Skip to main content

Showing 1–4 of 4 results for author: Kong, J S

Searching in archive cs. Search in all archives.
.
  1. arXiv:0901.0296  [pdf, ps, other

    cs.CY cs.IR physics.soc-ph

    Experience versus Talent Shapes the Structure of the Web

    Authors: Joseph S. Kong, Nima Sarshar, Vwani P. Roychowdhury

    Abstract: We use sequential large-scale crawl data to empirically investigate and validate the dynamics that underlie the evolution of the structure of the web. We find that the overall structure of the web is defined by an intricate interplay between experience or entitlement of the pages (as measured by the number of inbound hyperlinks a page already has), inherent talent or fitness of the pages (as mea… ▽ More

    Submitted 2 January, 2009; originally announced January 2009.

    Journal ref: Proceedings of the National Academy of Sciences (PNAS), Vol. 105, Pages 13724-13729, 2008

  2. arXiv:0709.4048  [pdf, ps, other

    cs.DC cs.NI

    A Symphony Conducted by Brunet

    Authors: P. Oscar Boykin, Jesse S. A. Bridgewater, Joseph S. Kong, Kamen M. Lozev, Behnam A. Rezaei, Vwani P. Roychowdhury

    Abstract: We introduce BruNet, a general P2P software framework which we use to produce the first implementation of Symphony, a 1-D Kleinberg small-world architecture. Our framework is designed to easily implement and measure different P2P protocols over different transport layers such as TCP or UDP. This paper discusses our implementation of the Symphony network, which allows each node to keep… ▽ More

    Submitted 25 September, 2007; originally announced September 2007.

    Comments: 13 pages, 11 figures

  3. A General Framework for Scalability and Performance Analysis of DHT Routing Systems

    Authors: Joseph S. Kong, Jesse S. A. Bridgewater, Vwani P. Roychowdhury

    Abstract: In recent years, many DHT-based P2P systems have been proposed, analyzed, and certain deployments have reached a global scale with nearly one million nodes. One is thus faced with the question of which particular DHT system to choose, and whether some are inherently more robust and scalable. Toward developing such a comparative framework, we present the reachable component method (RCM) for anal… ▽ More

    Submitted 28 March, 2006; originally announced March 2006.

    Comments: 11 pages, 8 figures; to be published in IEEE DSN 2006

  4. arXiv:physics/0504026  [pdf, ps, other

    physics.soc-ph cond-mat.dis-nn cs.CY cs.NI

    Let Your CyberAlter Ego Share Information and Manage Spam

    Authors: Joseph S. Kong, P. Oscar Boykin, Behnam A. Rezaei, Nima Sarshar, Vwani P. Roychowdhury

    Abstract: Almost all of us have multiple cyberspace identities, and these {\em cyber}alter egos are networked together to form a vast cyberspace social network. This network is distinct from the world-wide-web (WWW), which is being queried and mined to the tune of billions of dollars everyday, and until recently, has gone largely unexplored. Empirically, the cyberspace social networks have been found to p… ▽ More

    Submitted 7 May, 2005; v1 submitted 4 April, 2005; originally announced April 2005.

    Comments: 13 pages, 10 figures

    Journal ref: Collaborative Spam Filtering Using E-Mail Networks, IEEE Computer, Vol. 39, No. 8, pages 67-73, 2006