Author
Jon Crowcroft
Other affiliations: Memorial University of Newfoundland, Information Technology University, Massachusetts Institute of Technology ...read more
Bio: Jon Crowcroft is an academic researcher from University of Cambridge. The author has contributed to research in topics: The Internet & Multicast. The author has an hindex of 87, co-authored 672 publications receiving 38848 citations. Previous affiliations of Jon Crowcroft include Memorial University of Newfoundland & Information Technology University.
Papers published on a yearly basis
Papers
More filters
•
15 Oct 2001TL;DR: This book provides the rapidly growing audience of Linux site managers, as well as researchers and developers worldwide, with the information they need on how Linux TCP/IP keeps the network running.
Abstract: Boasting high performance, high availability, and open source code, Linux has emerged as an optimal choice for an operating system Yet for Linux to be adopted by the mainstream of Unix-based corporate and ISP networks, it must be capable of supporting the TCP/IP Internet protocol, like any other network operating system This book provides the rapidly growing audience of Linux site managers, as well as researchers and developers worldwide, with the information they need on how Linux TCP/IP keeps the network running The authors walk readers through the Linux TCP/IP protocol stack, offering detailed explanations on how Linux implements its communications protocols
23 citations
•
TL;DR: From the comparative analysis, important differences as well as surprising similarities between the two entities are drawn, thus paving the way for reliable classification of automated political infiltration, advertisement campaigns, and general bot detection.
Abstract: Recent research has shown a substantial active presence of bots in online social networks (OSNs). In this paper we utilise our past work on studying bots (Stweeler) to comparatively analyse the usage and impact of bots and humans on Twitter, one of the largest OSNs in the world. We collect a large-scale Twitter dataset and define various metrics based on tweet metadata. We divide and filter the dataset in four popularity groups in terms of number of followers. Using a human annotation task we assign 'bot' and 'human' ground-truth labels to the dataset, and compare the annotations against an online bot detection tool for evaluation. We then ask a series of questions to discern important behavioural bot and human characteristics using metrics within and among four popularity groups. From the comparative analysis we draw important differences as well as surprising similarities between the two entities, thus paving the way for reliable classification of automated political infiltration, advertisement campaigns, and general bot detection.
22 citations
••
01 Jan 2004
TL;DR: This chapter discusses the working of scalable, self-organizing distributed systems that are often referred to as peer-to-peer (P2P) systems, which push the limits of scalability and robustness, but tend to focus on more homogeneous resources and slower network connections than do contemporary Grids.
Abstract: Publisher Summary This chapter discusses the working of scalable, self-organizing distributed systems that are often referred to as peer-to-peer (P2P) systems. P2P systems push the limits of scalability and robustness, but tend to focus on more homogeneous resources and slower network connections than do contemporary Grids. P2P systems are a potential source of resources for Grid applications; a peer-to-peer research can be a source of scalable and robust algorithms that can be applied to Grid services. P2P systems are Internet applications that harness the resources of a large number of autonomous participants. P2P and Grid computing are both concerned with enabling resource sharing within distributed communities. However, different base assumptions have led to distinct requirements and technical directions. P2P systems have focused on resource sharing in environments characterized by potentially millions of users, most with homogenous desktop systems and low bandwidth, intermittent connections to the Internet. P2P computing has had a dramatic effect on mainstream computing, even blurring the distinctions among computer science, engineering, and politics. An unfortunate side effect is that due consideration often has not been given to the classic research in distributed systems.
22 citations
••
29 Aug 2009TL;DR: Goose is proposed, a Social Network Service (SNS) architecture for developing regions, which provides services including friend searching, resource sharing and information seeking and uses both the limited GSM coverage and Delay Tolerant Networking technology on mobile phones, to enable social information exchange even without cellular data coverage.
Abstract: In developing regions, Internet connectivity is extremely poor, while mobile phone penetration is much higher. The inhabitants of developing countries still rely on traditional social mechanisms, such as word-of-mouth, to gather most information that they use in everyday life. In this paper, we propose Goose, a Social Network Service (SNS) architecture for developing regions, which provides services including friend searching, resource sharing and information seeking. Goose uses both the limited GSM coverage and Delay Tolerant Networking (DTN) technology on mobile phones, to enable social information exchange even without cellular data coverage.
22 citations
••
25 Aug 2004TL;DR: This short paper proposes Highways to create clusters of nodes using a novel "location-aware" method, based on a scalable and distributed network coordinate system that helps to build overlay routing tables to achieve better proximity accuracy, thus, providing a mechanism to boost performance in application overlay routing.
Abstract: The "location-aware" construction of overlay networks requires the identification of nodes that are efficient with respect to network delay and available bandwidth. In this short paper, we propose Highways to create clusters of nodes using a novel "location-aware" method, based on a scalable and distributed network coordinate system. This helps to build overlay routing tables to achieve better proximity accuracy, thus, providing a mechanism to boost performance in application overlay routing.
22 citations
Cited by
More filters
••
[...]
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality.
Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …
33,785 citations
•
28,685 citations
••
TL;DR: In this paper, Imagined communities: Reflections on the origin and spread of nationalism are discussed. And the history of European ideas: Vol. 21, No. 5, pp. 721-722.
13,842 citations
••
TL;DR: A thorough exposition of community structure, or clustering, is attempted, from the definition of the main elements of the problem, to the presentation of most methods developed, with a special focus on techniques designed by statistical physicists.
Abstract: The modern science of networks has brought significant advances to our understanding of complex systems. One of the most relevant features of graphs representing real systems is community structure, or clustering, i. e. the organization of vertices in clusters, with many edges joining vertices of the same cluster and comparatively few edges joining vertices of different clusters. Such clusters, or communities, can be considered as fairly independent compartments of a graph, playing a similar role like, e. g., the tissues or the organs in the human body. Detecting communities is of great importance in sociology, biology and computer science, disciplines where systems are often represented as graphs. This problem is very hard and not yet satisfactorily solved, despite the huge effort of a large interdisciplinary community of scientists working on it over the past few years. We will attempt a thorough exposition of the topic, from the definition of the main elements of the problem, to the presentation of most methods developed, with a special focus on techniques designed by statistical physicists, from the discussion of crucial issues like the significance of clustering and how methods should be tested and compared against each other, to the description of applications to real networks.
9,057 citations
••
TL;DR: A thorough exposition of the main elements of the clustering problem can be found in this paper, with a special focus on techniques designed by statistical physicists, from the discussion of crucial issues like the significance of clustering and how methods should be tested and compared against each other, to the description of applications to real networks.
8,432 citations