Arxiv:2010.12611V1 [Cs.SI] 23 Oct 2020

Total Page:16

File Type:pdf, Size:1020Kb

Arxiv:2010.12611V1 [Cs.SI] 23 Oct 2020 Clustering via Information Access in a Network∗ Hannah C. Beilinson Nasanbayar Ulzii-Orshikh Ashkan Bashardoust Haverford College Haverford College University of Utah Haverford, PA Haverford, PA Salt Lake City, UT [email protected] [email protected] [email protected] Sorelle A. Friedler Carlos E. Scheidegger Haverford College University of Arizona Haverford, PA Tucson, AZ [email protected] [email protected] Suresh Venkatasubramanian University of Utah Salt Lake City, UT [email protected] October 27, 2020 Abstract Information flow in a graph (say, a social network) has typically been modeled using standard influence propagation methods, with the goal of determining the most effective ways to spread information widely. More recently, researchers have begun to study the differing access to information of individuals within a network. This previous work suggests that information access is itself a potential aspect of privilege based on network position. While concerns about fairness usually focus on differences between demographic groups, characterizing network position may itself give rise to new groups for study. But how do we characterize position? Rather than using standard grouping methods for graph clustering, we design and explore a clustering that explicitly incorporates models of how information flows on a network. Our goal is to identify clusters of nodes that are similar based on their access to information across the network. We show, both formally and experimentally, that the resulting clustering method is a new approach to network clustering. Using a wide variety of datasets, our experiments show that the introduced clustering technique clusters individuals together who are similar based on an external information access measure. 1 Introduction arXiv:2010.12611v1 [cs.SI] 23 Oct 2020 The rapidly growing literature on biases in automated decision making1 illustrates the many ways in which structural biases can enter the decision-making process. Online social networks have also been found to have problems with bias. The \data" in social networks is the way in which curation processes { recommendations most notably { construct links between people (nodes). It has been known for decades that position and access in a social network confer power Hethcote [2000], Burt [1987], Coleman et al. [1966], Granovetter [1978], and in the literature on information spreading and hiring networks (to name just two) there is evidence that groups that are disadvantaged in society continue to be disadvantaged in terms of access to information online Leskovec et al. [2010], Ball and Newman [2013], Clauset et al. [2015], Way et al. [2016], Morgan et al. [2018]. ∗This research was funded in part by the NSF under grants IIS-1955321, IIS-1956286, and IIS-1955162. We are grateful to Way et al. [2016] and Chen et al. [2017] for sharing their network datasets with us. 1http://fairmlbook.org. 1 Social networks are just that { social. The natural process of group formation (online or in person) tends to encourage segregation and clustering along many different dimensions { shared interests, values, identity and so on. These connections are not easily tied to any one of these factors. Rather, they are a complex mix of deliberate and opportunistic network building (with more than a little amount of serendipity). Among others, Burt [2004], as well as boyd et al. [2014] have argued that network positioning as a component of social capital is a form of group affinity in and of itself. In other words, nodes that have similar \status" based on network position receive similar information, and node groups based on information access might be more salient to understanding group dynamics than traditional groups based on node-level features like demographics, class status and so on. It is this observation that motivates this work. 1.1 Contributions Information access provides a novel, natural and effective mechanism for defining node signatures in a network. In this paper, we • formalize the notion of information access, and show how it can be effectively computed for a variety of network sizes, • show mathematically how information access measures similarity differently from methods relying on the spectrum of the graph Laplacian, and • through experiments on a number of different real-world networks, we show that clustering nodes based on information access captures external measures real-world interest. 2 Related Work Work on the problem of influence maximization (also referred to as target seed selection) started with Domingos and Richardson [2001] and was formalized by Kempe et al. [2003], leading to an extensive literature on the subject Li et al. [2018]. Inspired by the literature on social position first initiated by Granovetter [1977] and framed in the context of online social networks by boyd et al. [2014], there has been a more recent development of computational questions around fairness in access on social networks Fish et al. [2019], Tsang et al. [2019], Stoica and Chaintreau [2019]. The starting point for all of this is the idea of information access as a resource. In Fish et al. [2019], this is formalized in terms of the question \what is the probability that vertex i in a graph gets information from source j", and the paper focuses on explicit interventions to ensure that the minimum such probability is maximized. This concept is the basis for our representation-focused work in this paper. Subsequent research Tsang et al. [2019], Stoica and Chaintreau [2019] has focused on the problem of allocation with respect to information access { attempting to make sure that different demographic groups (represented as disjoint subsets of the graph) receive similar information access. Graph clustering (and more generally community detection) has long been a focus of intense study (see Aggarwal and Wang [2010] for a survey). A detailed review of the different strands of graph clustering is beyond the scope of this paper. Broadly speaking, one can categorize graph clustering algorithms as those based on finding dense submotifs in a graph, those based on spectral analysis Shi and Malik [2000], Von Luxburg [2007], Gharan and Trevisan [2014], Kannan et al. [2004] (which in turn generalizes connectivity- based clusterings) and those based on the more general framework of unusual local density or modularity Brandes et al. [2007]. 3 Information Access Let G = (V; E) be a network with sets of nodes V and edges E, where jV j = n. Consider any information flow model that describes how information might transmit from one node to its neighbors, such as the independent cascade model, the linear threshold model, or any of the infection flow models from epidemiology. All these models are stochastic and assume some initial seed set of nodes that possess the information to be spread. For any given seed set S there is then a fixed probability pv;S that node v 2 V possesses the information once the process terminates. 2 This motivates our idea of an information access signature: a way to encode the \view" from a node v of the access it has to information sent from other nodes in the graph. 3.1 Signatures and representation Definition 1 (information access signature). Let vj 2 V be a node in G. The information access signature G n sα : V ! R is G sα(vj) = (p1j; :::; pij; :::pnj) where pij is the probability that node vi 2 V receives information seeded at node vj 2 V under some information flow model with parameters α. Intuitively, this signature characterizes a node's information access based on how likely they are to receive information from everyone else in the network; people who are likely to receive information from the same part of the network will have similar signatures. Transforming all nodes to their associated information access signature gives an information access rep- resentation of the network. Definition 2 (information access representation). Let G = (V; E) be a network with sets of nodes V and edges E. The information access representation is G G Rα = f sα(vj) j vj 2 V g where α represents the parameters of the information flow model as before. In this paper we will focus on the extensively studied independent cascade model Kempe et al. [2003] (also known as the SIR model in epidemiology). In this model, a node exists in one of three states: ready to receive, ready to transmit, and dormant.2 Initially, all nodes are ready to receive information and some subset of seed nodes possess a bit of information and are ready to transmit. At each time step, a node that is ready to transmit decides (for each of its adjacent edges) with probability α to transmit the information to the corresponding neighbor. All such transmissions are imagined to happen simultaneously, after which the node goes dormant. Since the independent cascade model can be characterized by a single parameter α, G in what follows we will merely use sα (v) to denote the information access signature. An example: the star graph We illustrate this construction on the star graph depicted in Figure 1. It is easy to see that for any distinct pair of nodes in the set f1;:::; 7g, the probability of information being transmitted from one to another is α2. For any pair involving the central node t and any periphery node, 2 2 the probability is α. In particular sα(1) = (1; α ; : : : ; α ; α). On the other hand sα(t) = (α; α; : : : ; α; 1). Figure 1: A star graph 2These states are the susceptible, infectious and recovered states of the SIR model. 3 3.2 Information access clustering G The information access representation Rα represents each vertex of the graph as a point in an n-dimensional space. Two points are close in this space if they have similar views of information flow to other nodes. It is then a natural next step to try and group nodes together based on this proximity, i.e., to compute a graph clustering.
Recommended publications
  • Four Results of Jon Kleinberg a Talk for St.Petersburg Mathematical Society
    Four Results of Jon Kleinberg A Talk for St.Petersburg Mathematical Society Yury Lifshits Steklov Institute of Mathematics at St.Petersburg May 2007 1 / 43 2 Hubs and Authorities 3 Nearest Neighbors: Faster Than Brute Force 4 Navigation in a Small World 5 Bursty Structure in Streams Outline 1 Nevanlinna Prize for Jon Kleinberg History of Nevanlinna Prize Who is Jon Kleinberg 2 / 43 3 Nearest Neighbors: Faster Than Brute Force 4 Navigation in a Small World 5 Bursty Structure in Streams Outline 1 Nevanlinna Prize for Jon Kleinberg History of Nevanlinna Prize Who is Jon Kleinberg 2 Hubs and Authorities 2 / 43 4 Navigation in a Small World 5 Bursty Structure in Streams Outline 1 Nevanlinna Prize for Jon Kleinberg History of Nevanlinna Prize Who is Jon Kleinberg 2 Hubs and Authorities 3 Nearest Neighbors: Faster Than Brute Force 2 / 43 5 Bursty Structure in Streams Outline 1 Nevanlinna Prize for Jon Kleinberg History of Nevanlinna Prize Who is Jon Kleinberg 2 Hubs and Authorities 3 Nearest Neighbors: Faster Than Brute Force 4 Navigation in a Small World 2 / 43 Outline 1 Nevanlinna Prize for Jon Kleinberg History of Nevanlinna Prize Who is Jon Kleinberg 2 Hubs and Authorities 3 Nearest Neighbors: Faster Than Brute Force 4 Navigation in a Small World 5 Bursty Structure in Streams 2 / 43 Part I History of Nevanlinna Prize Career of Jon Kleinberg 3 / 43 Nevanlinna Prize The Rolf Nevanlinna Prize is awarded once every 4 years at the International Congress of Mathematicians, for outstanding contributions in Mathematical Aspects of Information Sciences including: 1 All mathematical aspects of computer science, including complexity theory, logic of programming languages, analysis of algorithms, cryptography, computer vision, pattern recognition, information processing and modelling of intelligence.
    [Show full text]
  • Navigability of Small World Networks
    Navigability of Small World Networks Pierre Fraigniaud CNRS and University Paris Sud http://www.lri.fr/~pierre Introduction Interaction Networks • Communication networks – Internet – Ad hoc and sensor networks • Societal networks – The Web – P2P networks (the unstructured ones) • Social network – Acquaintance – Mail exchanges • Biology (Interactome network), linguistics, etc. Dec. 19, 2006 HiPC'06 3 Common statistical properties • Low density • “Small world” properties: – Average distance between two nodes is small, typically O(log n) – The probability p that two distinct neighbors u1 and u2 of a same node v are neighbors is large. p = clustering coefficient • “Scale free” properties: – Heavy tailed probability distributions (e.g., of the degrees) Dec. 19, 2006 HiPC'06 4 Gaussian vs. Heavy tail Example : human sizes Example : salaries µ Dec. 19, 2006 HiPC'06 5 Power law loglog ppk prob{prob{ X=kX=k }} ≈≈ kk-α loglog kk Dec. 19, 2006 HiPC'06 6 Random graphs vs. Interaction networks • Random graphs: prob{e exists} ≈ log(n)/n – low clustering coefficient – Gaussian distribution of the degrees • Interaction networks – High clustering coefficient – Heavy tailed distribution of the degrees Dec. 19, 2006 HiPC'06 7 New problematic • Why these networks share these properties? • What model for – Performance analysis of these networks – Algorithm design for these networks • Impact of the measures? • This lecture addresses navigability Dec. 19, 2006 HiPC'06 8 Navigability Milgram Experiment • Source person s (e.g., in Wichita) • Target person t (e.g., in Cambridge) – Name, professional occupation, city of living, etc. • Letter transmitted via a chain of individuals related on a personal basis • Result: “six degrees of separation” Dec.
    [Show full text]
  • Understanding Innovations and Conventions and Their Diffusion Process in Online Social Media
    UNDERSTANDING INNOVATIONS AND CONVENTIONS AND THEIR DIFFUSION PROCESS IN ONLINE SOCIAL MEDIA A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy by Rahmtin Rotabi December 2017 c 2017 Rahmtin Rotabi ALL RIGHTS RESERVED UNDERSTANDING INNOVATIONS AND CONVENTIONS AND THEIR DIFFUSION PROCESS IN ONLINE SOCIAL MEDIA Rahmtin Rotabi, Ph.D. Cornell University 2017 This thesis investigates innovations, trends, conventions and practices in online social media. Tackling these problems will give more insight into how their users use these online platforms with the hope that the results can be generalized to the offline world. Every major step in human history was accompanied by an innovation, from the time that mankind invented and mastered the production of fire, to the invention of the World Wide Web. The societal process of adopting innovations has been a case that has fas- cinated many researchers throughout the past century. Prior to the existence of online social networks, economists and sociologists were able to study these phenomena on small groups of people through microeconomics and microsociology. However, the data gathered from these online communities help us to take one step further, initiating stud- ies on macroeconomic and macrosociologal problemsin addition to the previous two areas. Work in this thesis sheds light on the properties of both innovators and laggards, the expansion and adaptation of innovation, competition among innovations with the same purpose, and the eventual crowding out of competitor innovations in the target society. Lastly, we look at the bigger picture by studying the entire diffusion process as a whole, abstracting out a great deal of details.
    [Show full text]
  • CS Cornell 40Th Anniversary Booklet
    Contents Welcome from the CS Chair .................................................................................3 Symposium program .............................................................................................4 Meet the speakers ..................................................................................................5 The Cornell environment The Cornell CS ambience ..............................................................................6 Faculty of Computing and Information Science ............................................8 Information Science Program ........................................................................9 College of Engineering ................................................................................10 College of Arts & Sciences ..........................................................................11 Selected articles Mission-critical distributed systems ............................................................ 12 Language-based security ............................................................................. 14 A grand challenge in computer networking .................................................16 Data mining, today and tomorrow ...............................................................18 Grid computing and Web services ...............................................................20 The science of networks .............................................................................. 22 Search engines that learn from experience ..................................................24
    [Show full text]
  • Elliot Anshelevich
    ELLIOT ANSHELEVICH [email protected] Department of Computer Science Office: (607) 255-5578 Cornell University Cell: (607) 262-6170 Upson Hall 5139 Fax: (607) 255-4428 Ithaca, NY 14853 http://www.cs.cornell.edu/people/eanshel Research Interests My interests center on the design and analysis of algorithms. I am especially inter- ested in algorithms for large decentralized networks, including networks involving strategic agents. In particular, I am interested in: • Strategic agents in networks, and influencing their behavior • Network design problems • Distributed load balancing algorithms • Local and decentralized routing algorithms • Influence and information propagation in both social and computer networks Education Cornell University, Ithaca, New York, 2000-2005 Ph.D. Computer Science, expected May 2005 Thesis title: Design and Management of Networks with Strategic Agents Advisor: Jon Kleinberg Master of Science, May 2004 Rice University, Houston, Texas, 1996-2000 B.S. Computer Science, May 2000 Double major in Computer Science and Mathematics magna cum laude Professional and Research Experience Lucent Technologies, Murray Hill, New Jersey Summer 2004 Conducted research on game theoretic network design with Gordon Wilfong and Bruce Shepherd. We study the peering and customer-provider relationships be- tween Autonomous Systems in the Internet, and analyze them using algorithmic game theory. This research is still ongoing and we expect to submit our results for publication in Spring 2005. Lucent Technologies, Murray Hill, New Jersey Summer 2003 Conducted research as an intern on optical network design at Bell Labs. This re- search was done together with Lisa Zhang. We addressed the problem of designing a cheap optical network that satisfies all user demands.
    [Show full text]
  • Link Prediction with Combinatorial Structure: Block Models and Simplicial Complexes
    Link Prediction with Combinatorial Structure: Block Models and Simplicial Complexes Jon Kleinberg Including joint work with Rediet Abebe, Austin Benson, Ali Jadbabaie, Isabel Kloumann, Michael Schaub, and Johan Ugander. Cornell University Neighborhoods and Information-Sharing Marlow-Byron-Lento-Rosenn 2009 Node neighborhoods are the \input" in the basic metaphor for information sharing in social media. w s v A definitional problem: For a given m, who are the m closest people to you in a social network? Defining \closeness" just by hop count has two problems: Not all nodes at a given number of hops seems equally \close." The small-world phenomenon: most nodes are 1, 2, 3, or 4 hops away. Many applications for this question: Content recommendation: What are the m closest people discussing? Link recommendation: Who is the closest person you're not connected to? Similarity: Which nodes should I include in a group with s? Problems Related to Proximity w s v Two testbed versions of these questions: Link Prediction: Given a snapshot of the network up to some time t0, produce a ranked list of pairs likely to form links after time t0. [Kleinberg-LibenNowell 2003, Backstrom-Leskovec 2011, Dong-Tang-Wu-Tian-Chawla-Rao-Cao 2012]. Seed Set Expansion: Given some representative members of a group, produce a ranked list of nodes likely to also belong to the group [Anderson-Chung-Lang 2006, Abrahao et al 2012, Yang-Leskovec 2012]. Problems Related to Proximity w s v Methods for seed set expansion Local: Add nodes iteratively by some measure of the number of edges they have to current group members.
    [Show full text]
  • The Mathematical Work of Jon Kleinberg
    The Mathematical Work of Jon Kleinberg Gert-Martin Greuel, John E. Hopcroft, and Margaret H. Wright The Notices solicited the following article describing the work of Jon Kleinberg, recipient of the 2006 Nevanlinna Prize. The International Mathematical Union also issued a news release, which appeared in the October 2006 issue of the Notices. The Rolf Nevanlinna Prize is awarded by the In- Find the Mathematics; Then Solve the ternational Mathematical Union for “outstanding Problem contributions in mathematical aspects of informa- Kleinberg broadly describes his research [8] as cen- tion sciences”. Jon Kleinberg, the 2006 recipient tering “around algorithmic issues at the interface of the Nevanlinna Prize, was cited by the prize of networks and information, with emphasis on committee for his “deep, creative, and insightful the social and information networks that underpin contributions to the mathematical theory of the the Web and other on-line media”. The phenomena global information environment”. that Kleinberg has investigated arise from neither Our purpose is to present an overall perspective the physical laws of science and engineering nor on Kleinberg’s work as well as a brief summary of the abstractions of mathematics. Furthermore, the three of his results: networks motivating much of his work lack both • the “hubs and authorities” algorithm, deliberate design and central control, as distinct based on structural analysis of link topol- from (for example) telephone networks, which ogy, for locating high-quality information were built and directed to achieve specific goals. on the World Wide Web; He has focused instead on networks that feature • methods for discovering short chains in very large numbers of unregulated interactions be- large social networks; and tween decentralized, human-initiated actions and • techniques for modeling, identifying, and structures.
    [Show full text]
  • Graph Evolution: Densification and Shrinking Diameters
    Graph Evolution: Densification and Shrinking Diameters JURE LESKOVEC Carnegie Mellon University JON KLEINBERG Cornell University and CHRISTOS FALOUTSOS Carnegie Mellon University How do real graphs evolve over time? What are normal growth patterns in social, technological, and information networks? Many studies have discovered patterns in static graphs, identifying properties in a single snapshot of a large network or in a very small number of snapshots; these include heavy tails for in- and out-degree distributions, communities, small-world phenomena, and others. However, given the lack of information about network evolution over long periods, it has been hard to convert these findings into statements about trends over time. Here we study a wide range of real graphs, and we observe some surprising phenomena. First, most of these graphs densify over time with the number of edges growing superlinearly in the number of nodes. Second, the average distance between nodes often shrinks over time in contrast to the conventional wisdom that such distance parameters should increase slowly as a function of the number of nodes (like O(log n)orO(log(log n)). Existing graph generation models do not exhibit these types of behavior even at a qualitative level. We provide a new graph generator, based on a forest fire spreading process that has a simple, intuitive justification, requires very few parameters (like the flammability of nodes), and produces graphs exhibiting the full range of properties observed both in prior work and in the present study. This material is based on work supported by the National Science Foundation under Grants No. IIS-0209107 SENSOR-0329549 EF-0331657IIS-0326322 IIS- 0534205, CCF-0325453, IIS-0329064, CNS-0403340, CCR-0122581; a David and Lucile Packard Foundation Fellowship; and also by the Pennsylvania Infrastructure Technology Alliance (PITA), a partnership of Carnegie Mellon, Lehigh University and the Commonwealth of Pennsylvania’s Department of Community and Economic Development (DCED).
    [Show full text]
  • Pagerank Algorithm
    Link Analysis Algorithms Copyright Ellis Horowitz 2011-2019 Overview of the talk • Background on Citation Analysis • Google’s PageRank Algorithm • Simplified Explanation of PageRank • Examples of how PageRank algorithm works • OBservations about PageRank algorithm • Importance of PageRank • KleinBerg’s HITS Algorithm Copyright Ellis Horowitz, 2011-2019 2 History of Link Analysis • Bibliometrics has been active since at least the 1960’s • A definition from Wikipedia: • "Bibliometrics is a set of methods to quantitatively analyze academic literature. Citation analysis and content analysis are commonly used bibliometric methods. While bibliometric methods are most often used in the field of library and information science, bibliometrics have wide applications in other areas.” • Many research fields use bibliometric methods to explore – the impact of their field, – the impact of a set of researchers, or – the impact of a particular paper. Copyright Ellis Horowitz, 2011-2019 3 Bibliometrics http://citeseerx.ist.psu.edu/stats/citations • One common technique of Top Ten Most Cited Articles in CS Literature Bibliometrics is citation analysis CiteSeerx is a search engine for academic papers • Citation analysis is the examination of the frequency, patterns, and graphs of citations in articles and books. • citation analysis can observe links to other works or other researchers. • Bibliographic coupling: two papers that cite many of the same papers • Co-citation: two papers that were cited by many of the same papers • Impact factor (of a journal): frequency with which the average article in a journal has been cited in a particular year or period Copyright Ellis Horowitz 2011-2018 Bibliographic Coupling • Measure of similarity of documents introduced by Kessler of MIT in 1963.
    [Show full text]
  • The Work of Jon Kleinberg
    The work of Jon Kleinberg John Hopcroft Introduction Jon Kleinberg’s research has helped lay the theoretical foundations for the information age. He has developed the theory that underlies search engines, collaborative filtering, organizing and extracting information from sources such as the World Wide Web, news streams, and the large data collections that are becoming available in astronomy, bioinformatics and many other areas. The following is a brief overview of five of his major contributions. Hubs and authorities In the 1960s library science developed the vector space model for representing doc- uments [13]. The vector space model is constructed by sorting all words in the vocabulary of some corpus of documents and forming a vector space model where each dimension corresponds to one word of the vocabulary. A document is repre- sented as a vector where the value of each coordinate is the number of times the word associated with that dimension appears in the document. Two documents are likely to be on a related topic if the angle between their vector representations is small. Early search engines relied on the vector space model to find web pages that were close to a query. Jon’s work on hubs and authorities recognized that the link structure of the web provided additional information to aid in tasks such as search. His work on hubs and authorities addressed the problem of how, out of the millions of documents on the World Wide Web (WWW), you can select a small number in response to a query. Prior to 1997 search engines selected documents based on the vector space model or a variant of it.
    [Show full text]
  • On the Nature of the Theory of Computation (Toc)∗
    Electronic Colloquium on Computational Complexity, Report No. 72 (2018) On the nature of the Theory of Computation (ToC)∗ Avi Wigderson April 19, 2018 Abstract [This paper is a (self contained) chapter in a new book on computational complexity theory, called Mathematics and Computation, available at https://www.math.ias.edu/avi/book]. I attempt to give here a panoramic view of the Theory of Computation, that demonstrates its place as a revolutionary, disruptive science, and as a central, independent intellectual discipline. I discuss many aspects of the field, mainly academic but also cultural and social. The paper details of the rapid expansion of interactions ToC has with all sciences, mathematics and philosophy. I try to articulate how these connections naturally emanate from the intrinsic investigation of the notion of computation itself, and from the methodology of the field. These interactions follow the other, fundamental role that ToC played, and continues to play in the amazing developments of computer technology. I discuss some of the main intellectual goals and challenges of the field, which, together with the ubiquity of computation across human inquiry makes its study and understanding in the future at least as exciting and important as in the past. This fantastic growth in the scope of ToC brings significant challenges regarding its internal orga- nization, facilitating future interactions between its diverse parts and maintaining cohesion of the field around its core mission of understanding computation. Deliberate and thoughtful adaptation and growth of the field, and of the infrastructure of its community are surely required and such discussions are indeed underway.
    [Show full text]
  • Acm Honors Computing Innovators Who Are Changing the World
    Contact: Virginia Gold 212-626-0505 [email protected] ACM HONORS COMPUTING INNOVATORS WHO ARE CHANGING THE WORLD Award Winners Made Advances in Networked Systems, Social Networks, Science Education Standards, and Rescue Robots NEW YORK, NY, April 14, 2015 – ACM, the Association for Computing Machinery (www.acm.org), today announced the recipients of five prestigious awards for their innovations in computing technology. These innovators have made significant contributions that enable computer science to solve real world challenges. The awards reflect achievements in efficient networked systems, standard software libraries, social connections on the Web, national science and engineering education standards, and search and rescue robotics. The 2014 ACM award recipients include computer scientists and educators. ACM will present these and other awards at the ACM Awards Banquet on June 20 in San Francisco. The 2014 Award Winners Include: • Sylvia Ratnasamy, recipient of the Grace Murray Hopper Award for her contributions to the first efficient design for distributed hash tables (DHT), a critical element in large-scale distributed and peer-to-peer computing systems. Ratnasamy’s innovative design and implementation of networked systems enables a data object in a network to be located quickly without requiring a central registry. Her recent research introduces RouteBricks, an approach that makes networks easier to build, program and evolve, and is used as a way to exploit parallelism to scale software routers. She is an assistant professor in Computer Science at the University of California, Berkeley. The Hopper Award recognizes the outstanding young computer professional of the year. • James Demmel, recipient of the Paris Kanellakis Theory and Practice Award for his work on numerical linear algebra libraries, including LAPACK (Linear Algebra Package), a standard software library that forms part of the standard mathematical libraries for many vendors.
    [Show full text]