Dmitry Zinoviev

Dmitry Zinoviev
Suffolk University · Department of Mathematics and Computer Science

Ph.D. in Computer Science

About

111
Publications
44,971
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
898
Citations
Introduction
Dmitry Zinoviev has an MS in Physics from Moscow State University and a PhD in Computer Science from Stony Brook University. His research interests include computer simulation and modeling, network science, social network analysis, and digital humanities. He has been teaching at Suffolk University in Boston, MA since 2001.
Additional affiliations
September 2006 - June 2007
University of Suffolk
Position
  • Simulation of distributed mutual exclusion algorithms
January 2005 - August 2005
Suffolk University, UMass/Boston
Position
  • Estimation of Web Site Complexity Using Pupil Dilation
January 2005 - September 2005
University of Suffolk
Position
  • Representation of DEVS (Discrete Event System Specifications) using UML (Unified Modeling Language) diagrams
Description
  • Simulation and modeling.
Education
September 1995 - August 1997
Stony Brook University
Field of study
  • Computer Science
January 1994 - May 1995
Stony Brook University
Field of study
  • Computer Science
September 1985 - January 1993
Moscow State University (Lomonosov)
Field of study
  • Physics

Publications

Publications (111)
Article
Full-text available
Cultural domain analysis (CDA) is the study of how people in groups think about lists of terms that somehow go together and how this thinking differs between groups. Some people associate term “candle” with “Christmas,” others – with “hurricane” and “blackout,” and yet others – with “self-injury” toolset. Anthropologists, ethnographers, psychologis...
Article
Full-text available
People who engage in non-suicidal self-injury (NSSI) often conceal their practices, which limits examination and understanding of their engagement. The goal of this research is to utilize data from public online social networks (namely, LiveJournal, a major blogging social networking site) to observe the NSSI population in a naturally occurring set...
Article
Full-text available
The power of networks manifests itself in a highly non-linear amplification of a number of effects, and their weakness - in propagation of cascading failures. The potential systemic risk effects can be either exacerbated or mitigated, depending on the resilience characteristics of the network. The goals of this paper are to study some characteristi...
Presentation
Full-text available
North Korea (DPRK) escalates its nuclear program. China is believed to have influence over DPRK. China tightens the screws on DPRK. DPRK does not seem to careß. Does China really have influence over DPRK?
Conference Paper
Full-text available
The concept of fraud, its antecedents and outcomes as well as its detection and prevention, have been discussed by both academics and practitioners for decades. The scope and complexity of the concept of fraud attracts scholars from diverse disciplines. The purpose of our study is to gain a broader understanding of how fraud is viewed in the compe...
Book
Full-text available
Make your good Python code even better by following proven and effective pythonic programming tips. Avoid logical errors that usually go undetected by Python linters and code formatters, such as frequent data look-ups in long lists, improper use of local and global variables, and mishandled user input. Discover rare language features, like rational...
Book
Full-text available
Get ready to take a deep dive into Python and C while learning to avoid the drawbacks and harness the benefits associated with seven common code reuse models. In no time at all, you’ll develop the confidence to reuse code at any stage of real-world development.
Chapter
North American institutions of higher education (IHEs): universities, 4- and 2-year colleges, and trade schools—are heavily present and followed on Twitter. An IHE Twitter account, on average, has 20,000 subscribers. Many of them follow more than one IHE, making it possible to construct an IHE network, based on the number of co-followers. In this p...
Preprint
Full-text available
North American institutions of higher education (IHEs): universities, 4- and 2-year colleges, and trade schools -- are heavily present and followed on Twitter. An IHE Twitter account, on average, has 20,000 subscribers. Many of them follow more than one IHE, making it possible to construct an IHE network, based on the number of co-followers. In thi...
Preprint
Full-text available
We applied complex network analysis to ~27,000 tweets posted by the 2016 presidential election's principal participants in the USA. We identified the stages of the election campaigns and the recurring topics addressed by the candidates. Finally, we revealed the leader-follower relationships between the candidates. We conclude that Secretary Hillary...
Preprint
Full-text available
"Kompromat" (the Russian word for "compromising material") has been efficiently used to harass Russian political and business elites since the days of the USSR. Online crowdsourcing projects such as "RuCompromat" made it possible to catalog and analyze kompromat using quantitative techniques -- namely, social network analysis. In this paper, we con...
Presentation
Full-text available
Geosemantic networks (GSNs) represent geographical, social, and anthropological aspects of compact communities, such as urban neighborhoods. They have become a crucial tool in defining spatial borders of culturally uniform communities and studying their evolution. A GSN is a weighted graph comprised of hashtag nodes. Two nodes are connected with an...
Presentation
Full-text available
We use complex network analysis to study the structure and temporal patterns of trade between the U.S. states and foreign countries.
Chapter
The topic of service innovation (SI) attracts substantial interest among both service researchers and industrial practitioners. Drawing from network theory and complex network analysis methods, this chapter maps the conceptual structure of SI by detecting and delineating related themes and their interconnections. Based on subject terms collected fr...
Presentation
Full-text available
The majority of the USA population still believe people with serious mental illness (SMI) are dangerous. SMI and dangerousness have been recurring topics of newspaper coverage for some time. What aspects, if any, have been associated in mainstream American media with SMI? Are there historical periods where significant sociopolitical events have occ...
Article
Full-text available
Categorizing and quantifying exposure to trauma and childhood adversities (CAs) presents a significant measurement and analytic challenge. The current study examined the co-occurrence of trauma and CA types using network analyses, an alternative to traditional measurement models. The Trauma History Profile, assessing lifetime exposure to 20 differe...
Presentation
Full-text available
Non-suicidal self-injury (NSSI), such as self-cutting or self-burning, is the deliberate destruction of one’s body tissue in the absence of suicidal intent. Approximately one in five of adolescents and one in four of young adults in the USA often referred to as “self-cutters,” have engaged in NSSI. The goal of the study is to analyze the topology o...
Article
Full-text available
Mapping domain knowledge -- identifying domain-related terms and their relationships, and representing them graphically -- is at least one hundred years old. Modern domain knowledge mapping thrives on the ubiquitous, never-seen-before availability of free (or almost free), structured (or almost structured), and correct (or almost correct) online da...
Presentation
Full-text available
Text/network analysis of a script.
Article
Full-text available
How does the North Korean government view China? This study examines North Korea’s foreign policy on China by analyzing the strategic options of North Korean leaders and applying sentiment analysis to Korean Central News Agency (KCNA) reports about China. It is found that North Korea’s generally positive attitude toward China contains nuanced types...
Presentation
Full-text available
Donald Trump has been an avid user of Twitter before, throughout, and in the aftermath of the 2016 USA presidential election campaign. Secretary Hillary Clinton, the Democratic Party candidate, was active on Twitter only from the beginning to end of the campaign. The goal of this research is to reconstruct the timeline and logic of the campaign usi...
Poster
Full-text available
Non-suicidal self-injury (NSSI), such as self-cutting and self-burning, is the direct, deliberate destruction of one’s body tissue in the absence of suicidal intent. NSSI is often related to eating disorders, suicide, and other emotional and behavioral disfunction. We want to explore connections between the structre of a massive online social netwo...
Conference Paper
Full-text available
Donald Trump has been an avid user of Twitter before, throughout, and in the aftermath of the 2017 USA presidential election campaign. Secretary Hillary Clinton, the Democratic Party candidate, was active on Twitter only from the beginning to end of the campaign. The goal of this research is to reconstruct the timeline and logic of the campaign usi...
Article
Full-text available
Computer modeling and simulation is the art of bringing to life systems and behaviors that otherwise are prohibitively expensive, unethical, or just impossible to build. This article describes how to use SimPy, a Python framework, for simple discrete event simulation
Book
Full-text available
The book mostly covers NetworkX. It is intended for curious Python programmers, data scientist, and complex network analysis specialists. The beta is available from the publisher's website (https://lnkd.in/eKm6EtM )
Article
Full-text available
More than 4,600 non-academic music groups emerged in the USSR and post-Soviet independent nations in 1960--2015, performing in 275 genres. Some of the groups became legends and survived for decades, while others vanished and are known now only to select music history scholars. We built a network of the groups based on sharing at least one performer...
Technical Report
Full-text available
More than 4,600 non-academic music groups emerged in the USSR and post-Soviet independent nations in 1960–2015, performing in 275 genres. Some of the groups became legends and survived for decades, while others vanished and are known now only to select music history scholars. We built a network of the groups based on sharing at least one performer....
Poster
Full-text available
Poster with preliminary results for the IC2S2
Conference Paper
Full-text available
Conspiracy theories (including those related to secret societies) and pseudo-sciences (CT&PS) are as old as the humankind. The abundance of CT&PS surviving in the modern world is astonishing: Wikipedia [Wik16a] mentions 200 categories of conspiracy theories and secret societies, and ca. 150 topics classified as pseudoscience [Wik16b]. The goal of o...
Poster
Full-text available
Network Analysis of Exposure to Trauma and Adverse Events in a Clinical Sample of Children and Adolescents.
Working Paper
Full-text available
Book
Full-text available
Go from messy, unstructured artifacts stored in SQL and NoSQL databases to a neat, well-organized dataset with this quick reference for the busy data scientist. Understand text mining, machine learning, and network analysis; process numeric data with the NumPy and Pandas modules; describe and analyze data using statistical and network-theoretical m...
Presentation
Full-text available
More than 4,600 non-academic music groups emerged in the USSR and post-Soviet independent nations in 1960–2015, performing in 275 genres and sub-genres, including rock, pop, disco, jazz, and folk. Some of the groups became legends and survived for decades, while others vanished and are known now only to select music history scholars and fans. The t...
Article
Full-text available
In the scholarly community, the concept of complexity is typically associated with science. However, the consumer view on complexity is different. To understand the conceptual structure of complexity, the author analyzed self-declared interests harvested from complexity-related blogs in LiveJournal. The author arranged the interests into a semantic...
Technical Report
Full-text available
The goal of the project is to identify the key words in Yelp reviews that can be used for predicting the number of stars given to the same business by the same reviewer. Answering this question shall highlight the topics that are important to the reviewers at the subconscious level and help businesses focus on the issues that truly concern their cu...
Research
Full-text available
The "Music Perestroyka" started in the USSR in 1978, 7 years before the Gorbachev Perestroyka. But I wonder what happened in 2005?
Data
More than 4,600 non-academic music groups emerged in the USSR and post-Soviet independent nations in 1960–2015, performing in 275 genres and sub-genres, including rock, pop, disco, jazz, and folk. Some of the groups became legends and survived for decades, while others vanished and are known now only to select music history scholars and fans. The t...
Research
Full-text available
Poster presented at Computational Social Science Summit, May 2015, NWU, Evanston IL
Conference Paper
Full-text available
We constructed a product network based on the sales data collected and provided by a major nationwide retailer. The structure of the network is dominated by small isolated components, dense clique-based communities, and sparse stars and linear chains and pendants. We used the identified structural elements (tiles) to organize products into mini-cat...
Chapter
Full-text available
We constructed a product network based on the sales data collected and provided by a major nationwide retailer. The structure of the network is dominated by small isolated components, dense clique-based communities, and sparse stars and linear chains and pendants. We used the identified structural elements (tiles) to organize products into mini-cat...
Article
Full-text available
Abundant examples of complex transaction-oriented networks (TONs) can be found in a variety of disciplines, including information and communication technology, finances, commodity trading, and real estate. A transaction in a TON is executed as a sequence of subtransactions associated with the network nodes, and is committed if every subtransaction...
Conference Paper
Full-text available
In the scholarly community, the concept of complexity is typically associated with science. For example, the Wikipedia page on complexity mentions six aspects of complexity (behavior, mechanisms, simulation, data, and molecular recognition), all of which are science-related. However, the consumer view on complexity is rather different. To understan...
Conference Paper
Full-text available
Article
Full-text available
In the past decade, blogging web sites have become more sophisticated and influential than ever. Much of this sophistication and influence follows from their network organization. Blogging social networks (BSNs) allow individual bloggers to form contact lists, subscribe to other blogs, comment on blog posts, declare interests, and participate in co...
Article
Full-text available
Instant quality feedback in the form of online peer ratings is a prominent feature of modern massive online social networks (MOSNs). It allows network members to indicate their appreciation of a post, comment, photograph, etc. Some MOSNs support both positive and negative (signed) ratings. In this study, we rated 11 thousand MOSN member profiles an...
Conference Paper
Full-text available
The power of networks manifests itself in a highly non-linear amplification of a number of effects, and their weakness— in propagation of cascading failures. The potential sys-temic risk effects can be either exacerbated or mitigated, depending on the resilience characteristics of the network. The goals of this paper are to study some characteristi...
Article
Full-text available
Persons who engage in non-suicidal self-injury (NSSI), often conceal their practices which limits the examination and understanding of those who engage in NSSI. The goal of this research is to utilize public online social networks (namely, in LiveJournal, a major blogging network) to observe the NSSI population's communication in a naturally occurr...
Chapter
Full-text available
The issue of information diffusion in small-world social net-works was first systematically brought to light by Mark Gra-novetter in his seminal paper "The Strength of Weak Ties" in 1973 and has been an area of active academic studies in the past three decades. In this review, I discuss information proliferation mechanisms in massive online social...
Conference Paper
Full-text available
One major function of social networks (e.g., massive online social networks) is the dissemination of information, such as scientific knowledge, news, and rumors. Information can be propagated by the users of the network via natural connections in written, oral or electronic form. The information passing from a sender to receivers and back (in the f...
Article
Full-text available
One major function of social networks (e.g., massive online social networks) is the dissemination of information such as scientific knowledge, news, and rumors. Information can be propagated by the users of the network via natural connections in written, oral or electronic form. The information passing from a sender to a receiver intrinsically invo...
Article
Full-text available
One major function of social networks (e.g., massive online social networks) is the dissemination of information such as scientific knowledge, news, and rumors. Information can be propagated by the users of the network via natural connections in written, oral or electronic form. The information passing from a sender to a receiver intrinsically invo...
Conference Paper
Full-text available
One major function of social networks (e.g., massive online social networks) is the dissemination of information such as scientific knowledge, news, and rumors. Information can be propagated by the users of the network via natural connections in written, oral or electronic form. The information passing from a sender to a receiver intrinsically invo...
Article
Full-text available
All major on-line social networks, such as MySpace, Facebook, LiveJournal, and Orkut, are built around the concept of friendship. It is not uncommon for a social network participant to have over 100 friends. A natural question arises: are they all real friends of hers, or does she mean something different when she calls them "friends?" Speaking in...
Article
Full-text available
In this paper, we study certain geometric and topological properties of online social networks using the concept of density and geometric vector spaces. "Moi Krug" ("My Circle"), a Russian social network that promotes the principle of the "six degrees of separation" and is positioning itself as a vehicle for professionals and recruiters seeking eac...
Article
Full-text available
Discrete event simulation specification (DEVS) is a formalism designed to describe both discrete state and continuous state systems. It is a powerful abstract mathematical notation. However, until recently it lacked proper graphical representation, which made computer simulation of DEVS models a challenging issue. Unified modeling language (UML) is...
Article
Full-text available
In this paper, I present the design and implementation of Clown--a simulator of a microprocessor-based computer system specifically optimized for teaching operating system courses at undergraduate or graduate levels. The package includes the simulator itself, as well as a collection of basic I/O devices, an assembler, a linker, and a disk formatter...
Article
Full-text available
The performance of the emerging petaflops-scale supercomputers of the nearest future (hypercomputers) will be governed not only by the clock frequency of the processing nodes or by the width of the system bus, but also by such factors as the overall power consumption and the geometric size. In this paper, we study the influence of such parameters o...
Article
Full-text available
We describe the design and implementation of a single-chip microprocessor based on LTS Rapid Single-Flux-Quantum (RSFQ) technology. Two such chips are to be used in a dual-processor module, being developed by a SUNY-TRW collaboration as a spin-off of the HTMT project. Each FLUX chip represents a simple 16-bit 2-way long-instruction-word (LIW) micro...
Article
Full-text available
Rapid Single Flux Quantum (RSFQ) logic is well-known for its ultra-high switching speed and extremely low power consumption. In this paper, we present two original experiments to demonstrate that it's also a reliable technology and its reliability is sufficient even for such a large-scale system as a proposed petaflops-scale HTMT computer. We have...
Article
Full-text available
Rapid Single-Flux-Quantum (RSFQ) logic, based on the representation of digital bits by single quanta of magnetic flux in superconducting loops, may combine several-hundred-GHz speed with extremely low power dissipation (close to 10-18 Joule/bit) and very simple fabrication technology. The drawbacks of this technology include the necessity of deep (...
Article
Full-text available
In the paper, we present a preliminary design of the Rapid Single-Flux-Quantum (RSFQ) subsystem of a petaflops-scale computer, which is being developed in Stony Brook within the framework of the JPL-led Hybrid Technology Multithreaded (HTMT) project. The goal of the project is to develop a multithreaded computer architecture that would utilize nove...
Article
Full-text available
Computing on the petaflops scale is one of the items at the top of the agenda of industrially developed nations for the beginning of the next millennium. However, the ultimate performance of a petaflops scale hypercomputer depends not only on fast and smart processing elements, but equally on reliable high-throughput low-latency interconnects. It i...
Article
Full-text available
The goal of the Hybrid Technology MultiThreading (HTMT) project is to develop a multithreaded computer architecture that would utilize novel electronic and optoelectronic technologies to achieve petaflops-scale performance. The RSFQ subsystem consists of processors (SPELLs), cryoelectronic memory, and switching interprocessor network (CNET). Our es...
Article
Full-text available
This work is part of a project to design a petaflops-scale computer using a hybrid technology multi-threaded architecture (HTMT). A high-bandwidth low-latency switching network (CNET) based on RSFQ logic/memory family comprises the core of the superconductor part of the HTMT system, interconnecting 4,096 processors. We present a preliminary low-lev...
Article
Full-text available
We discuss a preliminary design of a Rapid Single-Flux-Quantum (RSFQ) subsystem for general-purpose computers with petaflops-scale performance. The subsystem is being developed at Stony Brook within the framework of the Hybrid Technology MultiThreading (HTMT) project. COOL-0 design is based on 0.8-μm RSFQ technology which enables the implementation...
Article
Full-text available
Traditional micropipelines based on handshaking mechanisms are simple and reliable, but their throughput is limited by the round-trip flight time between two consecutive micropipeline stages. We propose an RSFQ implementation of a micropipeline with simple credit-based flow control that can hide the round-trip latency and significantly improve the...
Article
Recent progress in the design of a superconductor digital system for high-performance computing, based on the RSFQ logic family, is briefly outlined.
Article
Full-text available
This paper describes two preliminary designs (dubbed COOL-0 and COOL-1) of a superconductor subsystem for general-purpose computing on the petaflops scale (1 petaflops = 10^15 floating point operations per second). The subsystem is being developed at Stony Brook within the framework of the Hybrid Technology MultiThreading (HTMT) project. COOL-0 des...
Article
Full-text available
This work is a part of a project to design a petaflops-scale computer using a Hybrid Technology Multi-Threaded (HTMT) architecture. In the core of the superconductor part of the HTMT system there should be a high-bandwidth low-latency RSFQ switching cryonetwork (CNET) connecting 4,096 computing modules with each other and with room-temperature semi...
Article
Full-text available
rocessors busy, that is roughly one million 128 MB DRAMs filling a 2 meter cube. Memory access latency is roughly 60 ns (6,000 integer instruction times): 36 ns for signal flight at 1/2 light speed, 2 ns for thermal-shielding memory interfaces, 20 ns for DRAMs, and 2 ns for switching network delays. DRAM speed and physical size are the main factors...