Escolar Documentos
Profissional Documentos
Cultura Documentos
Computer Communications
journal homepage: www.elsevier.com/locate/comcom
a r t i c l e i n f o a b s t r a c t
Article history: In cyber-physical convergence scenarios information ows seamlessly between the physical and the cy-
Received 29 July 2015 ber worlds. Here, users mobile devices represent a natural bridge through which users process acquired
Revised 21 September 2015
information and perform actions. The sheer amount of data available in this context calls for novel, au-
Accepted 22 September 2015
tonomous and lightweight data-ltering solutions, where only relevant information is nally presented
Available online 29 December 2015
to users. Moreover, in many real-world scenarios data is not categorised in predened topics, but it
Keywords: is generally accompanied by semantic descriptions possibly describing users interests. In these com-
Opportunistic networks plex conditions, user devices should autonomously become aware not only of the existence of data in
Cognitive heuristics the network, but also of their semantic descriptions and correlations between them. To tackle these is-
Associative semantic network sues, we present a set of algorithms for knowledge and data dissemination in opportunistic networks,
Data dissemination based on simple and very effective models (called cognitive heuristics) coming from cognitive sciences.
Knowledge dissemination
We show how to exploit them to disseminate both semantic data and the corresponding data items.
We provide a thorough performance analysis, under various different conditions comparing our results
against non-cognitive solutions. Simulation results demonstrate the superior performance of our solution
towards a more effective semantic knowledge acquisition and representation, and a more tailored content
acquisition.
2015 Elsevier B.V. All rights reserved.
http://dx.doi.org/10.1016/j.comcom.2015.09.027
0140-3664/ 2015 Elsevier B.V. All rights reserved.
M. Mordacchini et al. / Computer Communications 81 (2016) 1230 13
of analytical models of data delivery performance [1113], routing the joint dissemination of semantic information and associated
approaches that consider nodes aggregation and privacy [14,15], contents.
forwarding schemes for hybrid networks (opportunistic networks In order to take advantage of these models, we have to face
combined with the infrastructure [16]), real world implementa- the problem of how to represent semantic information in devices
tions [17], applications to Vehicular Networks [18,19]. Recently, op- memory, how semantic information is retrieved and exchanged
portunistic networks have been proposed as one of the possible upon contacts between nodes in physical proximity, and how con-
key components of future mobile networks (e.g., in the 5G do- tent is nally selected for dissemination, based on the semantic
main), as they are able to complement wireless infrastructures data exchange that has been carried on. For each node, the internal
such as cellular and WiFi networks, by enabling direct dissemina- memory representation of semantic concepts is inspired by the as-
tion of data among users nearby, thus contributing to ooad data sociative network models (AN) [26,27] of human memory coming
from the cellular network [20,21]. the from cognitive psychology eld. In AN models, semantic con-
Generally, in analysing data dissemination in opportunistic net- cepts are represented by nodes that are interconnected by paths
works it is assumed that the users interest is rather static and that vary in strength, reecting the degree of association between
quite simple to describe [22]. In typical data dissemination ap- each pair of concepts. In our proposal, each mobile node builds
proaches, users are supposed to be interested in predened con- a local semantic representation of its own contents through a se-
tent categories (e.g., sports, movies, etc.) and therefore their de- mantic directed weighted graph, where vertices represent the se-
vices collect all the contents related to those categories. An aspect mantic concepts associated to data items, and the edges represent
that has not been often taken into consideration in the literature the semantic relationships between concepts, both learnt from the
on opportunistic networks is that contents are also equipped with environment and derived from the nodes own contents. Moreover,
rich semantic descriptions (i.e. associated concepts and/or tags). since memory is a limited resource at each node, cognitive models
This could be the case, for instance, of tagged photos on Flickr of how the least relevant information can be dropped from mem-
and Instagram, or messages annotated with hashtags in Twitter ory [28,29] are exploited. When nodes come in physical proximity
and Facebook. Often, users interests toward contents are driven by (are in contact), exchange of semantic information happens as fol-
the content descriptions, which triggers interest in contents them- lows. Communication takes place only between nodes having some
selves: data items1 are accessed by users because their semantic common interest, i.e. only if there is an initial set of semantic con-
description contains information that is relevant to the user at that cepts shared by both nodes. Concepts to be exchanged are selected
moment. Therefore, our key idea in this paper is to optimise in an by navigating each semantic network, according to an edge ranking
intertwined way the dissemination of both semantic data associ- algorithm derived from the uency cognitive heuristic (FH) [30,31].
ated to contents, and of contents themselves. Specically, in the Finally, we show how mobile nodes, after having enriched their se-
proposed approach semantic data is disseminated among users mantic graphs with new concepts taken from other encountered
devices, based on the current interests of the users. By receiving nodes, select which contents, locally available at one of the nodes,
semantic data, users devices also know what contents (associated to exchange between them, giving precedence to contents whose
to that semantic data) are available in the network, and fetch them, semantic information maximally overlaps with semantic concepts
if appropriate. Therefore, in our approach users (dynamic) inter- just exchanged between nodes. In cognitive terms this refers to
ests drive the dissemination of semantic data, which drives the the tallying heuristic (TH) [32], another cognitive decision strategy
dissemination of content. As we explain in Section 3, this mech- used by human brain. All these cognitive processes are described
anism is quite similar to the way users access information in the in more details in Section 3.
physical world. The rest of the paper is organised as follows. In Section 2 we
Specically, in this paper we apply concepts coming from the present state-of-the-art data dissemination approaches for oppor-
cognitive science eld, and design a system whereby users de- tunistic networks. In Section 3 we show at a high level how each
vices autonomously become aware of the structure of the seman- cognitive model relates to our solution. In Section 4 we present
tic information describing the available content in the environ- the entire approach in full detail. In Section 5 a thorough perfor-
ment, and disseminate contents based on this knowledge. In par- mance analysis of our cognitive based system is provided and, -
ticular, we show how devices can exchange information in a way nally, Section 6 concludes the paper.
that resembles how conversations between humans enable spread-
ing of ideas (i.e. semantic information), which generates interests 2. Related data dissemination approaches
for specic types of content, and ultimately determine content
that people access. To this end, we consider that, acting on be- The problem of data dissemination in opportunistic networks
half of their users inside the cyber world, mobile devices are ex- have been addressed by many works during years. The rst at-
posed to problems similar to the ones faced by the human brain tempt was in the context of the PodNet Project [33]. The au-
when dealing with the information and content selection tasks. thors proposed a solution where nodes cooperatively exchange
Cognitive scientists produced, during years, many functional mod- data items in order to retrieve all those contents they are inter-
els and descriptions of these mental schemes. These functional ested in. Precisely, contents are organised in predetermined chan-
models, called cognitive heuristics, differently from other biologi- nels of interest to which nodes are subscribed. In order to favour
cal models as articial neural networks, do not aim at reproduc- the data dissemination, upon encounter, nodes load in a pub-
ing the physiology of the brains processes, but model their func- lic cache items they are not directly interested in. Items to be
tionality. By taking advantage of these descriptions, previous works maintained in the public cache are chosen depending on different
[2325] have shown how rules and procedures used by the human history-based strategies that consider the past received requests,
brain, when assessing the relevance of information (in face of time interpreted by nodes as a popularity index of the channel of in-
and resource restrictions), can be exploited to design adaptive, low terest. These strategies could be effective when users mobility is
resource-demanding, yet very effective, algorithms for data dis- homogeneous and contents can easily traverse the network. How-
semination in opportunistic networks but none to the best of our ever, this approach suffers in scenarios where nodes tend to group
knowledge has explored how to apply these models to optimise in communities and their movements are heterogeneous.
Advances in data dissemination solutions leave the content-
centric approach adopted in PodNet in favour of more user-
1
In the paper we use the terms content and data item interchangeably. centric solutions. Precisely, these solutions dene more elaborate
14 M. Mordacchini et al. / Computer Communications 81 (2016) 1230
heuristics that exploit social information about users e.g. users be further replicated in order to satisfy all the interested users.
interests and social relationships in order to improve the per- This work proves the suitability and effectiveness of these heuris-
formance of data dissemination. ContentPlace [34] is a social tics in problems, like data dissemination in opportunistic networks,
aware dissemination system that proposes a general framework where every node has only a partial knowledge about its environ-
for designing data dissemination policies. In ContentPlace, during ment. However, due to the great number of status information the
a contact nodes ll their local caches (with contents they either nodes have to maintain, this approach may suffer from scalability
already have or they fetch from the other node) to maximise both problems. In [24] an improved solution addressed those scalabil-
the local utility (i.e. satisfy the interests of the local user) and ity problems. Nodes exploit, beyond cognitive heuristics, (i) a lo-
the global utility (i.e. satisfy the interests of other nodes in the cal aggregate measure about items diffusion and (ii) a stochastic
local users communities). In [35] authors propose a social-aware mechanism to choose which data items should be replicated. The
solution to nd the optimal placement of a given piece of content resulting solution shows to be more ecient and scalable than the
in an opportunistic network. The idea is to iteratively migrate previous one and, thanks to the stochastic decision making mech-
contents to nodes that are increasingly central to the overall anism, independent of specic scenario congurations.
network, i.e. nodes such that the average cost of accessing the Another different but connected solution presented in the lit-
content from any other interested node is increasingly lower. erature takes into account the semantic side of data shared in
Social-aware data dissemination generally results in a quicker and an opportunistic network [42]. Precisely, starting from semantic
more fair content dissemination with respect to social-oblivious data annotations given by the users, each node builds a seman-
policies. The overhead introduced for collecting and managing the tic network representing that information. Upon contacts, nodes
information needed by these algorithms (e.g., contact patterns, so- exchange useful information present in their semantic networks
cial structures, etc.) typically pays off as content can be replicated which is thus disseminated in the entire network. That work repre-
less aggressively (and more precisely), and the total network trac sents the rst attempt to exchange semantic information exploiting
typically turns out to be lower than in social-oblivious schemes. cognitive mechanisms in opportunistic networks.
Other works apply the publish/subscribe framework a In this paper (which extends our previous work [43]) the ideas
content-centric overlay initially conceived to run on top of static of [42] are exploited to design a more complete cognitive-based
networks [36] to opportunistic networks, by adapting the con- solution for both knowledge (semantic information) and content
ventional denitions of publisher, subscriber and broker. Accord- dissemination. The main extensions with respect to [43] include
ingly, in [37] the authors presented a pub/sub social-based and a more detailed description of all the cognitive models and con-
topic-based data dissemination solution. Brokers are the most cen- cepts exploited in this proposal, a more thorough presentation of
tral (i.e. popular) nodes in the community and communities are the algorithms developed from the cognitive science models, and a
identied through an on-line community detection algorithm. New more extensive set of simulation results. These results analyse the
data items to be diffused are sent to the broker of the community. performance of the system from both the semantic knowledge and
If some node is subscribed to that topic within the community, the the content dissemination points of view, using different metrics
item is broadcast. Moreover, the item is also sent to other brokers and under different settings of the main parameters of the sys-
if their community members are subscribed to that topic. tem. Moreover, we compared the proposed solution with another
Other approaches take in account information about patterns of algorithm for semantic and content dissemination that is not based
encounters. In SocialCast [38] nodes disseminate the information on cognitive models. We nd that the proposed solution is much
about their channels of interest. Every node uses this information more ecient in retrieving and keeping in memory the most rele-
combined with its own pattern of encounters to compute a utility vant semantic information and it acquires the relevant content as-
value for each channel of interest. This value is then used to de- sociated with this information more rapidly than the benchmark
cide if the next encountered node would be a good carrier for a solution.
given data item. In PrefCast [39] authors assume that the utility of We point out that part of the semantic-driven exchange of
disseminating the same content varies with time. Considering lim- information process described in this paper is also used in [44].
ited contacts durations, nodes compute a forwarding schedule to Specically, in [44] cognitive-based methods are used to exchange
prioritise dissemination of contents that are predicted to be more semantic information, in order to let mobile nodes become aware
requested in the near future. of the features that describe the physical locations in the envi-
Other approaches for data dissemination consider solutions ronment around them. Semantic data is generated by the physical
based on global utility functions to be solved as a global optimi- locations and it is spread by both physical locations and mobile
sation problem, where nodes individual caches are viewed as a devices. With respect to that work, in this paper we exploit the
big, cumulative caching space. Reich and Chaintreau [40], for ex- opportunistic semantic knowledge dissemination mechanism for
ample, focus on the problem of nding a global optimal alloca- different purposes and under different conditions. Specically, in
tion for a set of content items assuming that users are impatient, this work we use a semantic exchange of information in a pure
i.e., users interest for items monotonically decreases with time. opportunistic network, i.e. contacts between mobile devices are
Although such global optimisation approach can nd the optimal the only way to exchange and disseminate information. Content is
policy and lead to an optimal content allocation, it requires global generated and spread only by the devices. These facts determine
knowledge of the network and a-priori information on how users a different behaviour of the two systems and require changes
behave, that in practice, might be unlikely to be available in an between the two solutions, specically in the denition of the key
opportunistic scenario. algorithms of the proposed approach (see Section 4.3). Moreover,
The use of cognitive heuristics to drive the dissemination pro- in this paper we do not propose a simple semantic data dissem-
cess has been rst proposed in [23]. The idea is to drive the ination scheme. Rather, semantic information is used to drive the
dissemination process using procedures that mimic, in functional spreading of the data items from which the semantic descriptions
terms, the human decision making process. To this end, two of are taken. In order to achieve this goal, other mechanisms are
the several cognitive models present in the psychological litera- needed in addition to the semantic dissemination scheme. To this
ture are considered [41]: the Recognition Heuristic and the Take the end, we propose to exploit another lightweight, context-aware,
Best Heuristic. Precisely, nodes use the Recognition heuristic to be- cognitive-based process for the dissemination of data items,
come aware of which are the most popular channels of interest in which is driven by the dissemination of the associated semantic
the system and what are the corresponding contents that should data.
M. Mordacchini et al. / Computer Communications 81 (2016) 1230 15
Mem. Strength
proach. Namely we provide a direct mapping between the aspects
of memory representation, concept retrieval and content selection, 0.6
and the cognitive models we exploit to dene the building blocks
of our approach. 0.4
The rst aspect of our solution concerns the representation and 0.0
organisation of the semantic information about content in nodes 0 2 4 6 8
memory. The organisation of the semantic information is a very
t
common task that the human memory solves very well. Thus, we
Fig. 2. Human memory strengthening process according to the H. Ebbinghaus
used one of the memory models present in the cognitive science model.
eld. Recently, two categories of models are signicantly well es-
tablished in the literature, namely, the Associative Network Models
and the Connectionist Models [26,27]. 3.1.1. Memory retention
In Associative Network Models, concepts are represented by In order to be more compliant with human memory models the
nodes that are interconnected by pathways that vary in strength, Associative Semantic Networks we used are dynamic. This means
reecting the degree of association between each pair of concepts. that the structure of the ASN can change over time depending on
Two related concepts are connected by links, whose weight repre- its use. In fact, like in human memory, an information that is not
sents the activation level, i.e. how likely it is that one of them is accessed for some time fades in our memory. Conversely, the more
accessed after the other has been accessed. The details of how we access the same information the stronger it remains in mem-
these weights are computed are provided in Section 4.1. ory. The process of forgetting useless information from memory,
Connectionist Models represent an alternative to Associative Net- rather than a limit, aids the brain in improving the effectiveness
work Models. These models treat the problem of mental repre- of some human cognitive processes [30] by letting them keep and
sentation as weighted combination of xed set of features [45]. consider only relevant information. In particular, we model the for-
Though the Connectionist models share some terminology and getting process in our system by a forgetting function that is sim-
ideas with the Associative Network Models, they follow a very dif- ilar to an experimental forgetting curve early obtained by Ebbing-
ferent metaphor. Precisely, they consider the memory as a large haus in 1885 [29] and described by numerous subsequent studies
network of feature units (nodes) that share activation through [28]. This curve models the human forgetting process as an expo-
weighted connections (pathways). Therefore, in these kind of net- nential decline of individual human memory retention over time,
works, concepts representation are distributed across the entire where the rate of forgetting is determined by the repetition rate
network and this generates a process that is very similar to what of information (i.e. by the process through which that information
happens in biological neural networks. Indeed, the activation of is accessed in the brain). Fig. 2 shows an example of this type of
units is affected by the weights of the incoming links that can curve. The slope of the forgetting curve slows down more gradu-
be either positive or negative. Such models are more sophisticated ally whenever a stored information is accessed or observed more
than the associative network models described before, but they are frequently. Thus, we can assume that unused information is eas-
also more complex, i.e. in order to converge to a good representa- ily forgotten as time passes, while frequently accessed informa-
tion of concepts they must be trained and the training process is tion becomes harder to forget. In the case of Associative Semantic
typically very slow. Networks this mechanism affects the strength of edges linking se-
In our work we use Associative Network Models and precisely mantic concepts, determining, as a consequence, the evolution of
Associative Semantic Networks due to their simplicity and usabil- the ASNs structure. Further details on how we implemented this
ity. In our solution nodes of the ASN represent semantic concepts model in our system will be given in Section 4.
describing the content in the system. Nodes relations are repre-
3.2. Concept retrieval
sented by weighted edges. In Fig. 1 an example of Associative Se-
mantic Network is reported.
The second aspect is about the way the semantic information
(knowledge) circulates in the network. Here also, we exploit mech-
anisms coming from the cognitive science eld and resembling the
process of information exchange between people during a conver-
sation. We model information exchange when nodes encounter as
a conversation between two individuals who meet. We assume
that the conversation begins from concepts that people have in
common i.e. concepts present in all participants semantic net-
works and that the exchange of semantic concepts consists in the
exploration/navigation of the reciprocal semantic networks. There
are two principal ways to explore an Associative Semantic Net-
work: sequentially or in parallel, which broadly corresponds to
depth-rst and breadth-rst navigation in standard graph theory,
respectively [46]. Parallel processing is particularly appropriate to
model the spontaneous activation of knowledge that occurs in ab-
sence of a particular goal. Sequential search, instead, well charac-
terises a goal-directed search of memory in pursuit of a specied
Fig. 1. Example of associative semantic network. objective. A sequential search (SS) on AN starts with an activated
16 M. Mordacchini et al. / Computer Communications 81 (2016) 1230
a vertex each time it is included in K (lines 57 of Algorithm 1). network computation ends and the resulting graph is passed to
Then, the computation of the contributed network can start from the recipient node. This peer merges the contributed network to
the set of key vertices. These vertices are rst ordered according its own network (i.e. the recipient network) by simply adding all
to their relevance in memory. Relevance is computed for each key the missing vertices and edges. This process corresponds to an
vertex by summing up the weights of its incoming edges, taken as enrichment of the semantic knowledge of the recipient peer in
a measure of the total importance (or relevance) of that concept terms of both concepts (i.e. vertices) and relationships between
in the nodes semantic network (line 8 of Algorithm 1). Taking the them (i.e. edges). All the edges received from the donor network
key vertices (sorted by relevance) one at a time, edges and vertices (either new or already present in the recipient network) set
are visited and passed from the donor network to the contributed their weights in memory to 1, since they are activated by the
network using Algorithm 2, that is based on uency. In this algo- conversation.
rithm, the uency heuristic is applied to evaluate whether to follow
an edge eij or not. Fluency is a cognitive decision-making strategy 4.4. Semantic content dissemination
that favours recognized objects (i.e. objects seen more than a given
amount of times, see Section 3.2) against unrecognized items. It The previous selection of the most relevant semantic concepts,
assumes that the former are more relevant than the latter ones, in with respect to the current interaction, drives the next step in the
the information selection task. Hence, we start by excluding all un- data exchange process: the selection of relevant data items to ex-
recognized edges, i.e. the edges whose popularity is below a recog- change. In order to carry out this operation, we exploit another
nition threshold rec (line 5 of Algorithm 2). simple decision rule derived from the cognitive science eld: the
Acting only over recognized items, uency makes a subsequent tallying heuristic. For this step, we refer to the pseudo-code given
discrimination based on the perceived speed of retrieval from in Algorithm 3. The rationale to select data items to exchange is
memory. In order to replicate this fact in our system, we consider based on the match between their tags and the concepts that have
that the following facts affect the ease of retrieval, and, thus, the been exchanged between the semantic networks. Intuitively, we
relevance, of semantic concepts during an interaction: exchange data items that have as many tags as possible within
the set of concepts used in the discussion between the nodes.
the highest the recall value of an edge (i.e. it is more easy to The tallying heuristic models exactly this behaviour. Given a set
recall it), the most relevant the edge is; of cues of cardinality m (which in our case is the set of tags ex-
the relevance of an edge decreases as long as we get farther changed during the contact as explained in Section 4.3), data items
from a key vertex, i.e. it is more dicult to recall it, given the are ranked based on the number of favourable cues they possess.
actual topics of discussion (the key vertices); Therefore, we rank data items for possible exchange based of the
anyway, the longer the contact time between two nodes (i.e. cardinality of the intersection between the cues and the tags asso-
the longer the discussion is), the more time is available to nav- ciated to them (lines 57).
igate the donor network and include edges and vertices in the We also consider that the other party sends to the node the list
contributed network, i.e. more concepts can be recalled with of the IDs of the items it already owns. Thus, those data items can
longer discussions. be directly pruned out from the selection process (line 4). More-
over, like for the exchange of semantic concepts, we assume that
In order to take all these observations into account, we com-
there is a maximum number of exchangeable data items data_limit.
pute, for each outgoing edge eij of a vertex vi , a retrieval weight
Thus, once the data items have been ranked according to tallying,
quantity. This quantity is computed for an interaction that starts at
the rst data_limit ones are selected to be passed to the other in-
a time t and ends at time t . It is dened as:
teracting peer (lines 8 and 9).
1 e (t t )
Note that the chosen cues used by our version of tallying are
w(ei j , n, t t ) = f (ei j , t ) (2) regarded as relevant since they derive from a previous decision-
n
making cognitive process that is pertinent with the actual contact.
where f(eij , t ) is the memory strength value of eij at time t , n is Moreover, the number and identity of these cues vary from one
the number of hops in the shortest path to the nearest key ver- encounter to the other, reecting the peculiarity of each separate
tex and is a speed factor that regulates the dependency of meeting and the changes made by previously experienced contacts
the weight on the communication duration (t t ). The retrieval in the environment.
weight is taken here as a surrogate of the speed of retrieval needed An example of the tallying heuristic applied to the data items
by the uency heuristic, since it favours the edges with higher selection problem is shown in Fig. 5. In this gure, we have two
strength in memory and that are more well-connected to the key data items (two pictures) along with their own semantic descrip-
vertices. tions and an already computed contributed network. Since the car-
Given a vertex vi , its outgoing edges are sorted with respect to dinality of the intersection of the semantic description of the rst
their retrieval weight value (line 6). Taking them one at a time in picture is greater than that of the second picture (2 vs. 1), the rst
descending order, we include the selected edge in the contributed picture is selected for being exchanged.
network and continue the donor network exploration from this
connection3 (lines 613 of Algorithm 2). All the edges whose re-
trieval value is below a threshold min are not considered (line 7 of Algorithm 3 Tallying algorithm.
Algorithm 2). Note that the strength in memory of selected edges
1: Let V be the nodes of the contributed network;
is set to the maximum, since inclusion in the exchanged data cor-
2: Let I be the set of data items of the node
responds to an activation in memory of those connections.
3: Let J be the data items owned by the other peer
Whenever the number of vertices added to the contributed
4: Let I = I J
network has reached the limit of tags that can be exchanged
5: for each i I do
during the contact, i.e. |V | =tag_limit, or no other paths (i.e.
6: Let tal l (i ) = |semanticDesc (i ) V |
edges) can be selected from the donor network, the contributed
7: end for
8: Rank I in descending order according to the tall values
3
9: Send the rst data_limit items of I to the other node
This corresponds to a depth rst visit, as discussed in Section 3.1.
M. Mordacchini et al. / Computer Communications 81 (2016) 1230 19
Fig. 5. Example of tallying heuristic applied to the semantic content exchange process.
a
b
Fig. 6. Initial knowledge graphs (namely G1 (a) and G2 (b)) dened as the union of all nodes semantic networks at the beginning of the simulation for dataset D1 (a) and
D2 (b).
Table 2 KD in Eq. (3) measures the average (over all nodes) percentage
Properties of graphs build on datasets D1 and
of the entire knowledge that is available at nodes at the end of the
D2.
simulations. Reaching a KD in the range of 100% would mean that
Property G1 G2 all semantic data reach all nodes. Given the structure of the initial
N. of vertexes 221 1302
overall semantic network and the knowledge acquisition process
N. of edges 455 8845 we dont expect to reach 100% for this index. Precisely, in our sys-
Diameter 4 8 tem, users acquire only the information semantically correlated to
their knowledge, while throwing out less relevant concepts. This
triggers a ltering process that generally prevents users from col-
Table 3
List of notations and denitions used in this paper. lecting all the existing concepts in the environment.
We also dene a second measure, the coverage, as the fraction
Symbol Meaning
of items owned by a node over all the items that contain a tag
N Set of nodes in the scenario matching one of the concepts in its semantic network This index
Kn Semantic network of the node n is dened in Eq. (4). Precisely, for a given node n and a given tag
Vn Set of vertexes (tags) in the semantic network K of node n v in its SN we calculate the ratio between the number of contents
Cn Set of contents owned by the node n
owned by the node having v in their semantic description, over the
Tc Set of tags of the content c Cn for the node n
number of all contents in the system whose semantic description
G = nN Kn Graph of complete knowledge (e.g. G1 or G2)
VG Set of vertexes of graph G contains v (part B of (4)). Then we average over all the tags in the
D Set of all contents in the system nodes SN and over all nodes in the system (part A of (4)).
Dv Set of all contents in the system tagged with the tag v VG
A B
1 1 1
CV G = vTc (4)
available pictures, and evolve over time based on the diffusion of
|N | |Vn | |Dv |
nN vVn cCn
tags due to the algorithms presented in Section 4. For this index an ideal dissemination system would reach 100%,
as this means that users receive all the data items related to con-
5.1.3. Performance evaluation indexes cepts they have in their semantic network.
We observed and studied the evolution of the knowledge and Finally, in order to evaluate the accuracy of the semantic infor-
content acquisition processes generated by the interactions be- mation acquired with respect to the contents retrieved, we used
tween users. We dened two indexes to measure the knowledge the F-measure. It is made of two indexes called precision and recall
and content dissemination performance, respectively. Moreover, we denoted by p and r, respectively. In our setup the precision index
used the F-measure [49], a commonly used metric in the eld of (between 0 and 1) measures how appropriate are the contents re-
information retrieval, to evaluate the relation in terms of accuracy trieved by a node with respect to its semantic network. For a given
between the knowledge acquired and the contents retrieved by node n the precision is dened as follows:
nodes, during the simulation (a more formal denition of the F- | cCn Tc Vn |
pn = (5)
measure is provided in Eq. (7)). In Table 3 we provide the notation | cCn Tc |
we use to dene the above mentioned indexes.
We measure the Knowledge Dissemination (KD) by computing The recall index (between 0 and 1) measures how appropriate
how much of the starting global knowledge reaches nodes at the is the nodes semantic network with respect to the contents it has
end of the simulation. The KD index is dened in Eq. (3). collected during the simulation. For a given node n the recall is
dened as follows:
1 |Vn | | cCn Tc Vn |
KD = (3) rn = (6)
|N | |VG |
nN |Vn |
M. Mordacchini et al. / Computer Communications 81 (2016) 1230 21
In our context, precision equal to 1 means that there are no the last usage of an edge in an exchange. The longer this time,
tags associated to content on node n that are not in its semantic the lower the relevance of that edge in a nodes memory. There-
network (or, in other words, that all retrieved content are asso- fore, it is more dicult to remember that edge (i.e., include it in
ciated to tags known by the node). Recall equal to 1 means that exchanges) and it becomes more likely to forget about it. In the
for each tag in the semantic network there is at least one retrieved rest of this section, a notation like fmin = 50s means that the forget
content associated to that tag. The F-measure for a single node n is threshold min is set in such a way that edges with popularity 1
dened as: are dropped from a SN in case they are not seen before 50s from
pn rn the last time they were used in an exchange. Using this notation,
Fn = 2 (7)
pn + rn we have that the higher fmin , the longer an edge is retained in the
Finally, we considered the average F-measure over all nodes: SN. On the other hand, a notation like Wmin = 25s means that the
retrieval value threshold min is computed taking into account, as
1
F= Fn (8) a reference case, an interaction between nodes of 2s, that allows
|N | nN nodes to include (warm up) at least edges at distance 1 from a
Note that Fn is between 0 and 1, and if it is higher the more re- key concept if they are not used (i.e. they were subject to the for-
call and precision are both high and close to each other. Therefore get process) from no more than 25s. The higher Wmin , the higher
it measures how good a retrieval system is from both the precision the number of edges that are warmed up, and, as a consequence,
and recall standpoints. the higher the number of vertices that could be included in a con-
tributed network.
5.1.4. Benchmark algorithm description
To best of our knowledge, there are no other solutions in lit- 5.2. Overview on the key ndings
erature taking into account the problem of disseminating both se-
mantic knowledge and contents in opportunistic networks. There- For the sake of presentation clarity, in this section we sum-
fore, we dened an alternative dissemination algorithm that shares marise and anticipate the key ndings we draw from our exper-
the general characteristics of our approach the semantic knowl- imental results, providing, for each one, the pointer to the section
edge is organised in semantic networks, and nodes exchange both where it is presented and explained in more detail. We found that
semantic information and contents but the rules according to using cognitive-based algorithms to represent dynamically varying
which nodes exchange semantic information and contents are users interests, that in turn drives the dissemination of available
driven by a pure random process. data, has multiple advantages over a benchmark solution that is
Regarding the exchange of semantic knowledge, as in the cogni- not based on human cognitive models. Specically:
tive approach, nodes populate the respective contributed networks Nodes in the network are able to recognise and select the most
from a vertex they have in common but, differently from the cog- relevant information available in the environment; moreover
nitive approach, they continue appending semantic concepts to the the representation of the semantic information collected from
contributed network by navigating their semantic network accord- the environment is very stable , i.e. the most relevant informa-
ing to a random walk. Namely, the next vertex to be appended to tion last in the nodes memory for long time, thanks for rein-
the contributed network is selected with probability 1/k where k forcement from frequent accesses. See Section 5.3;
is the out degree of the current vertex of the nodes semantic net- The Knowledge Dissemination triggered by our cognitive ap-
work. The selection of the contents to be exchanged with the other proach drives a more ecient content dissemination with re-
peer is random, as well. Each node uniformly selects data_limit spect to the benchmark. See Section 5.3.4;
contents choosing between those having at least one tag (in their The internal structure of the local semantic information col-
semantic description) in common with the contributed network. lected by nodes is representative of the entire semantic infor-
By comparing our cognitive approach with this benchmark, we mation present in the environment, i.e. the graph properties
aim at investigating the impact on the dissemination process (both of the semantic information representation in nodes internal
for semantic information and data items) deriving from the use of memory are very close to the properties of the complete se-
a structured and well dened information selection process driven mantic network graph. See Section 5.4;
by cognitive models (in particular, cognitive heuristics) against one The cognitive mechanism of information selection and repre-
where semantic information is also organised in an associative net- sentation combined with the corresponding data dissemination
work, but the choice of the information and contents to exchange algorithm proves to be ecient in terms of memory occupa-
is not driven by cognitive models. The selection policy used by the tion. In fact, in Section 5.5 we show that even increasing the re-
benchmark is the simplest one that could be devised. Note, how- sources involved in the dissemination process (memory for tags
ever, that such uniform random policies may perform quite well and data items), we obtain only a marginal increase of perfor-
in homogeneous mobility cases, such as Scenarios 1 and 2 in our mance, meaning that limiting memory resources does not dras-
case. For example, this has been found to be the best policy for tically degrade the overall performance of the system.
topic-based data dissemination in opportunistic networks in ho-
mogeneous mobility settings [33,34]. 5.3. Performance analysis of information-dissemination algorithms
Results reported in the following simulations are the statistics
collected on 10 different tests obtained from 10 different mobility In this section we provide a comparison of the proposed solu-
traces of the HCMM model and averaged across all nodes. Each ex- tion against the benchmark approach, in all scenarios previously
periment is a transient simulation ran for 250 0 0 s. In the rest of described. For the sake of simplicity, from now on the acronyms
this section, we use some conventions in order to make the values CA and BA we will refer to the cognitive approach and the bench-
of the forget and retrieval thresholds more intuitive for the reader. mark approach, respectively.
Remember that the forget threshold (see Section 4.2) denes a We compare the two approaches using the Knowledge Dissem-
weight value under which edges are dropped from a semantic net- ination (KD), F-Measure and Coverage metrics. All the results re-
work, while the retrieval weight threshold (see Section 4.3) sets the ported in this section are obtained by varying the fmin threshold
limiting weight under which edges are not considered for inclusion between 150 and 300 s. For all the other parameters, we use the
in a donor network during an exchange. In the following, we de- values reported in Table 4. Unless otherwise stated, the x axis is
ne these two parameters with respect to the time passed since plotted in log-scale.
22 M. Mordacchini et al. / Computer Communications 81 (2016) 1230
a b
0.25 CA 1
BA
CA
BA
0.2 0.8
F-Measure
0.15 0.6
KD
0.1 0.4
0.05 0.2
0 0
1 10 100 1000 10000 1 10 100 1000 10000
Time (sec) Time (sec)
Fig. 7. KD(a) and F-measure(b) comparison with f min = 150s on dataset D1 (Scenario 1).
a b
0.35 CA 1 CA
BA BA
0.3
0.8
0.25
F-Measure
0.2 0.6
KD
0.15 0.4
0.1
0.2
0.05
0 0
1 10 100 1000 10000 1 10 100 1000 10000 100000
Time (sec) Time (sec)
Fig. 8. KD(a) and F-measure(b) comparison with f min = 300s on dataset D1 (Scenario 1).
M. Mordacchini et al. / Computer Communications 81 (2016) 1230 23
a b
1 CA 1 CA
BA BA
0.8 0.8
Mean Edge Weight
0.4 0.4
0.2 0.2
0 0
1 10 100 1000 10000 1 10 100 1000 10000
Time (sec) Time (sec)
a b
0.5 CA 1
BA
CA
BA
0.4 0.8
F-Measure
0.3 0.6
KD
0.2 0.4
0.1 0.2
0 0
1 10 100 1000 10000 1 10 100 1000 10000
Time (sec) Time (sec)
Fig. 10. KD(a) and F-measure(b) comparison with f min = 150s on dataset D2 (Scenario 2).
sort of core of semantic information (vertices and edges) inside in the semantic networks around a stable core. The increment
each semantic network. This core is increasingly reinforced over in the mean edge weight means that edges cannot generally be
time and allows other, new concepts to be gradually included in it, deleted by the forget process, since their weights are far above the
giving a more clear structure to the semantic network. forget threshold.
In front of these two different approaches for growing the se- On the other hand, the mean edge weight in BA simply di-
mantic networks, the underlying forgetting process is more likely minishes its decreasing rate, until it starts to uctuate around a
to have detrimental effects on the semantic networks of BA, rather stabilisation value. This value is low, highlighting the fact that, on
than on those of CA. In fact, in the former case there is no par- average, the semantic networks built using BA are weak. In fact,
ticular mechanism for selecting the path to follow in the donor due to their low weight value, edges can be more subject to be
network, and the dimension of the semantic network increases forgotten.
rapidly. As a consequence, a relevant number of edges could re-
main not visited for a long time, leaving space for the forgetting 5.3.2. Scenario 2
process to delete them. As a further consequence, the vertices at- In order to further analyse the behaviour of the two approaches,
tached to them could also be eligible for removal, thus leading to we now show results obtained using dataset D2. Figs. 10 and 11
a loss of information. refer to the single-community scenario dened in Scenario 2.
This situation can be better viewed by analysing the variations In both these cases, it is possible to note the same effects ob-
over time of the mean weight of the edges in all the semantic net- served with dataset D1. The F-measure of the CA approach ini-
works of the system. Fig. 9 presents this data for both fmin = 150 tially decreases. After this phase, the semantic knowledge owned
and fmin = 300. Initially, the mean edge weight starts to decrease by each device starts to attract more and more related data items,
for both BA and CA. This is due to the fact that edges need to start leading to an increase of the F-measure metric. For BA, the start-
being exchanged in order to increment their weights. To this end, ing delay on data dissemination is successively worsened by the
in CA edges must also become recognised. After having reached lost of semantic information, leading to a continuous decrease of
a minimum, the mean weight of the edges in the cognitive-based F-measure values.
solution starts to rapidly increase. This is an indication of the rein- With respect to the KD metric, BA shows an initial faster
forcement of the information (and, thus, the weights of the edges) growth of the semantic networks, but it is not able to preserve
24 M. Mordacchini et al. / Computer Communications 81 (2016) 1230
a b
0.8
CA 1
BA
CA
BA
0.6 0.8
F-Measure
0.6
KD
0.4
0.4
0.2
0.2
0 0
1 10 100 1000 10000 1 10 100 1000 10000
Time (sec) Time (sec)
Fig. 11. KD(a) and F-measure(b) comparison with f min = 300s on dataset D2 (Scenario 2).
a b
1
CA 1
BA
CA
0.8 F-Measure
0.8 BA
0.6 0.6
KD
0.4 0.4
0.2 0.2
0 0
1 10 100 1000 10000 1 10 100 1000 10000
Time (sec) Time (sec)
Fig. 12. KD(a) and F-measure(b) comparison with f min = 150s on dataset D1 (Scenario 3).
the retrieved information over time. With fmin = 150s (Fig. 10), BA Table 5
Convergence values and times for the Coverage metric in all the considered sce-
reaches KD = 0, and also with fmin = 300s (Fig. 11) it gets close to
narios.
this value. In all these cases, CA proceeds initially slower, allowing
its semantic networks to strengthen their structure, nally achiev- fmin Scen. 1 Scen. 2 Scen. 3
ing high values of KD. CVG t CVG t CVG t
The difference in the knowledge acquisition process are also re-
CA 150 0.987 2105 0.977 22895 0.993 2605
ected in quality of the retrieved data. This measure is also af-
300 0.989 2160 0.997 24970 0.999 2605
fected by the BA 150 0.0 3635 0.0 24360 0.0 8295
approach used by BA to select the data to be exchanged upon 300 0.599 24925 0.999 8040 0.999 23255
contact. Note that, with fmin = 150s, the BA approach is never able
to achieve better values of the F-measure than CA. With f min =
300s, BA only shortly has a F-measure better than CA, eventually
eventually enters a declining phase, although this process is slower
declining the values of this metric, in parallel with the loss of se-
than in all the previous cases. In order to better investigate the be-
mantic knowledge.
haviour of BA (and CA) in this case, we allowed the simulation to
run longer, i.e. for 125,0 0 0 s. It is possible to observe that the de-
5.3.3. Scenario 3
clining phase of the BA curve leads the CA solution to outperform
In the last scenario, we tested the two competing approaches
BA, as in all the other cases. This fact can be observed for the F-
in a more complex situation. Nodes are divided into three sepa-
measure, too. Initially, BA has a better performance, but it nally
rated communities, and are equipped with data coming from the
starts decreasing. At the same time, the F-measure curve of CA
D1 dataset. Non-travelling nodes have to rely on travellers to col-
increases, and CA ends the simulation with a better performance
lect both knowledge and data spread in the other communities.
than BA.
Fig. 12 shows the variation of KD and F-measure with fmin = 150s.
In this case, the usual initial advantage of BA over CA in the KD
metric lasts for a very short time. In the F-measure metric, BA 5.3.4. Coverage
starts to decline, without ever stopping . Table 5 presents the performance under all the scenarios of
With fmin = 300s, BA shows an increased ability to preserve both CA and BA with respect to the Coverage metric. The ta-
the content of the semantic networks of the system. However, BA ble reports the values and the time instants at which Coverage
M. Mordacchini et al. / Computer Communications 81 (2016) 1230 25
a b
CA 1
0.8 BA
CA
0.8 BA
0.6
F-measure
0.6
KD
0.4
0.4
0.2
0.2
0 0
1 10 100 1000 10000 100000 1 10 100 1000 10000 100000
Time (sec) Time (sec)
Fig. 13. KD(a) and F-measure(b) comparison with f min = 300s on dataset D1 (Scenario 3).
Fig. 14. Evolution of a tagged nodes semantic network evolution running CA in Scenario 1.
stabilises. Specically, convergence is dened as the point in time, we can reasonably suppose that also in this case the Coverage met-
during a simulation, when the coverage value does not change any ric will start to decrease, possibly reaching 0.
more until the end of the simulation. Note that, as data items As a general remark on these results, we can note that CA
are not dropped by nodes and no new data items are generated achieves good Coverage values even with a low fmin . This implies
during simulations, coverage can only increase. It stops increasing, that, even in face of a limited resource consumption (low fmin ), CA
and therefore remains constant, when the dissemination process is able to let relevant data items ow toward interested nodes in
becomes stable and nodes do not exchange any more data items the system (Fig. 13).
during contacts. Consequently, according to this very strict deni-
tion of coverage, convergence times may appear quite high. How- 5.4. Analysis on nodes semantic networks
ever we decided to use this denition because we are interested
in studying the performance of our system when the dissemina- Next, we analyse in more detail the nodes semantic networks
tion process enters in steady state. for both the approaches. For the sake of simplicity, the results pre-
Generally, in almost all the cases, convergence is reached by CA sented hereafter will refer to a tagged node that we can consider,
faster, and with higher Coverage values, than BA. In particular, it without loss of generality, as representative of all the other nodes
is possible to note that, for fmin = 150s, BA ends up with a Cover- in the system. Specically, for Scenarios like 1 or 2 this is any of
age of 0. This is due to the deletion of all the semantic concepts the nodes in the only existing community. For Scenario 3, we con-
from the nodes semantic networks, as already observed in all the sider one of the non-traveller nodes.
previous experiments. In only one case, for fmin = 300s under Sce- We tracked the state of the tagged nodes SN at successive time
nario 2, BA is able to reach convergence faster than CA. In this case, instants. Figs. 14 and 15 refer to the SN evolution in CA and BA,
the fmin value gives time to BA to rapidly accumulate a high num- respectively. We can again observe the different growth rate of the
ber of data items. Given the fact that data items are never dis- SN triggered by the two approaches. With CA, the tagged nodes SN
carded once acquired, the denition of the Coverage measure (see grows more slowly than with BA, however this leads to a more ro-
Formula 4) implies that the Coverage value could remain high even bust SN evolution than with BA. If we compare the state of the SNs
when the semantic knowledge starts to decrease, due to forgetting. at 700s we notice that the structure of the SN built by CA is more
However, all the other metrics (see Fig. 11) highlight the fact the similar to G1 than the one built according to BA. Moreover, despite
performance of the system is degrading. From these observations, the faster initial knowledge acquisition of BA, the randomness of
26 M. Mordacchini et al. / Computer Communications 81 (2016) 1230
Fig. 15. Evolution of a tagged nodes semantic network evolution running BA in Scenario 1.
Fig. 16. Final conguration of three tagged nodes SNs running CA (upper half) and BA (lower half) in Scenario 3.
the mechanism leads to a more chaotic SN structure, characterised kind of a spontaneous consensus. That is, in a closed environment
by long and weak paths between vertexes. This behaviour makes where no new information is generated and when information can
the resulting SN very unstable and more susceptible to the for- eventually circulate across all nodes, knowledge tend to become
getting process. For example, when using BA, after 2475s all the homogeneous among nodes, which align towards a common rep-
semantic information in the SN has been lost. Conversely, thanks resentation of available semantic information.
to the cognitive process, CA tends to attach the new information This kind of similarity is reected by structural properties of
around an increasingly stable core. The very same behaviour can the nodes SNs. We averaged over 10 simulated experiments the
be also observed in the multi-community environment of Scenario tagged nodes nal semantic network size for both CA and BA and
3, as shown in Fig. 16. The upper part of the gure reports the compared it with the complete sizes of the graphs (G1 and G2).
nal conguration of the SNs of three tagged nodes (one per Table 6 shows the number of vertices and edges in the nal SN of
community) using CA. The other half of the gure presents the the tagged node as a fraction of those in the global graphs. Diam-
congurations of the SNs of the 3 tagged nodes when the BA eter values are absolute. In this case, diameters of G1 and G2 are 4
scheme is used. The latter congurations are taken just before the and 8, respectively. As reported in the table, though the SN formed
SNs of each node become empty, due to the forgetting process. with CA is smaller than the corresponding global graph, it approx-
Also in this case, the cognitive mechanisms of the CA scheme imates very well the diameters of the global graphs. On the other
lead the SN structure to be very similar to G1. It is worth noting hand, BA is not as accurate as CA. Most of the time BA is not able
that no node in the system knows the real structure of G1, but to preserve the information in the SN until the end of simulation.
nevertheless, they are able to replicate a structure very similar to Only when the forgetting time is suciently high the information
the global one, that could be in principle obtained only with global lasts until the end (Scenario 2 and 3 with fmin = 300) and even in
knowledge. Another key feature of CA is that at the end of the sim- that case the graph properties are not always respected (e.g., see
ulation, all nodes SN are very similar. This can be seen as some the much different diameter values).
M. Mordacchini et al. / Computer Communications 81 (2016) 1230 27
Table 6
Nodes nal semantic network properties for CA and BA. Mean values and standard deviations computed on 10 runs
are reported. Missing values () means that nodes semantic network are empty, as a consequence of the forgetting
process.
Scenario fmin CA BA
Table 7
Cramer von Mises goodness of t test computed on the degree distribution of a tagged node semantic networks ob-
tained with CA and BA. Results have been computed on 10 runs. R and NR mean Reject and Do not reject, respec-
tively.
Scenario fmin CA BA
a b
Fig. 17. CCDFs of the degree distribution for CA and BA (solid curves) compared with the degree distribution of G2 (dashed curve).
In order to deeply investigate the similarity between the nal 0.35 f min = 50
SN generated by CA and BA, and the original graphs G1 and G2, f min = 150
0.3 f min = 300
we analyse the vertex degree distribution of the SNs. Namely, we
compared the empirical vertex degree distribution of the nodes -
0.25
nal SN obtained with CA and BA with the empirical distribution
of G1 and G2. We used the Cramer-von-Mises goodness of t test 0.2
with a signicance level of 95% to compare the distributions. Re-
KD
0.35 threshold below the one marking the phase transition, also CA
Wmin = 15
Wmin = 35 looses information faster than it can consolidate it. Beyond this
0.3 Wmin = 80 value, information has enough time to consolidate in the semantic
networks, and does not disappear from the network.
0.25
Fig. 19 presents the performance of the system with different
values of the Wmin threshold (remember that the higher Wmin the
0.2
more edges can be included in the semantic network exploration
KD
0.15 process between two nodes during a contact). Also in this case,
higher values of the threshold allow the system to achieve higher
0.1 values of KD. However, there is a sort of marginal utility gain in
increasing the value of Wmin , which means that increasing the size
0.05 of the semantic network explored during a contact is not worth
after a certain point.
0 Fig. 20 shows how the KD metric changes in front of different
1 10 100 1000 10000 values of tag_limit, which sets the maximum number of SN tags
Time (sec) exchanged during a contact. The inclusion of more vertices in a
contributed network leads to a signicant increase of KD. There-
Fig. 19. Impact on KD of the weight threshold. fore, the setting of this parameter should be carefully evaluated, as
increasing it also means increasing the amount of trac exchanged
0.4 Tag limit = 10 during contacts. However, again we can notice that the increase in
Tag limit = 25 KD is not proportional to the increase tag_limit, which suggests a
Tag limit = 75
marginal utility law also in this case.
0.3 Finally, Fig. 21 presents the impact on the content dissemina-
tion process of various data_limit values, which limit the number
of content items exchanged during a contact. In particular, Fig. 21a
presents the impact of this parameter on F-measure, while Fig. 21b
KD
0.2
shows its impact on Coverage. Note that an increase in the number
of items exchanged during contacts does not seem to particularly
0.1 affect the value of the F-measure. This can be explained by looking
at how this metric is computed. One of the main contributions in
the computation of the F-measure value is given by the intersec-
0 tion of all the semantic concepts that describe the received data
items and the semantic concepts stored on the semantic network
1 10 100 1000 10000
of a node. Exchanging more items during contacts could not lead to
Time (sec)
increase of the this quantity. In fact, the items that maximise the
Fig. 20. Impact on KD of the tag_limit value. intersection described above are likely to be the rst ones in the
set considered for exchange, because they are those most corre-
lated with the concepts exchanged during the same contact. There-
edges can be kept in each nodes semantic network for longer fore, they could be always present, even with the smallest amount
periods, and, thus, they can have more chances to be exchanged of exchanged items (i.e. data_limit = 5 in our case).
during contacts with other peers. However, the lowest value of On the other hand, when nodes can exchange (and, thus, also
the forget threshold highlights the fact that, with a very rapid receive) more data items at each encounter, they can more rapidly
forgetting process, a phase transition could happen. In fact, in collect all the items that are described by the tags they carry in
this case, rather than observing an increase in the KD metric, their semantic networks. Therefore, the Coverage measure achieves
nodes in the system experience a loss of semantic information in higher values, and converges more rapidly, when data_limit is set
their semantic networks. In other words, for values of the forget to higher values. Moreover, also in this case we can notice a
a b
1 1
0.95
0.8 Data limit = 5
Data limit = 10
Data Limit = 25 0.9
F-measure
Coverage
0.6
0.85
0 0.65
1 10 100 1000 10000 1 10 100 1000 10000
Time Time
F-measure Coverage
marginal utility behaviour. In fact, even increasing the resources [2] J. Sahoo, S. Cherkaoui, A. Had, Optimal selection of aggregation locations
involved in the dissemination process, we obtain only a marginal for participatory sensing by mobile cyber-physical systems, Comput. Commun.
(2014), doi:10.1016/j.comcom.2014.05.007.
increase of performance. This means that we can save the re- [3] K.-J. Park, R. Zheng, X. Liu, Cyber-physical systems: milestones and research
sources of mobile devices without degrading signicantly the over- challenges, Comput. Commun. 36 (1) (2012) 17, doi:10.1016/j.comcom.2012.
all performance of the system. 09.006.
[4] E. Borgia, The internet of things vision: key features, applications and open
issues, Comput. Commun. 54 (2014) 131, doi:10.1016/j.comcom.2014.09.008.
[5] M. Conti, S. Chong, S. Fdida, W. Jia, H. Karl, Y.-D. Lin, P. Mhnen, M. Maier,
6. Conclusion
R. Molva, S. Uhlig, M. Zukerman, Research challenges towards the future inter-
net, Comput. Commun. 34 (18) (2011) 21152134.
In this paper we presented a set of algorithms enabling [6] A.T. Al-Hammouri, A comprehensive co-simulation platform for cyber-physical
nodes belonging to an opportunistic network to disseminate au- systems, Comput. Commun. 36 (1) (2012) 819, doi:10.1016/j.comcom.2012.01.
003.
tonomously both content items and semantic information associ- [7] L. Pelusi, A. Passarella, M. Conti, Opportunistic networking: data forwarding
ated to them. With respect to the work present in the literature we in disconnected mobile ad hoc networks, Commun. Mag. IEEE 44 (11) (2006)
are able to represent interests of users in a more exible way with 134141.
[8] S. Ferretti, Shaping opportunistic networks, Comput. Commun. 36 (5) (2013)
respect, for example, to conventional topic-based schemes. Here, 481503.
we consider that users interests can change over time, as a result [9] V.F. Mota, F.D. Cunha, D.F. Macedo, J.M. Nogueira, A.A. Loureiro, Protocols, mo-
of a knowledge acquisition process that is also the effect of social bility models and tools in opportunistic networks: a survey, Comput. Commun.
48 (2014) 519.
interactions between them. In a scenario of cyber-physical con- [10] C. Boldrini, K. Lee, M. nen, J. Ott, E. Pagani, Opportunistic networks, Comput.
vergence, where users devices are the main tools through which Commun. 48 (2014) 14, doi:10.1016/j.comcom.2014.04.007.
users acquire knowledge and content from both the physical and [11] C. Boldrini, M. Conti, A. Passarella, Performance modelling of opportunistic
forwarding under heterogenous mobility, Comput. Commun. 48 (2014) 5670,
the cyber environment, this is important, because devices should
doi:10.1016/j.comcom.2014.03.028. Opportunistic networks
act as much as possible as proxies of the users in the cyber world, [12] P. Sermpezis, T. Spyropoulos, Understanding the effects of social selsh-
and therefore behave as closely as possible as their users would ness on the performance of heterogeneous opportunistic networks, Comput.
Commun. 48 (2014) 7183, doi:10.1016/j.comcom.2014.03.016. Opportunistic
behave in the same conditions. To this end, we based our solu-
networks
tion on well established models coming from the cognitive science [13] P. Ginzboorg, V. Niemi, J. Ott, Message fragmentation for a chain of disrupted
eld. Namely, we exploited the associative network memory model links, Comput. Commun. 48 (2014) 8497, doi:10.1016/j.comcom.2014.03.015.
to build a representation of the semantic knowledge on which we Opportunistic networks
[14] H. Chen, W. Lou, Gar: Group aware cooperative routing protocol for resource-
run two fast and frugal decision making strategies, i.e. Fluency and constraint opportunistic networks, Comput. Commun. 48 (2014) 2029. Oppor-
Tallying Heuristics, in order to identify which semantic data and tunistic networks
data items to exchange between nodes upon contacts. Our simula- [15] A.J. Aviv, M. Blaze, M. Sherr, J.M. Smith, Privacy-aware message exchanges for
humanets, Comput. Commun. 48 (2014) 3043, doi:10.1016/j.comcom.2014.03.
tion results demonstrate how the proposed cognitive solution can 013. Opportunistic networks
be a valuable approach to disseminate contents in an opportunis- [16] C.P. Mayer, O.P. Waldhorst, Routing in hybrid delay tolerant networks, Comput.
tic network. We compared the performance of our approach with Commun. 48 (2014) 4455, doi:10.1016/j.comcom.2014.03.018. Opportunistic
networks
an alternative that does not exploit cognitive models. Interestingly, [17] S. Grasic, A. Lindgren, Revisiting a remote village scenario and its {DTN} rout-
benets are manifold. First, the proposed cognitive solution is able ing objective, Comput. Commun. 48 (2014) 133140, doi:10.1016/j.comcom.
to build a more stable representation of the semantic information 2014.04.003. Opportunistic networks
[18] N. Benamar, K.D. Singh, M. Benamar, D.E. Ouadghiri, J.-M. Bonnin, Routing pro-
present in the environment. This means that mobile devices spon-
tocols in vehicular delay tolerant networks: a comprehensive survey, Comput.
taneously select the hot information available in the system dur- Commun. 48 (2014) 141158, doi:10.1016/j.comcom.2014.03.024. Opportunistic
ing time and organise it in a robust structure permitting its long networks
[19] E. Kokolaki, M. Karaliopoulos, G. Kollias, M. Papadaki, I. Stavrakakis, Vulnera-
lasting permanence in their memory. Second, nodes internal se-
bility of opportunistic parking assistance systems to vehicular node selshness,
mantic knowledge representation approximates very well, though Computer Communications 48 (2014) 159170, doi:10.1016/j.comcom.2014.04.
at a reduced scale, the structural properties of the whole knowl- 001. Opportunistic networks
edge present in the environment. Indeed, the SN locally built by [20] F. Rebecchi, M. Dias de Amorim, V. Conan, A. Passarella, R. Bruno, M. Conti,
Data ooading techniques in cellular networks: A survey, Commun. Surv. Tu-
each node with our cognitive mechanism have a very similar de- tor., IEEE PP (99) (2014), doi:10.1109/COMST.2014.2369742. 11
gree distribution with respect to the graph representing the entire [21] M. Conti, Computer communications: present status and future challenges,
knowledge present in the environment. Finally, our results show Comput. Commun. 37 (2014) 14, doi:10.1016/j.comcom.2013.10.001.
[22] C. Boldrini, A. Passarella, HCMM: Modelling spatial and temporal properties of
that the cognitive approach achieves a more accurate retrieval of human mobility driven by users social relationships, Comput. Commun. 33 (9)
contents. In fact, our system does not loose the acquired informa- (2010) 10561074.
tion about the hot topics present in the environment and is thus [23] M. Conti, M. Mordacchini, A. Passarella, Design and performance evaluation
of data dissemination systems for opportunistic networks based on cognitive
able to disseminate those contents that become interesting over heuristics, ACM Trans. Auton. Adapt. Syst. 8 (3) (2013) 12:112:32.
time, always keeping high levels of coverage. Therefore, with our [24] L. Valerio, A. Passarella, M. Conti, E. Pagani, Scalable data dissemination in op-
approach personal users devices are able to properly adapt to the portunistic networks through cognitive methods, Pervasive Mobile Comput. 16,
Part A (2015) 115135, doi:10.1016/j.pmcj.2014.05.005.
dynamic change of interests always providing to their users the
[25] R. Bruno, M. Conti, M. Mordacchini, A. Passarella, An analytical model for con-
contents they need. tent dissemination in opportunistic networks using cognitive heuristics, in:
Proceedings of the 15th ACM International Conference on Modeling, Analysis
and Simulation of Wireless and Mobile Systems, in: MSWiM 12, ACM, New
Acknowledgements York, NY, USA, 2012, pp. 6168.
[26] J. Anderson, G.H. Bower, Human Associative Memory, Psychology Press, 1979.
[27] A.M. Collins, E.F. Loftus, A spreading-activation theory of semantic processing.,
This work was partially funded by the European Commission Psychological Rev. 82 (6) (1975) 407.
under the MOTO (FP7 317959) and EIT ICT Labs MOSES (Business [28] J.T. Wixted, E.B. Ebbesen, On the form of forgetting, Psychological Sci. 2 (6)
Plan 2015) projects. (1991) 409415.
[29] H. Ebbinghaus, Memory: A Contribution to Experimental Psychology, New York
city, Teachers college, Columbia university, 1913.
References [30] L. Schooler, R. Hertwig, How forgetting aids heuristic inference, Psychol. Rev.
112 (2005) 610628.
[1] M. Conti, S.K. Das, C. Bisdikian, M. Kumar, L.M. Ni, A. Passarella, G. Roussos, [31] J.N. Marewski, L.J. Schooler, Cognitive niches: an ecological model of strategy
G. Trster, G. Tsudik, F. Zambonelli, Looking ahead in pervasive computing: selection., Psychol. Rev. 118 (3) (2011) 393.
Challenges and opportunities in the era of cyberphysical convergence, Perva- [32] R.M. Dawes, The robust beauty of improper linear models in decision making,
sive Mobile Comput. 8 (1) (2012) 221. Am. Psychol. (1979) 571582.
30 M. Mordacchini et al. / Computer Communications 81 (2016) 1230
[33] V. Lenders, M. May, G. Karlsson, C. Wacha, Wireless ad hoc podcasting, SIG- [41] G. Gigerenzer, Why heuristics work, Perspect. Psychol. Sci. 3 (1) (2008) 20
MOBILE Mob. Comput. Commun. Rev. 12 (1) (2008) 6567. 29.
[34] C. Boldrini, M. Conti, A. Passarella, Design and performance evaluation of con- [42] M. Conti, M. Mordacchini, A. Passarella, L. Rozanova, A semantic-based algo-
tentplace, a social-aware data dissemination system for opportunistic net- rithm for data dissemination in opportunistic networks, in: Proceedings of 7th
works, Comput. Netw. 54 (4) (2010) 589604, doi:10.1016/j.comnet.2009.09. International Workshop on Self-Organizing Systems (IWSOS 2013), Palma de
001. Mallorca, 9-10th May, 2013.
[35] P. Pantazopoulos, I. Stavrakakis, A. Passarella, M. Conti, Ecient social-aware [43] M. Mordacchini, L. Valerio, M. Conti, A. Passarella, A cognitive-based solution
content placement in opportunistic networks, in: Proceedings of 2010 Seventh for semantic knowledge and content dissemination in opportunistic networks,
International Conference on Wireless On-demand Network Systems and Ser- in: Proceedings of 2013 IEEE 14th International Symposium and Workshops
vices (WONS), 2010, pp. 1724. on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2013,
[36] P.T. Eugster, P.A. Felber, R. Guerraoui, A.-M. Kermarrec, The many faces of pub- pp. 16.
lish/subscribe, ACM Comput. Surv. 35 (2) (2003) 114131. [44] M. Mordacchini, A. Passarella, M. Conti, S.M. Allen, M.J. Chorley, G.B. Colombo,
[37] E. Yoneki, P. Hui, S. Chan, J. Crowcroft, A socio-aware overlay for pub- V. Tanasescu, R.M. Whitaker, Crowdsourcing through cognitive opportunistic
lish/subscribe communication in delay tolerant networks, in: Proceedings of networks, ACM Trans. Auton. Adapt. Syst. 10 (2) (2015) 13:113:29.
the 10th ACM Symposium on Modeling, Analysis, and Simulation of Wireless [45] D.E. Rumelhart, P. Smolensky, J.L. McClelland, G.E. Hinton, Parallel Distributed
and Mobile Systems, in: MSWiM 07, ACM, New York, NY, USA, 2007, pp. 225 Processing, MIT Press, Cambridge, MA, USA, 1986, pp. 757.
234. [46] B. Gawronski, B.K. Payne, Handbook of Implicit Social Cognition: Measurement,
[38] P. Costa, C. Mascolo, M. Musolesi, G. Picco, Socially-aware routing for publish- Theory, and Applications, The Guilford Press, 2010.
subscribe in delay-tolerant mobile ad hoc networks, IEEE J. Sel. Areas Commun. [47] D. Karamshuk, C. Boldrini, M. Conti, A. Passarella, Human mobility models for
26 (5) (2008) 748760. opportunistic networks, Commun. Mag., IEEE 49 (12) (2011) 157165.
[39] K.-J. Lin, C.-W. Chen, C.-F. Chou, Preference-aware content dissemination in [48] P. Bolettieri, A. Esuli, F. Falchi, C. Lucchese, R. Perego, T. Piccioli, F. Rabitti,
opportunistic mobile social networks, in: Proceedings of the IEEE INFOCOM, CoPhIR: a test collection for content-based image retrieval, CoRR (2009).
2012, pp. 19601968. abs/0905.4627v2
[40] J. Reich, A. Chaintreau, The age of impatience: optimal replication schemes for [49] C.J. van Rijsbergen, Information Retrieval, Butterworths, London, 1979.
opportunistic networks, in: Proceedings of the 5th International Conference
on Emerging Networking Experiments and Technologies, in: CoNEXT 09, ACM,
New York, NY, USA, 2009, pp. 8596.