The Community for Technology Leaders
IEEE Network Science Workshop (2011)
West Point, NY
June 22, 2011 to June 24, 2011
ISBN: 978-1-4577-1049-0
TABLE OF CONTENTS
Papers

Author index (PDF)

pp. 1-3

Data-driven diffusion modeling to examine deterrence (Abstract)

M. J. Lanham , Inst. for Software Res., Carnegie Mellon Univ., Pittsburgh, PA, USA
K. M. Carley , Inst. for Software Res., Carnegie Mellon Univ., Pittsburgh, PA, USA
G. P. Morgan , Inst. for Software Res., Carnegie Mellon Univ., Pittsburgh, PA, USA
pp. 1-8

Modeling and calibrating real world interpersonal networks (Abstract)

K. M. Carley , Sch. of Comput. Sci., Carnegie Mellon Univ., Pittsburgh, PA, USA
J. Pfeffer , Sch. of Comput. Sci., Carnegie Mellon Univ., Pittsburgh, PA, USA
pp. 9-16

Analyzing interaction communication networks in enterprises and identifying hierarchies (Abstract)

M. Faloutsos , Dept. of Comput. Sci. & Eng., Univ. of California, Riverside, CA, USA
M. Iliofotou , Dept. of Comput. Sci. & Eng., Univ. of California, Riverside, CA, USA
Yi Wang , Dept. of Comput. Sci. & Eng., Univ. of California, Riverside, CA, USA
Bin Wu , Beijing Key Lab. of Intell. Telecommun. Software & Multimedia, Beijing Univ. of Posts & Telecommun., Beijing, China
pp. 17-24

Noisy Naming Games, partial synchronization and coarse-graining in social networks (Abstract)

Chjan C. Lim , Math. Sci., RPI, Troy, NY, USA
Weituo Zhang , Math. Sci., RPI, Troy, NY, USA
pp. 25-29

The impact of social groups on the capacity of wireless networks (Abstract)

J. J. Garcia-Luna-Aceves , Dept. of Comput. Eng., Univ. of California, Santa Cruz, CA, USA
B. Azimdoost , Dept. of Electr. Eng., Univ. of California, Santa Cruz, CA, USA
H. R. Sadjadpour , Dept. of Electr. Eng., Univ. of California, Santa Cruz, CA, USA
pp. 30-37

Using network analysis to understand the relation between cuisine and culture (Abstract)

R. Menezes , Dept. of Comput. Sci., Florida Inst. of Technol., Melbourne, FL, USA
D. K. Kular , Dept. of Comput. Sci., Florida Inst. of Technol., Melbourne, FL, USA
E. Ribeiro , Dept. of Comput. Sci., Florida Inst. of Technol., Melbourne, FL, USA
pp. 38-45

Network latency and packet delay variation in cyber-physical systems (Abstract)

J. C. Eidson , EECS Dept., UC Berkeley, Berkeley, CA, USA
E. A. Lee , EECS Dept., UC Berkeley, Berkeley, CA, USA
J. Cardoso , EECS Dept., UC Berkeley, Berkeley, CA, USA
P. Derler , EECS Dept., UC Berkeley, Berkeley, CA, USA
pp. 51-58

A framework for near real-time event characterization within the internet (Abstract)

K. Glass , Inst. for Complex Additive Syst. Anal., New Mexico Inst. of Min. & Technol., Socorro, NM, USA
M. Planck , Inst. for Complex Additive Syst. Anal., New Mexico Inst. of Min. & Technol., Socorro, NM, USA
I. Lyman , Inst. for Complex Additive Syst. Anal., New Mexico Inst. of Min. & Technol., Socorro, NM, USA
R. Colbaugh , Inst. for Complex Additive Syst. Anal., New Mexico Inst. of Min. & Technol., Socorro, NM, USA
pp. 59-66

Resource-constrained signal propagation modeling for tactical mobile ad hoc networks (Abstract)

S. D. Wolthusen , Dept. of Math., R. Holloway, Univ. of London, London, UK
P. Ebinger , Identification & Biometrics, Fraunhofer IGD, Darmstadt, Germany
A. Kuijper , Fraunhofer IGD, Darmstadt, Germany
S. Reidt , Dept. of Math., R. Holloway, Univ. of London, London, UK
pp. 67-74

Visualizing graphs with Krylov subspaces (Abstract)

A. Breuer , APG, Army Res. Lab., Adelphi, MD, USA
pp. 75-81

Modeling network technology deployment rates with different network models (Abstract)

Yoo Chung , Nat. Inst. for Math. Sci., Daejeon, South Korea
pp. 82-89

Towards supply chain excellence using network analysis (Abstract)

P. Alexander , Sch. of Inf. Syst., Curtin Univ. of Technol., Perth, WA, Australia
I. McCulloh , Sch. of Inf. Syst., Curtin Univ. of Technol., Perth, WA, Australia
H. Armstrong , Sch. of Inf. Syst., Curtin Univ. of Technol., Perth, WA, Australia
pp. 90-97

Time spring layout for visualization of dynamic social networks (Abstract)

E. Peterson , Appl. Phys. Lab., Johns Hopkins Univ., Laurel, MD, USA
pp. 98-104

On the matter of classifying node connections (Abstract)

C. J. Armstrong , Sch. of Inf. Syst., Curtin Univ., Perth, WA, Australia
pp. 105-109

Towards a theory of semantic communication (Abstract)

M. Dean , Raytheon BBN Technol., Cambridge, MA, USA
J. A. Hendler , Tetherless World Constellation, Rensselaer Polytech. Inst., Troy, NY, USA
C. Partridge , Raytheon BBN Technol., Cambridge, MA, USA
A. Swami , US Army Res. Lab., Adelphi, MD, USA
W. Leland , Raytheon BBN Technol., Cambridge, MA, USA
Jie Bao , Tetherless World Constellation, Rensselaer Polytech. Inst., Troy, NY, USA
Prithwish Basu , Raytheon BBN Technol., Cambridge, MA, USA
pp. 110-117

Flowing valued information based on a need to share (Abstract)

K. Hugins , Dept. of Electr. Eng. & Comput. Sci., US Mil. Acad., West Point, NY, USA
J. James , Dept. of Electr. Eng. & Comput. Sci., US Mil. Acad., West Point, NY, USA
F. Mabry , Dept. of Electr. Eng. & Comput. Sci., US Mil. Acad., West Point, NY, USA
pp. 123-127

Prognostics and network health management for image transmission over wireless telemedicine systems (Abstract)

A. C. M. Fong , Sch. of Comput., Auckland Univ. of Technol., Auckland, New Zealand
G. Y. Hong , Dept. of Comput., Unitec Inst. of Technol., New Zealand
B. Fong , Prognostics & Health Manage. Center, City Univ. of Hong Kong, Hong Kong, China
pp. 128-132

Effectiveness of information retraction (Abstract)

Malik Magdon-Ismail , Dept. of Comput. Sci., Rensselaer Polytech. Inst., Troy, NY, USA
W. A. Wallace , Dept. of Ind. & Syst. Eng., Rensselaer Polytech. Inst., Troy, NY, USA
M. Goldberg , Dept. of Comput. Sci., Rensselaer Polytech. Inst., Troy, NY, USA
C. Hui , Dept. of Ind. & Syst. Eng., Rensselaer Polytech. Inst., Troy, NY, USA
pp. 133-137

Need To Share: Flowing Valued Information and Secure Networking (Abstract)

J. T. Lanahan , Dept. of Electr. Eng. & Comput. Sci., United States Mil. Acad. (USMA), West Point, NY, USA
pp. 138-143

Threat analysis model of an agent-based vulnerability mitigation mechanism using Bayesian Belief Networks (Abstract)

Ziyad S. Al-Salloum , Inf. Security Group, Univ. of London, Egham, UK
Stephen D. Wolthusen , Norwegian Inf. Security Lab., Gjovik Univ. Coll., Gjovik, Norway
pp. 144-151

Using meta-networks to identify key intervention points in nuclear WMD development (Abstract)

W. H. Peiris , Sch. of Inf. Syst., Curtin Univ. of Technol., Perth, WA, Australia
H. Armstrong , Sch. of Inf. Syst., Curtin Univ. of Technol., Perth, WA, Australia
J. Venable , Sch. of Inf. Syst., Curtin Univ. of Technol., Perth, WA, Australia
pp. 152-156

A pattern recognition framework for the prediction of network vulnerabilities (Abstract)

N. Lechevin , Defence R&D Canada Valcartier, Quebec, QC, Canada
A-L Jousselme , Defence R&D Canada Valcartier, Quebec, QC, Canada
P. Maupin , Defence R&D Canada Valcartier, Quebec, QC, Canada
pp. 157-161

Semantic network analysis for evidence evaluation: The threat anticipation initiative (Abstract)

L. McGrath , Pacific Northwest Nat. Lab., Richland, WA, USA
M. Davis , Battelle Memorial Inst., Columbus, OH, USA
S. Rust , Battelle Memorial Inst., Columbus, OH, USA
R. Burk , Battelle Memorial Inst., Columbus, OH, USA
A. Chappell , Pacific Northwest Nat. Lab., Richland, WA, USA
C. Joslyn , Pacific Northwest Nat. Lab., Richland, WA, USA
M. Gregory , Pacific Northwest Nat. Lab., Richland, WA, USA
M. Morara , Battelle Memorial Inst., Columbus, OH, USA
pp. 162-166

Generating scale-free networks with adjustable clustering coefficient via random walks (Abstract)

Carlos Herrera , Depto. Mat. Aplic. a las Tecnol. de la Informacion, Univ. Politec. de Madrid, Madrid, Spain
Pedro J. Zufiria , Depto. Mat. Aplic. a las Tecnol. de la Informacion, Univ. Politec. de Madrid, Madrid, Spain
pp. 167-172

Detecting communities in time-evolving proximity networks (Abstract)

Yang Yang , Univ. of Notre Dame, Notre Dame, IN, USA
N. V. Chawla , Univ. of Notre Dame, Notre Dame, IN, USA
S. Pandit , Univ. of Notre Dame, Notre Dame, IN, USA
S. Sreenivasan , Rensselaer Polytech. Inst., Troy, NY, USA
V. Kawadia , Raytheon BBN Technol., Cambridge, MA, USA
pp. 173-179

An implicit optimization approach for survivable network design (Abstract)

R. L. Chen , Quantitative Modeling & Anal., Sandia Nat. Labs., Livermore, CA, USA
A. Pinar , Quantitative Modeling & Anal., Sandia Nat. Labs., Livermore, CA, USA
A. Cohn , Ind. & Oper. Eng., Univ. of Michigan, Ann Arbor, MI, USA
pp. 180-187

Community detection using a neighborhood strength driven Label Propagation Algorithm (Abstract)

Boleslaw K. Szymanski , Dept. of Comput. Sci., Rensselaer Polytech. Inst., New York, NY, USA
Jierui Xie , Dept. of Comput. Sci., Rensselaer Polytech. Inst., New York, NY, USA
pp. 188-195
95 ms
(Ver 3.3 (11022016))