Search For:

Displaying 1-13 out of 13 total
Reflecting on the DARPA Red Balloon Challenge
Found in: Communications of the ACM
By Douglas "Beaker" Wickert, Hyun-Woo Kim, Hyun-Woo Kim, Hyun-Woo Kim, John C. Tang, John C. Tang, John C. Tang, Manuel Cebrian, Manuel Cebrian, Manuel Cebrian, Nicklaus A. Giacobe, Nicklaus A. Giacobe, Nicklaus A. Giacobe, Taemie Kim, Taemie Kim, Taemie Kim
Issue Date:April 2011
pp. 78-85
Finding 10 balloons across the U.S. illustrates how the Internet has changed the way we solve highly distributed problems.
     
Sensing the "Health State" of a Community
Found in: IEEE Pervasive Computing
By Anmol Madan,Manuel Cebrian,Sai Moturu,Katayoun Farrahi,Alex "Sandy" Pentland
Issue Date:October 2012
pp. 36-45
Mobile phones are a pervasive platform for opportunistic sensing of behaviors and opinions. Three studies use location and communication sensors to model individual behaviors and symptoms, long-term health outcomes, and the diffusion of opinions in a commu...
 
On Lattice Protein Structure Prediction Revisited
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Ivan Dotu,Manuel Cebrián,Pascal Van Hentenryck,Peter Clote
Issue Date:November 2011
pp. 1620-1632
HASH(0x390ed58)
 
On Lattice Protein Structure Prediction Revisited
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
By Ivan Dotu, Manuel Cebrian, Manuel Cebrian, Pascal Van Hentenryck, Pascal Van Hentenryck, Peter Clote, Peter Clote
Issue Date:November 2011
pp. 1620-1632
HASH(0x390ed58)
     
Energy-Efficient Sparse Matrix Autotuning with CSX -- A Trade-off Study
Found in: 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW)
By Jan Christian Meyer,Juan Manuel Cebrian,Lasse Natvig,Vasileios Karakasis,Dimitris Siakavaras,Konstantinos Nikas
Issue Date:May 2013
pp. 931-937
In this paper, we apply a method for extracting a running power estimate of applications from hardware performance counters, producing power/time curves which can be integrated over particular intervals to estimate the energy consumption of individual appl...
 
Global Manhunt Pushes the Limits of Social Mobilization
Found in: Computer
By Iyad Rahwan,Sohan Dsouza,Alex Rutherford,Victor Naroditskiy,James McInerney,Matteo Venanzi,Nicholas R. Jennings,Manuel Cebrian
Issue Date:April 2013
pp. 68-75
Using social media and only the targets' mug shots, a team competing in the US State Department-sponsored Tag Challenge located three of five targeted people in five cities in the US and Europe in less than 12 hours.
 
Stealing Reality: When Criminals Become Data Scientists (or Vice Versa)
Found in: IEEE Intelligent Systems
By Yaniv Altshuler,Nadav Aharony,Alex Pentland,Yuval Elovici,Manuel Cebrian
Issue Date:November 2011
pp. 22-30
Stealing-reality attacks attempt to steal social network and behavioral information through data collection and inference techniques, making them more dangerous than other types of identity theft.
 
Reducing the Loss of Information through Annealing Text Distortion
Found in: IEEE Transactions on Knowledge and Data Engineering
By Ana Granados, Manuel Cebrián, David Camacho, Francisco de Borja Rodríguez
Issue Date:July 2011
pp. 1090-1102
Compression distances have been widely used in knowledge discovery and data mining. They are parameter-free, widely applicable, and very effective in several domains. However, little has been done to interpret their results or to explain their behavior. In...
 
Inferring Unobservable Inter-community Links in Large Social Networks
Found in: Computational Science and Engineering, IEEE International Conference on
By Heath Hohwald, Manuel Cebrián, Arturo Canales, Rubén Lara, Nuria Oliver
Issue Date:August 2009
pp. 375-380
Social networks can be used to model social interactions between individuals. In many circumstances, not all interactions between individuals are observed. In such cases, a social network is constructed with the data that has been observed, as this is the ...
 
How Did You Get to Know That? A Traceable Word-of-Mouth Algorithm
Found in: Computational Science and Engineering, IEEE International Conference on
By Manuel Cebrián, Enrique Frías-Martínez, Heath Hohwald, Ruben Lara, Nuria Oliver
Issue Date:August 2009
pp. 292-297
Word-of-mouth communication has been shown to play a key rolein a variety of environments such as viral marketing and virusspreading. A family of algorithms, generally known as informationspreading algorithms or word-of-mouth algorithms, has beendeveloped ...
 
Using friends as sensors to detect planetary-scale contagious outbreaks
Found in: Proceedings of the 1st international workshop on Multimodal crowd sensing (CrowdSens '12)
By Manuel Cebrian
Issue Date:November 2012
pp. 15-16
Recent research has focused on the monitoring of planetary-scale online data for improved detection of flu outbreak [1], global mood patterns [2], movements in the stock market [3], political revolutions [4], and many other important phenomena. However, no...
     
Social sensing for epidemiological behavior change
Found in: Proceedings of the 12th ACM international conference on Ubiquitous computing (Ubicomp '10)
By Alex Pentland, Anmol Madan, David Lazer, Manuel Cebrian
Issue Date:September 2010
pp. 291-300
An important question in behavioral epidemiology and public health is to understand how individual behavior is affected by illness and stress. Although changes in individual behavior are intertwined with contagion, epidemiologists today do not have sensing...
     
Word-of-mouth algorithms: what you don't know will hurt you
Found in: Proceedings of the ICMI-MLMI '09 Workshop on Multimodal Sensor-Based Systems and Mobile Phones for Social Computing (ICMI-MLMI '09)
By Enrique Frias-Martinez, Manuel Cebrian
Issue Date:November 2009
pp. 1-4
Word-of-mouth communication has been shown to play a key role in a variety of environments such as viral marketing and churn prediction. A family of algorithms, generally known as information spreading algorithms has been developed to model such pervasive ...
     
 1