11 results on '"BERRY, JONATHAN W."'
Search Results
2. Sensor network design of contamination warning systems: A decision framework
- Author
-
MURRAY, REGAN, JANKE, ROBERT, HART, WILLIAM E., BERRY, JONATHAN W., TAXON, TOM, and UBER, JAMES
- Published
- 2008
3. The Battle of the Water sensor networks (BWSN): a design challenge for engineers and algorithms
- Author
-
Ostfeld, Avi, Uber, James G., Salomons, Elad, Berry, Jonathan W., Hart, William E., Phillips, Cindy A., Watson, Jean-Paul, Dorini, Gianluca, Jonkergouw, Philip, Kapelan, Zoran, Pierro, Francesco di, Khu, Soon-Thiam, Savic, Dragan, Eliades, Demetrios, Polycarpou, Marios, Ghimire, Santosh R., Barkdoll, Brian D., Gueli, Roberto, Huang, Jinhui J., McBean, Edward A., James, William, Krause, Andreas, Leskovec, Jure, Isovitsch, Shannon, Xu, Jianhua, Guestrin, Carlos, VanBriesen, Jeanne, Small, Mitchell, Fischbeck, Paul, Preis, Ami, Propato, Marco, Piller, Olivier, Trachtman, Gary B., Wu, Zheng Yi, and Walski, Tom
- Subjects
Sensors -- Research ,Water-supply -- United States ,Water-supply -- Safety and security measures ,Water-supply -- Contamination ,Water pollution -- United States ,Water pollution -- Evaluation ,Water quality -- Management ,Water -- Distribution ,Water -- Management ,Company business management ,Business ,Environmental issues ,Environmental services industry - Abstract
Following the events of September 11, 2001, in the United States, world public awareness for possible terrorist attacks on water supply systems has increased dramatically. Among the different threats for a water distribution system, the most difficult to address is a deliberate chemical or biological contaminant injection, due to both the uncertainty of the type of injected contaminant and its consequences, and the uncertainty of the time and location of the injection. An online contaminant monitoring system is considered as a major opportunity to protect against the impacts of a deliberate contaminant intrusion. However, although optimization models and solution algorithms have been developed for locating sensors, little is known about how these design algorithms compare to the efforts of human designers, and thus, the advantages they propose for practical design of sensor networks. To explore these issues, the Battle of the Water Sensor Networks (BWSN) was undertaken as part of the 8th Annual Water Distribution Systems Analysis Symposium, Cincinnati, Ohio, August 27-29, 2006. This paper summarizes the outcome of the BWSN effort and suggests future directions for water sensor networks research and implementation. DOI: 10.1061/(ASCE)0733-9496(2008)134:6(556) CE Database subject headings: Water distribution systems; Water pollution; Optimization; Sensors: Algorithms.
- Published
- 2008
4. Sensor placement in municipal water networks
- Author
-
Berry, Jonathan W., Fleischer, Lisa, Hart, William E., Phillips, Cynthia A., and Watson, Jean-Paul
- Subjects
Pollutants -- Testing ,Municipal water supply -- Equipment and supplies ,Sensors -- Usage ,Business ,Environmental issues ,Environmental services industry - Abstract
We present a model for optimizing the placement of sensors in municipal water networks to detect maliciously injected contaminants. An optimal sensor configuration minimizes the expected fraction of the population at risk. We formulate this problem as a mixed-integer program, which can be solved with generally available solvers. We find optimal sensor placements for three test networks with synthetic risk and population data. Our experiments illustrate that this formulation can be solved relatively quickly and that the predicted sensor configuration is relatively insensitive to uncertainties in the data used for prediction. DOI: 10.1061/(ASCE)0733-9496(2005)131:3(237) CE Database subject headings: Sensors: Municipal water: Hydraulic networks: Water quality: Contaminants.
- Published
- 2005
5. A Block-Based Triangle Counting Algorithm on Heterogeneous Environments.
- Author
-
Yasar, Abdurrahman, Rajamanickam, Sivasankaran, Berry, Jonathan W., and Catalyurek, Umit V.
- Subjects
TRIANGLES ,ALGORITHMS ,PROBLEM solving ,GRAPH algorithms ,COUNTING ,GRAPHICS processing units - Abstract
Triangle counting is a fundamental building block in graph algorithms. In this article, we propose a block-based triangle counting algorithm to reduce data movement during both sequential and parallel execution. Our block-based formulation makes the algorithm naturally suitable for heterogeneous architectures. The problem of partitioning the adjacency matrix of a graph is well-studied. Our task decomposition goes one step further: it partitions the set of triangles in the graph. By streaming these small tasks to compute resources, we can solve problems that do not fit on a device. We demonstrate the effectiveness of our approach by providing an implementation on a compute node with multiple sockets, cores and GPUs. The current state-of-the-art in triangle enumeration processes the Friendster graph in 2.1 seconds, not including data copy time between CPU and GPU. Using that metric, our approach is 20 percent faster. When copy times are included, our algorithm takes 3.2 seconds. This is 5.6 times faster than the fastest published CPU-only time. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
6. Timely Reporting of Heavy Hitters Using External Memory.
- Author
-
SINGH, SHIKHA, PANDEY, PRASHANT, BENDER, MICHAEL A., BERRY, JONATHAN W., FARACH-COLTON, MARTÍN, JOHNSON, ROB, KROEGER, THOMAS M., and PHILLIPS, CYNTHIA A.
- Subjects
MEMORY ,PROBLEM solving ,ALGORITHMS ,DATA structures - Abstract
Given an input stream S of size N, a Φ-heavy hitter is an item that occurs at least ΦN times in S. The problem of finding heavy-hitters is extensively studied in the database literature. We study a real-time heavy-hitters variant in which an element must be reported shortly after we see its T = ΦN-th occurrence (and hence it becomes a heavy hitter). We call this the Timely Event Detection (TED) Problem. The TED problem models the needs of many real-world monitoring systems, which demand accurate (i.e., no false negatives) and timely reporting of all events from large, high-speed streams with a low reporting threshold (high sensitivity). Like the classic heavy-hitters problem, solving the TED problem without false-positives requires large space (Ω(N ) words). Thus in-RAM heavy-hitters algorithms typically sacrifice accuracy (i.e., allow false positives), sensitivity, or timeliness (i.e., use multiple passes). We show how to adapt heavy-hitters algorithms to external memory to solve the TED problem on large high-speed streams while guaranteeing accuracy, sensitivity, and timeliness. Our data structures are limited only by I/O-bandwidth (not latency) and support a tunable tradeoff between reporting delay and I/O overhead. With a small bounded reporting delay, our algorithms incur only a logarithmic I/O overhead. We implement and validate our data structures empirically using the Firehose streaming benchmark. Multithreaded versions of our structures can scale to process 11M observations per second before becoming CPU bound. In comparison, a naive adaptation of the standard heavy-hitters algorithm to external memory would be limited by the storage device's random I/O throughput, i.e., ≈100K observations per second. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
7. Making social networks more human: A topological approach.
- Author
-
Berry, Jonathan W., Phillips, Cynthia A., and Saia, Jared
- Subjects
- *
SOCIAL networks , *ONLINE social networks , *GRAPH algorithms , *BOTNETS , *SOCIAL network analysis , *SOCIAL network theory , *EVOLUTIONARY psychology , *CONSUMER price indexes - Abstract
A key problem in social network analysis is to identify nonhuman interactions. State‐of‐the‐art bot‐detection systems like Botometer train machine‐learning models on user‐specific data. Unfortunately, these methods do not work on data sets in which only topological information is available. In this paper, we propose a new, purely topological approach. Our method removes edges that connect nodes exhibiting strong evidence of non‐human activity from publicly available electronic‐social‐network datasets, including, for example, those in the Stanford Network Analysis Project repository (SNAP). Our methodology is inspired by classic work in evolutionary psychology by Dunbar that posits upper bounds on the total strength of the set of social connections in which a single human can be engaged. We model edge strength with Easley and Kleinberg's topological estimate; label nodes as "violators" if the sum of these edge strengths exceeds a Dunbar‐inspired bound; and then remove the violator‐to‐violator edges. We run our algorithm on multiple social networks and show that our Dunbar‐inspired bound appears to hold for social networks, but not for nonsocial networks. Our cleaning process classifies 0.04% of the nodes of the Twitter‐2010 followers graph as violators, and we find that more than 80% of these violator nodes have Botometer scores of 0.5 or greater. Furthermore, after we remove the roughly 15 million violator‐violator edges from the 1.2‐billion‐edge Twitter‐2010 follower graph, 34% of the violator nodes experience a factor‐of‐two decrease in PageRank. PageRank is a key component of many graph algorithms such as node/edge ranking and graph sparsification. Thus, this artificial inflation would bias algorithmic output, and result in some incorrect decisions based on this output. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
8. Path optimization for graph partitioning problems
- Author
-
Berry, Jonathan W and Goldberg, Mark K
- Published
- 1999
- Full Text
- View/download PDF
9. A task-based linear algebra Building Blocks approach for scalable graph analytics.
- Author
-
Wolf, Michael M., Berry, Jonathan W., and Stark, Dylan T.
- Published
- 2015
- Full Text
- View/download PDF
10. Tolerating the community detection resolution limit with edge weighting.
- Author
-
Berry, Jonathan W., Hendrickson, Bruce, LaViolette, Randall A., and Phillips, Cynthia A.
- Subjects
- *
ALGORITHMS , *WORLD Wide Web , *MODULAR design , *STATISTICAL sampling , *CUMULATIVE indexes - Abstract
Communities of vertices within a giant network such as the World Wide Web are likely to be vastly smaller than the network itself. However, Fortunato and Barthélemy have proved that modularity maximization algorithms for community detection may fail to resolve communities with fewer than L/22 edges, where L is the number of edges in the entire network. This resolution limit leads modularity maximization algorithms to have notoriously poor accuracy on many real networks. Fortunato and Barthélemy's argument can be extended to networks with weighted edges as well, and we derive this corollary argument. We conclude that weighted modularity algorithms may fail to resolve communities with less than E ∈ / 22 total edge weight. where W is the total edge weight in the network and is the maximum weight of an intercommunity edge. If E is small, then small communities can be resolved. Given a weighted or unweighted network, we describe how to derive new edge weights in order to achieve a lowe. we modify the Clauset, Newman, and Moore (CNM) community detection algorithm to maximize weighted modularity, and we show that the resulting algorithm has greatly improved accuracy. In experiments with an emerging community standard benchmark, we find that our simple CNM variant is competitive with the most accurate community detection methods yet proposed. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
11. Graph Analysis with High-Performance Computing.
- Author
-
Hendrickson, Bruce and Berry, Jonathan W.
- Subjects
HIGH performance computing ,GRAPH theory ,COMPUTER algorithms ,RANDOM graphs ,DISTRIBUTED computing - Abstract
The article focuses on the use of high-performance computing to study complex graphs created in networks such as online social networks. The use of graphs in various setting is explored and the typical process of solving graph algorithms is described. It comments on distributed-memory machines, parallel machines, and the message-passing interface (MPI). Symmetric multiprocessors (SMPs), random graphs, and inverse power law graphs are also examined.
- Published
- 2008
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.