GUEST EDITORIAL


Online Social Networks




    Michalis Faloutsos   Thomas Karagiannis         Sue Moon




T      he popularity and complexity of online social net-
       works (OSNs) continues to grow unabatedly with the
       most popular applications featuring hundreds of mil-
lions of active users. Ranging from social communities and
discussion groups, to recommendation engines, tagging sys-
                                                                  • User activity: What are the characteristics of user online
                                                                     time in popular OSNs?
                                                                  • Population of online services: How can we model,
                                                                     describe, and sample OSNs when they are dynamic and
                                                                     large, and obtaining a complete snapshot is often impos-
tems, mobile social networks, games, and virtual worlds,             sible?
OSN applications have not only shifted the focus of appli-        • Profile characterization: How do people use OSNs, can
cation developers to the human factor, but have also trans-          we reverse engineer behavior, and can we identify pro-
formed traditional application paradigms such as the way             files based, say, on gender?
users communicate and navigate in the Internet. Indeed,              In the first article of this issue, Yang et al. explore the
understanding user behavior is now an integral part of            problem of modeling human mobility by exploiting under-
online services and applications, with system and algorithm       lying social norms. The authors’ key insight is that individu-
design becoming in effect user-centric. As expected, this         al people’s movements depend on their social interactions;
paradigm shift has not left the research community unaf-          as a result, the social network consists of overlapping com-
fected, triggering intense research interest in the analysis of   munities. However, instead of forming or detecting com-
the structure and properties of online communities.               munities in generated graphs, the authors propose a
   While the first phase of OSN research heavily focused          bottom-up approach by first forming individual communi-
on characterizing the properties of the social graph, cur-        ties, and then establishing their overlapping structure. By
rently, the research community has shown an increased             comparing the proposed model with real traces of human
interest in how basic properties of social network theory         mobility, the authors show that their model can approxi-
can 1) explain observed online human behavior and 2) be           mate properties such as the inter-contact time or degree
exploited to drive the design of algorithms and large-scale       distributions, arguing that social structures play a signifi-
distributed systems. Indeed, this second phase of OSN             cant role in human mobility.
research is also reflected in the current special issue of           The potential of exploiting large-scale OSN services for
IEEE Network. The special issue features an ensemble of           malicious activities is the subject of the article by Makri-
interesting articles demonstrating the breadth and variety        dakis et al. The authors show how the widespread growth of
of OSN applications, such as location-based social network        such services, the underlying trust they establish among
services, security and privacy of OSNs, and human mobility        users, and their “open platform” architecture are the ideal
models based on social network theory.                            properties for turning OSNs into new vectors of attack.
In particular, this special issue attempts to provide insights    The authors expose the feasibility of converting Facebook
with respect to the following questions:                          applications to denial of service platforms, demonstrate
• Human mobility: Could social network theory explain             how to retrieve remote files from a user’s machine, and
   properties of human mobility, and, if so, which of these       expose potential leakage of private information despite the
   properties can be replicated in the proposed models?           relevant privacy settings. Overall, the article provides sim-
• Security: Following the abuse of email and websites, can        ple proof-of-concept examples of misuses in popular OSNs,
   OSNs be used as a new vector of attack to propagate            and stresses the importance of advanced protection mecha-
   malware and compromise user machines?                          nisms tailored to these services.
• Privacy: How do users perceive their privacy in location-          The article by Li et al. further explores how users per-
   based social network services?                                 ceive privacy but in a different context. Specifically, shar-


4                                                                                         IEEE Network • September/October 2010
GUEST EDITORIAL

ing location information is an important feature of OSNs        and blog content. The study highlights how commercial
that is gaining increasing attention among OSN users.           profiles, whose particular aim is to attract users, feature
Location-based OSNs, or “LSNs,” as referred to by the           unique properties from those of individual user profiles.
authors, are explored in the third article of this special         Concluding this editorial, we would like to thank the
issue. The article provides a brief description of some pop-    Editor-in-Chief, Tom Chen, for his valuable support and
ular services in the space, summarizes their features, and      guidance throughout this special issue. We are also grateful
examines how private information might be exposed in            to all the reviewers whose efforts and comments made this
such services. The authors study how privacy concerns           special issue possible.
depend on different users groups, user ages, access meth-
ods, or geographical regions.
                                                                Biographies
   The characterization of user online activity in several      MICHALIS FALOUTSOS (michalis@cs.ucr.edu) is a faculty member in the Computer
popular OSNs is the subject of a study by Gyarmati et al.       Science Department at the University of California, Riverside. He got his Bache-
The study uses PlanetLab as a measurement infrastructure        lor’s degree from the National Technical University of Athens, and his M.Sc and
                                                                Ph.D. from the University of Toronto. His interests include Internet protocols and mea-
monitoring thousands of user profiles for BeBo, MySpace,        surements, network security, and routing in ad hoc networks. With his two
Netlog, and Tagged. The article characterizes access pat-       brothers, he co-authored the paper “On Power Laws of the Internet Topology”
terns of users in these OSNs, covering aspects related to       (SIGCOMM’99), which received the “Test of Time” award from ACM SIG-
                                                                COMM. His work has been supported by several NSF and DAPRA grants,
the user online time, duration of user sessions, and user       including the prestigious NSF CAREER award with a cumulative of more than $5
activity time. The authors perform a statistical analysis of    million in grants. He has been authoring the popular column “You Must Be Jok-
                                                                ing...” in ACM SIGCOMM Computer Communication Review , which reaches
the distributions of specific properties, and expose the fact   9000 downloads. He is the co-founder of stopthehacker.com, a web security
that attracting the interest of users who have recently         startup.
joined an OSN may not be trivial.
                                                                THOMAS KARAGIANNIS (thomkar@microsoft.com) is a researcher with the Systems
   The fraction of active and “non-active” users and the        and Networking group of Microsoft Research Cambridge, United Kingdom. He
size of OSNs is under study also in the article by Rejaie et    received his Ph.D. in computer science from the University of California, River-
al. The authors devise strategies to estimate the number of     side and his B.S from the Applied Informatics Department of the University of
                                                                Macedonia, Thessaloniki, Greece. Before joining Microsoft, he was with Intel Research
users for MySpace and Twitter by exploiting information         and the Cooperative Association for Internet Data Analysis (CAIDA). He has
about the allocation of numeric user IDs. By inferring this     served as a chair and steering committee member for the Workshop on Online Social
                                                                Networks (WOSN), and as a TPC member for several conferences such as SIG-
allocation strategy, the authors can estimate the total popu-   COMM, IMC, and INFOCOM. His research interests include Internet measure-
lation of users at the time a user joined. The authors fur-     ments and modeling, analysis and characterization of the traffic of Internet applications,
ther present information regarding the number of deleted        and peer-to-peer and social networks.
accounts and their corresponding lifespans. Overall, the        SUE MOON (sbmoon@kaist.edu) received her B.S. and M.S. from Seoul National
study reports that the active population of these OSNs is an    University, Korea, in 1988 and 1990, respectively, both in computer engineer-
order of magnitude smaller than their reported population       ing. She received a Ph.D. degree in computer science from the University of
                                                                Massachusetts at Amherst in 2000. From 1999 to 2003 she worked in the
sizes.                                                          IPMON project at Sprint ATL, Burlingame, California. In August 2003 she
   Finally, Gauvin et al. study how user profile characteris-   joined KAIST and now teaches in Daejeon, Korea. She has served as TPC co-
                                                                chair for ACM Multimedia and ACM SIGCOMM MobiArch Workshop, general
tics depend on user gender in MySpace. The authors              chair for PAM, and TPC for many conferences, including SIGCOMM 2010,
explore several properties such as the effect of user age,      NSDI 2008 and 2010, WWW 2007–2008, INFOCOM 2004–2006, and IMC
the correlation between the number of friends and number        2009. She won the best paper award at ACM SIGCOMM Internet Measurement
                                                                Conference 2007 and was awarded the Amore Pacific Woman Scientist Award
of publishers (e.g., friends that publish on a user’s wall),    in 2009. Her research interests are: network performance measurement and
age similarity between interacting users, temporal patterns,    analysis, online social networks, and networked systems.




IEEE Network • September/October 2010                                                                                                                   5

More Related Content

PDF
S180304116124
PDF
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
PDF
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
DOCX
Spammer taxonomy using scientific approach
PDF
Cert Overview
PDF
Jf2516311637
PDF
Published Paper
PDF
Visually Exploring Social Participation in Encyclopedia of Life
S180304116124
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
Spammer taxonomy using scientific approach
Cert Overview
Jf2516311637
Published Paper
Visually Exploring Social Participation in Encyclopedia of Life

What's hot (19)

PDF
Summary of my Doctoral Research, Interests
PDF
Detecting fake news_with_weak_social_supervision
PPT
Overview Of Wcu Research (16 Dec2009)Sj
PPTX
How to utilize ‘big data’ on SNS for academic purpose?
PDF
Social Networks and Social Capital
PDF
2000-ACM SIGCHI-The social life of small graphical chat spaces
PDF
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
PDF
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
PDF
Overview of Social Networks
PPTX
Social Network Analysis power point presentation
PDF
An imperative focus on semantic
PPTX
Reality Mining
PPTX
Profiling User Interests on the Social Semantic Web
PPT
Digital Trails Dave King 1 5 10 Part 1 D3
PPT
Reality Mining (Nathan Eagle)
PDF
Categorize balanced dataset for troll detection
PDF
Cb4301449454
PPT
Research Paper On Correlation
PPTX
20111103 con tech2011-marc smith
Summary of my Doctoral Research, Interests
Detecting fake news_with_weak_social_supervision
Overview Of Wcu Research (16 Dec2009)Sj
How to utilize ‘big data’ on SNS for academic purpose?
Social Networks and Social Capital
2000-ACM SIGCHI-The social life of small graphical chat spaces
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Overview of Social Networks
Social Network Analysis power point presentation
An imperative focus on semantic
Reality Mining
Profiling User Interests on the Social Semantic Web
Digital Trails Dave King 1 5 10 Part 1 D3
Reality Mining (Nathan Eagle)
Categorize balanced dataset for troll detection
Cb4301449454
Research Paper On Correlation
20111103 con tech2011-marc smith
Ad

Viewers also liked (17)

PPT
Archeologie film
DOCX
Resume[1]
PDF
Resultados novel
PDF
20140604101544869 (1)
PDF
Sabedoria breve manual do usuário sammis reachers
PPTX
Initial ideas
PDF
Grace h
PPTX
Levantamiento de pesas
PPTX
Technisches Forum Sicherheit: Antwort auf Frage 94 - Nutzungskonflikte nach m...
PPTX
Cuadro comparativo 2 temas junior urbina el sambo
PPTX
4º Meritt CC - Economia Doméstica
PPTX
SENSE: Vorschlagsgenerierung bei freier Oberflächenkomposition
DOC
Study Visit
DOCX
Santosh gadia resume
DOCX
Ruta de consulta demanda de inconstitucionalidad 2
PPTX
lyyyyy
PDF
Publipoema
Archeologie film
Resume[1]
Resultados novel
20140604101544869 (1)
Sabedoria breve manual do usuário sammis reachers
Initial ideas
Grace h
Levantamiento de pesas
Technisches Forum Sicherheit: Antwort auf Frage 94 - Nutzungskonflikte nach m...
Cuadro comparativo 2 temas junior urbina el sambo
4º Meritt CC - Economia Doméstica
SENSE: Vorschlagsgenerierung bei freier Oberflächenkomposition
Study Visit
Santosh gadia resume
Ruta de consulta demanda de inconstitucionalidad 2
lyyyyy
Publipoema
Ad

Similar to Online social network (20)

PDF
Q046049397
PDF
Sampling of User Behavior Using Online Social Network
PDF
Network Structure For Social Network
PDF
Multimode network based efficient and scalable learning of collective behavior
PDF
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
PDF
Paper id 152013128
PDF
1999 ACM SIGCHI - Counting on Community in Cyberspace
PDF
Online social network mining current trends and research issues
PDF
2009-Social computing-Analyzing social media networks
PDF
Travel Recommendation Approach using Collaboration Filter in Social Networking
PPT
2010 Catalyst Conference - Trends in Social Network Analysis
PDF
2009-Social computing-First steps to netviz nirvana
PDF
D0351020025
PDF
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
PDF
Current trends of opinion mining and sentiment analysis in social networks
PDF
Content Based Message Filtering For OSNS Using Machine Learning Classifier
DOCX
Proposal.docx
PDF
E223539
DOCX
CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL...
PDF
Short Web 3 0 Yke 09 30 09
Q046049397
Sampling of User Behavior Using Online Social Network
Network Structure For Social Network
Multimode network based efficient and scalable learning of collective behavior
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
Paper id 152013128
1999 ACM SIGCHI - Counting on Community in Cyberspace
Online social network mining current trends and research issues
2009-Social computing-Analyzing social media networks
Travel Recommendation Approach using Collaboration Filter in Social Networking
2010 Catalyst Conference - Trends in Social Network Analysis
2009-Social computing-First steps to netviz nirvana
D0351020025
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Current trends of opinion mining and sentiment analysis in social networks
Content Based Message Filtering For OSNS Using Machine Learning Classifier
Proposal.docx
E223539
CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL...
Short Web 3 0 Yke 09 30 09

More from ingenioustech (20)

PDF
Supporting efficient and scalable multicasting
PDF
Monitoring service systems from
PDF
Locally consistent concept factorization for
PDF
Measurement and diagnosis of address
PDF
Impact of le arrivals and departures on buffer
PDF
Exploiting dynamic resource allocation for
PDF
Efficient computation of range aggregates
PDF
Dynamic measurement aware
PDF
Design and evaluation of a proxy cache for
PDF
Throughput optimization in
PDF
Privacy preserving
PDF
Phish market protocol
PDF
Peering equilibrium multi path routing
PDF
PDF
On the quality of service of crash recovery
PDF
Layered approach
PDF
It auditing to assure a secure cloud computing
PDF
Intrution detection
PDF
Bayesian classifiers programmed in sql
Supporting efficient and scalable multicasting
Monitoring service systems from
Locally consistent concept factorization for
Measurement and diagnosis of address
Impact of le arrivals and departures on buffer
Exploiting dynamic resource allocation for
Efficient computation of range aggregates
Dynamic measurement aware
Design and evaluation of a proxy cache for
Throughput optimization in
Privacy preserving
Phish market protocol
Peering equilibrium multi path routing
On the quality of service of crash recovery
Layered approach
It auditing to assure a secure cloud computing
Intrution detection
Bayesian classifiers programmed in sql

Recently uploaded (20)

PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
Everyday Spelling and Grammar by Kathi Wyldeck
PDF
Literature_Review_methods_ BRACU_MKT426 course material
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PDF
CRP102_SAGALASSOS_Final_Projects_2025.pdf
PDF
International_Financial_Reporting_Standa.pdf
PPTX
What’s under the hood: Parsing standardized learning content for AI
PPTX
Education and Perspectives of Education.pptx
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PDF
The TKT Course. Modules 1, 2, 3.for self study
PDF
My India Quiz Book_20210205121199924.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Everyday Spelling and Grammar by Kathi Wyldeck
Literature_Review_methods_ BRACU_MKT426 course material
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
Race Reva University – Shaping Future Leaders in Artificial Intelligence
CRP102_SAGALASSOS_Final_Projects_2025.pdf
International_Financial_Reporting_Standa.pdf
What’s under the hood: Parsing standardized learning content for AI
Education and Perspectives of Education.pptx
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Core Concepts of Personalized Learning and Virtual Learning Environments
AI-driven educational solutions for real-life interventions in the Philippine...
UNIT_2-__LIPIDS[1].pptx.................
The TKT Course. Modules 1, 2, 3.for self study
My India Quiz Book_20210205121199924.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Environmental Education MCQ BD2EE - Share Source.pdf

Online social network

  • 1. GUEST EDITORIAL Online Social Networks Michalis Faloutsos Thomas Karagiannis Sue Moon T he popularity and complexity of online social net- works (OSNs) continues to grow unabatedly with the most popular applications featuring hundreds of mil- lions of active users. Ranging from social communities and discussion groups, to recommendation engines, tagging sys- • User activity: What are the characteristics of user online time in popular OSNs? • Population of online services: How can we model, describe, and sample OSNs when they are dynamic and large, and obtaining a complete snapshot is often impos- tems, mobile social networks, games, and virtual worlds, sible? OSN applications have not only shifted the focus of appli- • Profile characterization: How do people use OSNs, can cation developers to the human factor, but have also trans- we reverse engineer behavior, and can we identify pro- formed traditional application paradigms such as the way files based, say, on gender? users communicate and navigate in the Internet. Indeed, In the first article of this issue, Yang et al. explore the understanding user behavior is now an integral part of problem of modeling human mobility by exploiting under- online services and applications, with system and algorithm lying social norms. The authors’ key insight is that individu- design becoming in effect user-centric. As expected, this al people’s movements depend on their social interactions; paradigm shift has not left the research community unaf- as a result, the social network consists of overlapping com- fected, triggering intense research interest in the analysis of munities. However, instead of forming or detecting com- the structure and properties of online communities. munities in generated graphs, the authors propose a While the first phase of OSN research heavily focused bottom-up approach by first forming individual communi- on characterizing the properties of the social graph, cur- ties, and then establishing their overlapping structure. By rently, the research community has shown an increased comparing the proposed model with real traces of human interest in how basic properties of social network theory mobility, the authors show that their model can approxi- can 1) explain observed online human behavior and 2) be mate properties such as the inter-contact time or degree exploited to drive the design of algorithms and large-scale distributions, arguing that social structures play a signifi- distributed systems. Indeed, this second phase of OSN cant role in human mobility. research is also reflected in the current special issue of The potential of exploiting large-scale OSN services for IEEE Network. The special issue features an ensemble of malicious activities is the subject of the article by Makri- interesting articles demonstrating the breadth and variety dakis et al. The authors show how the widespread growth of of OSN applications, such as location-based social network such services, the underlying trust they establish among services, security and privacy of OSNs, and human mobility users, and their “open platform” architecture are the ideal models based on social network theory. properties for turning OSNs into new vectors of attack. In particular, this special issue attempts to provide insights The authors expose the feasibility of converting Facebook with respect to the following questions: applications to denial of service platforms, demonstrate • Human mobility: Could social network theory explain how to retrieve remote files from a user’s machine, and properties of human mobility, and, if so, which of these expose potential leakage of private information despite the properties can be replicated in the proposed models? relevant privacy settings. Overall, the article provides sim- • Security: Following the abuse of email and websites, can ple proof-of-concept examples of misuses in popular OSNs, OSNs be used as a new vector of attack to propagate and stresses the importance of advanced protection mecha- malware and compromise user machines? nisms tailored to these services. • Privacy: How do users perceive their privacy in location- The article by Li et al. further explores how users per- based social network services? ceive privacy but in a different context. Specifically, shar- 4 IEEE Network • September/October 2010
  • 2. GUEST EDITORIAL ing location information is an important feature of OSNs and blog content. The study highlights how commercial that is gaining increasing attention among OSN users. profiles, whose particular aim is to attract users, feature Location-based OSNs, or “LSNs,” as referred to by the unique properties from those of individual user profiles. authors, are explored in the third article of this special Concluding this editorial, we would like to thank the issue. The article provides a brief description of some pop- Editor-in-Chief, Tom Chen, for his valuable support and ular services in the space, summarizes their features, and guidance throughout this special issue. We are also grateful examines how private information might be exposed in to all the reviewers whose efforts and comments made this such services. The authors study how privacy concerns special issue possible. depend on different users groups, user ages, access meth- ods, or geographical regions. Biographies The characterization of user online activity in several MICHALIS FALOUTSOS ([email protected]) is a faculty member in the Computer popular OSNs is the subject of a study by Gyarmati et al. Science Department at the University of California, Riverside. He got his Bache- The study uses PlanetLab as a measurement infrastructure lor’s degree from the National Technical University of Athens, and his M.Sc and Ph.D. from the University of Toronto. His interests include Internet protocols and mea- monitoring thousands of user profiles for BeBo, MySpace, surements, network security, and routing in ad hoc networks. With his two Netlog, and Tagged. The article characterizes access pat- brothers, he co-authored the paper “On Power Laws of the Internet Topology” terns of users in these OSNs, covering aspects related to (SIGCOMM’99), which received the “Test of Time” award from ACM SIG- COMM. His work has been supported by several NSF and DAPRA grants, the user online time, duration of user sessions, and user including the prestigious NSF CAREER award with a cumulative of more than $5 activity time. The authors perform a statistical analysis of million in grants. He has been authoring the popular column “You Must Be Jok- ing...” in ACM SIGCOMM Computer Communication Review , which reaches the distributions of specific properties, and expose the fact 9000 downloads. He is the co-founder of stopthehacker.com, a web security that attracting the interest of users who have recently startup. joined an OSN may not be trivial. THOMAS KARAGIANNIS ([email protected]) is a researcher with the Systems The fraction of active and “non-active” users and the and Networking group of Microsoft Research Cambridge, United Kingdom. He size of OSNs is under study also in the article by Rejaie et received his Ph.D. in computer science from the University of California, River- al. The authors devise strategies to estimate the number of side and his B.S from the Applied Informatics Department of the University of Macedonia, Thessaloniki, Greece. Before joining Microsoft, he was with Intel Research users for MySpace and Twitter by exploiting information and the Cooperative Association for Internet Data Analysis (CAIDA). He has about the allocation of numeric user IDs. By inferring this served as a chair and steering committee member for the Workshop on Online Social Networks (WOSN), and as a TPC member for several conferences such as SIG- allocation strategy, the authors can estimate the total popu- COMM, IMC, and INFOCOM. His research interests include Internet measure- lation of users at the time a user joined. The authors fur- ments and modeling, analysis and characterization of the traffic of Internet applications, ther present information regarding the number of deleted and peer-to-peer and social networks. accounts and their corresponding lifespans. Overall, the SUE MOON ([email protected]) received her B.S. and M.S. from Seoul National study reports that the active population of these OSNs is an University, Korea, in 1988 and 1990, respectively, both in computer engineer- order of magnitude smaller than their reported population ing. She received a Ph.D. degree in computer science from the University of Massachusetts at Amherst in 2000. From 1999 to 2003 she worked in the sizes. IPMON project at Sprint ATL, Burlingame, California. In August 2003 she Finally, Gauvin et al. study how user profile characteris- joined KAIST and now teaches in Daejeon, Korea. She has served as TPC co- chair for ACM Multimedia and ACM SIGCOMM MobiArch Workshop, general tics depend on user gender in MySpace. The authors chair for PAM, and TPC for many conferences, including SIGCOMM 2010, explore several properties such as the effect of user age, NSDI 2008 and 2010, WWW 2007–2008, INFOCOM 2004–2006, and IMC the correlation between the number of friends and number 2009. She won the best paper award at ACM SIGCOMM Internet Measurement Conference 2007 and was awarded the Amore Pacific Woman Scientist Award of publishers (e.g., friends that publish on a user’s wall), in 2009. Her research interests are: network performance measurement and age similarity between interacting users, temporal patterns, analysis, online social networks, and networked systems. IEEE Network • September/October 2010 5