enter search term and/or author name
A Space-Efficient Streaming Algorithm for Estimating Transitivity and Triangle Counts Using the Birthday Paradox
Madhav Jha, C. Seshadhri, Ali Pinar
Article No.: 15
We design a space-efficient algorithm that approximates the transitivity (global clustering coefficient) and total triangle count with only a single pass through a graph given as a stream of edges. Our procedure is based on the classic...
A Framework of Mining Trajectories from Untrustworthy Data in Cyber-Physical System
Lu-An Tang, Xiao Yu, Quanquan Gu, Jiawei Han, Guofei Jiang, Alice Leung, Thomas La Porta
Article No.: 16
A cyber-physical system (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a context-sensitive system that responds intelligently to dynamic changes in real-world situations. The CPS has wide...
Querying Discriminative and Representative Samples for Batch Mode Active Learning
Zheng Wang, Jieping Ye
Article No.: 17
Empirical risk minimization (ERM) provides a principled guideline for many machine learning and data mining algorithms. Under the ERM principle, one minimizes an upper bound of the true risk, which is approximated by the summation of empirical...
Hierarchical Bayesian Inference and Recursive Regularization for Large-Scale Classification
Siddharth Gopal, Yiming Yang
Article No.: 18
In this article, we address open challenges in large-scale classification, focusing on how to effectively leverage the dependency structures (hierarchical or graphical) among class labels, and how to make the inference scalable in jointly...
Section: TKDD Special Issue (SIGKDD'13)
This article proposes LA-LDA, a location-aware probabilistic generative model that exploits location-based ratings to model user profiles and produce recommendations. Most of the existing recommendation models do not consider the spatial...
In real tasks, usually a good classification performance can only be obtained when a good distance metric is obtained; therefore, distance metric learning has attracted significant attention in the past few years. Typical studies of distance...
Use of Local Group Information to Identify Communities in Networks
Sucheta Soundarajan, John E. Hopcroft
Article No.: 21
The recent interest in networks has inspired a broad range of work on algorithms and techniques to characterize, identify, and extract communities from networks. Such efforts are complicated by a lack of consensus on what a “community”...
Characterizing user pair relationships is important for applications such as friend recommendation and interest targeting in online social networks (OSNs). Due to the large-scale nature of such networks, it is infeasible to enumerate all user...
The emergence of cloud-based storage services is opening up new avenues in data exchange and data dissemination. This has amplified the interest in right-protection mechanisms to establish ownership in the event of data leakage. Current...
Universal and Distinct Properties of Communication Dynamics: How to Generate Realistic Inter-event Times
Pedro O. S. Vaz De Melo, Christos Faloutsos, Renato Assunção, Rodrigo Alves, Antonio A. F. Loureiro
Article No.: 24
With the advancement of information systems, means of communications are becoming cheaper, faster, and more available. Today, millions of people carrying smartphones or tablets are able to communicate practically any time and anywhere they want....
Social influence occurs when one’s opinions, emotions, or behaviors are affected by others in a social network. However, social influence takes many forms, and its underlying mechanism is still unclear. For example, how is one’s...