SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Analysis of Graphs for Digital Preservation Suitability Charles L. Cartledge Michael L. Nelson Old Dominion University Department of Computer Science Norfolk, VA 23529 USA
Why the problem is of interest Picking apart the title Preservation Graph Suitability A game Results Conclusion Overview 2 2
In 2007, Bob received a photograph from an analog age Bob wants to preserve the photograph into a digital age A Preservation Scenario 3 3
Scanned image of the photograph Metadata Name Date Image type etc. Bob Creates a Web Object (WO) 4 { Data { dc.name = “Josie McClure” dc.date = “28 Feb 1907” dc.type = “image/tiff” … Other data: TBD Metadata
Trials and Tribulations of Bob’s Attempts at Digital Preservation 5 + =
Options and Threats to Bob’s Other Digital Preservation Plan 6 dc.name = “Josie McClure” dc.date = “28 Feb 1907” dc.type = “image/tiff” … Other data: TBD 6
Change the Perspective and Revisit the Problem 7 Can web objects (WO) be constructed to act in an autonomous manner to create a network of WOs that live on the web architecture and can be expected to outlive the people and institutions that created them? 7
A Change in Notation and Size 8
Now on to Suitability 9 Title: Analysis of Graphs for Digital Preservation Suitability Repurpose one thing to do something else To revisit how something works and utilize it in a new and novel way “To bravely go where no one …” 9
Random – global construction Power Law – global construction Small World – global construction Unsupervised Small World (USW) – local construction Types of Graphs Based on “Degreeness” 10 Title: Analysis of Graphs for Digital Preservation Suitability “The number of systems of terminology presently used in graph theory is equal, to a close approximation, to the number of graph theorists.” Enumerative Combinatorics, 1986 10
Intuitive Thoughts about the Robustness and Resilience in a Graph Robustness – a complex network is robust if it keeps is basic functionality even under failure of some of its components Resilience – is how a network responds against repeated component failure 11 Brandes, “Network Analysis,  Methodological Foundations”, 2005 11
There are lots of ways to quantify the characteristics of a graph This equation captures our intuition of damage to a graph based on its structure How to Quantify a Graph’s Robustness and Resilience 12
The CentralityConcept Centrality “denotes an order of importance on the vertices or edges of a graph by assigning real values to them.” A centrality index “is only depending on the structure of the graph.” 13 Brandes, “Network Analysis,  Methodological Foundations”, 2005
The number of shortest paths between all nodes that go  through an edge Highest = 57 (more than one) Lowest = 4 Edge Betweenness Centrality 14
Vertex Betweenness Centrality 15 ,[object Object]
Highest = 69
Lowest = 0 (more than one),[object Object]
How Different Centrality Measures Can Affect the Game Space 17 ,[object Object]
Mallory will use an attack profile during the game17
18 Local vs. Global Graph Knowledge As the path length grows, graph knowledge grows from Local to Global
A Game Between Mallory and Bob’s Graph ,[object Object]
Bob’s graph’s goal - survive
Rules of the game

Weitere ähnliche Inhalte

Ähnlich wie Hypertext Final - Analysis of Graphs for Digital Preservation Suitability

Empirical Network Classification
Empirical Network ClassificationEmpirical Network Classification
Empirical Network ClassificationColleen Farrelly
 
2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...
2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...
2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...Xi Wang
 
VLDB 2015 Tutorial: On Uncertain Graph Modeling and Queries
VLDB 2015 Tutorial: On Uncertain Graph Modeling and QueriesVLDB 2015 Tutorial: On Uncertain Graph Modeling and Queries
VLDB 2015 Tutorial: On Uncertain Graph Modeling and QueriesArijit Khan
 
GraphTour Boston - Graphs for AI and ML
GraphTour Boston - Graphs for AI and MLGraphTour Boston - Graphs for AI and ML
GraphTour Boston - Graphs for AI and MLNeo4j
 
Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...
Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...
Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...Sameera Horawalavithana
 
Trb2016 alireza naimi
Trb2016 alireza naimiTrb2016 alireza naimi
Trb2016 alireza naimialienaimi
 
Opportunistic Routing Based on Daily Routines
Opportunistic Routing Based on Daily RoutinesOpportunistic Routing Based on Daily Routines
Opportunistic Routing Based on Daily RoutinesWaldir Moreira
 
Higher-order clustering coefficients
Higher-order clustering coefficientsHigher-order clustering coefficients
Higher-order clustering coefficientsAustin Benson
 
High-Performance Graph Analysis and Modeling
High-Performance Graph Analysis and ModelingHigh-Performance Graph Analysis and Modeling
High-Performance Graph Analysis and ModelingNesreen K. Ahmed
 
Geometric correlations mitigate the extreme vulnerability of multiplex networ...
Geometric correlations mitigate the extreme vulnerability of multiplex networ...Geometric correlations mitigate the extreme vulnerability of multiplex networ...
Geometric correlations mitigate the extreme vulnerability of multiplex networ...Kolja Kleineberg
 
HILDA 2023 Keynote Bill Howe
HILDA 2023 Keynote Bill HoweHILDA 2023 Keynote Bill Howe
HILDA 2023 Keynote Bill Howedomoritz
 
ProbabilisticModeling20080411
ProbabilisticModeling20080411ProbabilisticModeling20080411
ProbabilisticModeling20080411Clay Stanek
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Tin180 VietNam
 
Resnet.pptx
Resnet.pptxResnet.pptx
Resnet.pptxYanhuaSi
 
Spectral clustering with motifs and higher-order structures
Spectral clustering with motifs and higher-order structuresSpectral clustering with motifs and higher-order structures
Spectral clustering with motifs and higher-order structuresDavid Gleich
 
UPDATED (Version 1.0) Systems Neurology (the only objective is My CAREER, onl...
UPDATED (Version 1.0) Systems Neurology (the only objective is My CAREER, onl...UPDATED (Version 1.0) Systems Neurology (the only objective is My CAREER, onl...
UPDATED (Version 1.0) Systems Neurology (the only objective is My CAREER, onl...EmadfHABIB2
 

Ähnlich wie Hypertext Final - Analysis of Graphs for Digital Preservation Suitability (20)

Empirical Network Classification
Empirical Network ClassificationEmpirical Network Classification
Empirical Network Classification
 
2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...
2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...
2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...
 
07 Network Visualization
07 Network Visualization07 Network Visualization
07 Network Visualization
 
VLDB 2015 Tutorial: On Uncertain Graph Modeling and Queries
VLDB 2015 Tutorial: On Uncertain Graph Modeling and QueriesVLDB 2015 Tutorial: On Uncertain Graph Modeling and Queries
VLDB 2015 Tutorial: On Uncertain Graph Modeling and Queries
 
GraphTour Boston - Graphs for AI and ML
GraphTour Boston - Graphs for AI and MLGraphTour Boston - Graphs for AI and ML
GraphTour Boston - Graphs for AI and ML
 
Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...
Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...
Behind the Mask: Understanding the Structural Forces That Make Social Graphs ...
 
Trb2016 alireza naimi
Trb2016 alireza naimiTrb2016 alireza naimi
Trb2016 alireza naimi
 
Opportunistic Routing Based on Daily Routines
Opportunistic Routing Based on Daily RoutinesOpportunistic Routing Based on Daily Routines
Opportunistic Routing Based on Daily Routines
 
Higher-order clustering coefficients
Higher-order clustering coefficientsHigher-order clustering coefficients
Higher-order clustering coefficients
 
High-Performance Graph Analysis and Modeling
High-Performance Graph Analysis and ModelingHigh-Performance Graph Analysis and Modeling
High-Performance Graph Analysis and Modeling
 
Geometric correlations mitigate the extreme vulnerability of multiplex networ...
Geometric correlations mitigate the extreme vulnerability of multiplex networ...Geometric correlations mitigate the extreme vulnerability of multiplex networ...
Geometric correlations mitigate the extreme vulnerability of multiplex networ...
 
HILDA 2023 Keynote Bill Howe
HILDA 2023 Keynote Bill HoweHILDA 2023 Keynote Bill Howe
HILDA 2023 Keynote Bill Howe
 
ProbabilisticModeling20080411
ProbabilisticModeling20080411ProbabilisticModeling20080411
ProbabilisticModeling20080411
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)
 
Lausanne 2019 #4
Lausanne 2019 #4Lausanne 2019 #4
Lausanne 2019 #4
 
Resnet.pptx
Resnet.pptxResnet.pptx
Resnet.pptx
 
427lects
427lects427lects
427lects
 
Spectral clustering with motifs and higher-order structures
Spectral clustering with motifs and higher-order structuresSpectral clustering with motifs and higher-order structures
Spectral clustering with motifs and higher-order structures
 
UPDATED (Version 1.0) Systems Neurology (the only objective is My CAREER, onl...
UPDATED (Version 1.0) Systems Neurology (the only objective is My CAREER, onl...UPDATED (Version 1.0) Systems Neurology (the only objective is My CAREER, onl...
UPDATED (Version 1.0) Systems Neurology (the only objective is My CAREER, onl...
 
F14 lec12graphs
F14 lec12graphsF14 lec12graphs
F14 lec12graphs
 

Kürzlich hochgeladen

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Hypertext Final - Analysis of Graphs for Digital Preservation Suitability

  • 1. Analysis of Graphs for Digital Preservation Suitability Charles L. Cartledge Michael L. Nelson Old Dominion University Department of Computer Science Norfolk, VA 23529 USA
  • 2. Why the problem is of interest Picking apart the title Preservation Graph Suitability A game Results Conclusion Overview 2 2
  • 3. In 2007, Bob received a photograph from an analog age Bob wants to preserve the photograph into a digital age A Preservation Scenario 3 3
  • 4. Scanned image of the photograph Metadata Name Date Image type etc. Bob Creates a Web Object (WO) 4 { Data { dc.name = “Josie McClure” dc.date = “28 Feb 1907” dc.type = “image/tiff” … Other data: TBD Metadata
  • 5. Trials and Tribulations of Bob’s Attempts at Digital Preservation 5 + =
  • 6. Options and Threats to Bob’s Other Digital Preservation Plan 6 dc.name = “Josie McClure” dc.date = “28 Feb 1907” dc.type = “image/tiff” … Other data: TBD 6
  • 7. Change the Perspective and Revisit the Problem 7 Can web objects (WO) be constructed to act in an autonomous manner to create a network of WOs that live on the web architecture and can be expected to outlive the people and institutions that created them? 7
  • 8. A Change in Notation and Size 8
  • 9. Now on to Suitability 9 Title: Analysis of Graphs for Digital Preservation Suitability Repurpose one thing to do something else To revisit how something works and utilize it in a new and novel way “To bravely go where no one …” 9
  • 10. Random – global construction Power Law – global construction Small World – global construction Unsupervised Small World (USW) – local construction Types of Graphs Based on “Degreeness” 10 Title: Analysis of Graphs for Digital Preservation Suitability “The number of systems of terminology presently used in graph theory is equal, to a close approximation, to the number of graph theorists.” Enumerative Combinatorics, 1986 10
  • 11. Intuitive Thoughts about the Robustness and Resilience in a Graph Robustness – a complex network is robust if it keeps is basic functionality even under failure of some of its components Resilience – is how a network responds against repeated component failure 11 Brandes, “Network Analysis, Methodological Foundations”, 2005 11
  • 12. There are lots of ways to quantify the characteristics of a graph This equation captures our intuition of damage to a graph based on its structure How to Quantify a Graph’s Robustness and Resilience 12
  • 13. The CentralityConcept Centrality “denotes an order of importance on the vertices or edges of a graph by assigning real values to them.” A centrality index “is only depending on the structure of the graph.” 13 Brandes, “Network Analysis, Methodological Foundations”, 2005
  • 14. The number of shortest paths between all nodes that go through an edge Highest = 57 (more than one) Lowest = 4 Edge Betweenness Centrality 14
  • 15.
  • 17.
  • 18.
  • 19. Mallory will use an attack profile during the game17
  • 20. 18 Local vs. Global Graph Knowledge As the path length grows, graph knowledge grows from Local to Global
  • 21.
  • 25. Mallory has to maintain the same attack profile through out
  • 26. Mallory has local knowledge only
  • 27. Mallory can only remove/destroy a maximum number of edges or vertices per turn
  • 28. Bob’s graph can only attempt to recreate a fixed percentage of the graph per turn19 19
  • 29. Sample graph 20 vertices 24 edges Random degree distribution Attack parameters Attack profile: B-V-H Malory has 2 shots per turn Path length: 2 edges Let the Game Begin! 20 20
  • 30.
  • 31. Power law graph – 1 vertex
  • 32. Random graph – 100 vertices
  • 33. Small world graph 140 vertices
  • 34. USW – 170 vertices21
  • 35. WO contains digital data to be preserved WO contains links to copies of itself and to other WOs When WO is accessed, it checks the availability of its own copies and connections to “neighboring” WOs If copies are lost, then initiate reconstruction processes How the Graph Would be Used for Preservation 22 Title: Analysis of Graphs for Digital Preservation Suitability Others Self Accessed Reconstruct 22
  • 36. Conclusion 23 A USW graph is more robust than small-world, random or power law graphs USW has shown to have better preservation potential than other tested graphs Analysis of Graphs for Digital Preservation Suitability Charles L. Cartledge Michael L. Nelson Old Dominion University Department of Computer Science Norfolk, VA 23529 USA This work was funded in part by the National Science Foundation.