Tracing Coordination and Cooperation Structures via Semantic Burst Detection
Journal Title: EAI Endorsed Transactions on Collaborative Computing - Year 2015, Vol 1, Issue 2
Abstract
Developing technologies that support collaboration requires understanding how knowledge and expertise are shared and distributed among community members. We explore two forms of knowledge distribution structures, coordination and cooperation, that are central to successful collaboration. We propose a novel method for detecting the coordination of strategic communication among members of political communities. Our method identifies a “rapid semantic convergence,” a sudden burst in the use linguistic constructions by multiple individuals within a short time, as a signature of coordination. We apply our method to the public statements of U.S. Senators in the 112th U.S. Congress and construct coordination and cooperation networks among these individuals. We then compare aspects of these networks to other known properties of the Senators. Results indicate that the detected networks reflect underlying tendencies in the social relationships among Senators and reveal interesting differences in how the different parties coordinate communication.
Authors and Affiliations
Yu-Ru Lin, Drew Margolin, David Lazer
Welcome Message from the Editors-in-Chief
On behalf of the Editorial Board and the Advisory Board, we are pleased to welcome all to the inaugural issue of the EAI Endorsed Transactions on Collaborative Computing. This journal reflects the increasing maturity...
Space Searching Algorithms Used by Fungi
Experimental studies have shown that fungi use a natural program for searching the space available in micro-confined networks, e.g., mazes. This natural program, which comprises two subroutines, i.e., collision-induced b...
A Scheme for Collaboratively Processing Nearest Neighbor Queries in Oblivious Storage
Security concerns are a substantial impediment to the wider deployment of cloud storage. There are two main concerns on the confidentiality of outsourced data: i) protecting the data, and ii) protecting the access patter...
A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network
Users of online social networks often adjust their privacy settings to control how much information on their profiles is accessible to other users of the networks. While a variety of factors have been shown to affect the...
Experience with Teaching an Online Course in Mobile App Development for Senegalese Students and Professionals
Online education has been described as a means to transform access to education and increase opportunities at a global scale. In this paper, we describe our experience with teaching an eight-week online course in mobile...