methods exist which allow two different types of
social actors in their analysis; these are referred to as two-
mode networks. For instance, a study may simultaneously
analyze corporations and their directors.
• Two-mode networks may also include social actors from
distinct networks, for example, a network comprised of
adults and a network comprised of children.
• Two-mode networks allow for comparison between
different types and sets of social actors.
14. 4. Relationships
• Ties are links that connect social actors, and are
the main focus of social network analysis. Ties
are seen as “channels for transfer or “flow” of
resources (either material or nonmaterial)”
(Wasserman & Faust, 1994, p. 4).
15. Simple Relationships
• Naturally occurring ties among social actors are inherently
complex and consist of numerous different interaction
activities.
• However, unlike ethnographers network analysts do not
focus on the complexity of interactions among individuals
(Burt, 1983).
• Instead, social network analysts focus more on the pattern
of relations amongst individuals and to do so simplify the
inherent complexity of social relationships by categorizing
interactions into different broad types. The types can be
manifold. For example, a pair of social actors may have
friendship, working, cooperation, or citation ties.
16. 5. Additional Terms
• Directed graphs vs. undirected graphs
• Ego
• Alter
• Homophily
17. Types of Network Analysis
• Ego-centered/Socio-centered Social Networks
• Community-centered social networks
19. Actor-Level Centrality
• Actor level degree centrality: Degree
centrality measures the extent to which an
actor is linked to all of the other actors in the
network. Three different measures can be
distinguished: nodal degree, indegree, and
outdegree.
• Actor level closeness centrality: Closeness
measures the distance that an actor has to all
of the other actors in the network.
20. • Actor level betweenness centrality:
Betweenness measures the extent to which an
actor lies between two other actors and thus
facilitates/controls the flow of information.
22. Network Level Centralization
• Cohesion Distance: measures the degree of separation
between actors in a network. It indicates how many
other people are between two actors - that is, actors
between an actor and the actor this person needs to
talk to.
• Network Centralization: measures the number of
actors that are connected to each actor in the network.
The more connections among actors, the greater the
network centrality.
• Density: measures the degree of connection that exists
in a network. The more actors talk to each other, the
higher the density.
23. Measures of Centrality and Assumptions
Measure Level Data Type Symmetry/Asymmetry
Nodal Degree Centrality Actor Dichotomized (>5) Symmetric (Maximum)
Asymmetric
Indegree Centrality Actor Valued
Outdegree Centrality Actor Valued Asymmetric
Closeness Centrality Actor Dichotomized (>5) Symmetric (Maximum)
Betweenness Centrality Actor Dichotomized (>5) Symmetric (Maximum)
Network Cohesion Network Valued Asymmetric
Network Centrality Network Dichotomized (>5) Asymmetric
Network Density Network Dichotomized (>5) Symmetric (Maximum)
24. Uniqueness of Collecting and Analyzing
Social Network Data
• Relational data
• Boundary specification and sampling
• Interdependence of data points
• Query search
• Complexity of data collection
– Manually-harvested
– Data set
– Behavioral
– Self-report
25. Internet Resources of
Social Network Analysis
• Center for the Study of Group Processes
http://lime.weeg.uiowa.edu/~grpproc/
• INSNA International Network of Social Network Analysis
http://www.heinz.cmu.edu/project/INSNA/
• Barry Wellman’s Homepage
http://www.chass.utoronto.ca/~wellman/index.html
• CulturePlex
• http://cultureplex.ca/
• Gephi.org
• NodeXL
http://nodexl.codeplex.com/
25
26.
27. Limitations of
Social Network Analysis
• Boundary specification
• Data source
• Definition of social actors
• No distinct method
27
28. What is Sylva?
• A database system management system
• Graph databases
• NoSQL database
• Built on top of Neo4J
29. Whose Needs Does Sylva Serve?
• Sylva requires no programming skills
• On-the-go modification of the schema
• Storing data in a graph form
• Work from the nodes or from the edges
• Collaborative platform
• Easy-to-use interface thanks to forms,
autocomplete, …
• Multiple visualizations
• Search and Query Engines
35. Creating a Schema on Sylva
(manually)
• New Type of Node (person)
• (2nd) New Type of Node (work)
• Relation
– Incoming or outgoing
– Allowed relationships
• (3rd) New Type of Node (institution)
36.
37. Properties of Objects
• Data objects have properties
• A property is an attribute that defines certain
operations than can be performed on the
object
• We need properties to enter our data
48. Cuba’s Prominence: Modeling The
Latin American Afro in Topic Maps
• Objectives:
– locating the various nodes of bibliographic
production associated with the generation of an
image of the Latin-American Afro
– evaluating the causes that make certain nodes,
i.e., Cuba and various Cuban intellectuals, emerge
as key nodes in the network of production of Afro-
Latin American images
49. Cuba’s Prominence
• Methodology:
– a combination of traditional close-reading of texts
(extraction of nodes and relations) with
– graph analysis of the emerging network with Page
Rank algorithm
50.
51. Measurements (Gephi)
• Closeness centrality: expresses how well connected an individual is to the whole
network. A high value in this measurement indicates better connectivity and thus
expresses the importance of the individual with respect to other elements in the
network.
• Betweenness centrality: indicates how important the individual is as a connection
and transference point within the network. A high value indicates that it is a topic
that is passed through in the communications (relationships) between the other
topics on the map.
• Modularity: is a coefficient that enables us to group together those nodes which
share connections and zones on the network, so that it divides the map into zones
with high relationships between them.
• Influence between nodes: is an analysis which we shall carry out in the second
part of the article. It is based on the Page Ranking algorithm. This is basic
algorithm on which the Google search engine was originally based for calculating
the importance of the pages that it comes up with after a search, and which it
used to order the results. Its basic idea is that a given node within a network
becomes important based on the importance of the nodes that relate with it or
that point to it.
55. Sustaining a Global Community
• Henrich et al. [1] have proven that the existence of norms that
sustain fairness in exchanges among strangers are connected with
the diffusion of institutions such as market integration and the
participation in world religions.
• Their research confirms the hypothesis that modern world religion
may have contributed to the sustainability of large- scale societies
and large-scale interactions and we propose that art is another
institution that contributes to the arising and sustainability of large-
scale societies.
• We use the case of the formation of an artistic network of
paintings, schools, themes, genres, and artists whose development
goes along with the expansion and colonization of the Hispanic
Monarchy across America to show that this artistic network has a
presence in all political territories encompassing most ethnicities
and religions of indigenous origin.
56. Methodology
• The data set comprising the paintings from the Baroque period are
organized and stored in a PostgreSQL web based database.
• The data includes more than 100,000 total topics (11,443 of them
are artworks). A distinctive feature of the information is that it is
organized around both text fields and ad-hoc descriptors that follow
the model of a formal ontology.
• For our study we have decided to model the data in one of the
possible networks, a network created from common descriptors as
weighted edges and artworks as nodes.
• Some pruning methods had to be applied in order to overcome
some of the shortcomings resulting from the millions of edges and
the too many relational joins. We also split the dataset in 12
sections, each covering a 25 year-period, from 1550 to 1850 [4].
58. Research Questions
• Our research addresses the issue of the
sustainability of communities through the
existence of a flow of shared information.
• This question is of the utmost importance to
understand the formation and dynamics of
cultural groups and cultural areas.
• As important as the latter is the study of the
spatial and temporal dimensions of any given
political and cultural community as this will shed
light on the cultural processes resulting from
previous and currents waves of globalization
59. Baroque Paintings in the Hispanic
World: A Network.
• The graph shows, for the first two periods of
our study, the growth of the saints-related
paintings (red cluster) as compared to the
decrease of the cluster with virgins (blue).
Portraits’ size (brown cluster) remains more
or less the same, but they get more
connected to saints’.
• FOTO
60. Clustering & Visualizations: Raw Graphs
1550-1575 1575-1600 1600-1625 1625-1650 1650-1675 v 1675-1700 v
v
v
1700-1725 v 1725-1750 v 1750-1775 v 1775-1800 v 1800-1825 v 1825-1850 v
v
http://zoom.it/vJVw#full
61. Further Work with Sylva
• Visualization of Schema
• Two Visualizations of Data:
– Node-centered
– Community centered
• Query System:
– Pattern-matching
– Traversals
• Need for multi-disciplinary teams
• Complexity of analysis