Social Computing: Challenges in Research and Applications
|
|
- Lee Grant
- 8 years ago
- Views:
Transcription
1 Social Computing: Challenges in Research and Applications Huan Liu, Shamanth Kumar, Fred Morstatters Conducting state-of-the-art research in data mining and machine learning, social computing, and artificial intelligence, dealing with realworld big data Data Mining and Machine Learning Lab 1
2 Computational Research with Social Media Community Analysis Provenance, Deception & Trust ACT Migration Influence & Diffusion Tweet & Blog Tracker Location based Social-network Analysis User Vulnerability Behavior Analysis Linked Feature Selection Data Mining and Machine Learning Lab 2
3 Seeking Provenance Using Network Information Social media lacks provenance information Users can t verify the source and the path To what extent the available network structure can be utilized? More knowledge about information would help in seeking disinformation centers, creating awareness, and curbing virulent spread Assam Exodus (July-Sept, 2012) Key Findings: The higher degree nodes closer to the recipients are more likely to be transmitters. There are edges in the network which are more likely to propagate information. Data Mining and Machine Learning Lab Huan.Liu@asu.edu 3
4 Trust in Social Networks Trust is an essential part of online relations but hard to establish and measure htrust - a large homophily coefficient indicates that users are more likely to establish trust relations mtrust - trust is not a single facet issue and people may not equally trust different facets of other users. Multi-Faceted Trust Key Findings: Homophily is an effective factor Differentiating facets is important Data Mining and Machine Learning Lab Huan.Liu@asu.edu 4
5 Community Detection Finding groups for users in social networks These groups indicate special interests, relations, friendships, etc. We introduce the concept of social dimensions, and system SocialDim to automatically find users different and overlapping communities Key Findings: A user with hundreds of friends can have many social circles These circles can change and evolve unexpectedly Data Mining and Machine Learning Lab Huan.Liu@asu.edu 5
6 Understanding User Migration Patterns in Social Media How and Where are people migrating to? Migration is inevitable Users are primary source of revenue New sites need to attract users, old sites need to retain users Types of Migration Site migration Attention migration a user becomes inactive on a site Longitudinal study across 3 months on 7 social media sites. Established migration patterns between social media sites Validated patterns via hypothesis testing. Demonstrated that these patterns can be capitalized by tracking High Net-Worth Individuals (HNWI) Data Mining and Machine Learning Lab Huan.Liu@asu.edu 6
7 Location-Based Social Networks Location data is a rich source of information on social media Social media websites are increasingly adding geolocation components We look for the ways we can use the user s historical location information and his social ties to predict his future locations and connections Applications Recommend new Points of Interest to a user according to his personal preference Facilitate the user to explore new areas of the city Promote business of mobile marketing Data Mining and Machine Learning Lab Huan.Liu@asu.edu 7
8 Managing User s Vulnerability How to manage user s vulnerability on a social networking site? Users share a large amount of personal information Often, a user is unaware that he could pose a threat to his friends Malicious individuals or groups may take advantage of openness and naivety of users Challenges: Measuring user vulnerability Defining vulnerable users and finding them Making users less vulnerable without suggesting fundamental changes to its architecture What if the vulnerable friends are of some importance such as girlfriend, boyfriend or influential friends? Data Mining and Machine Learning Lab Huan.Liu@asu.edu 8
9 Behavior Analysis, Mining across Social Media Analyzing behavior of individuals across social media Individuals are active on multiple social networks, sites, blogs, etc. Complementary information helps find new patterns and improve current applications Challenges How can we connect individuals? What is the minimum information required to connect an individual? Approach Utilizing Content information Systematic behavioral Modeling Key Findings Behaviors result in information redundancies Link information is rarely useful Benefits Recommendation across sites Advertising across networks Behavioral study: user migration Data Mining and Machine Learning Lab 9
10 Software Systems at the DMML TweetTracker (top): State-of-the-art analysis tool for tracking Twitter data in real time. Provides basic analysis tools in addition to real-time monitoring. Deployed at organizations like Humanity Road and ONR. TweetXplorer (bottom): Off-line analysis tool for data collected from TweetTracker. Provides more detailed analysis of data, including network information Encourages deep understanding through intuitive visualizations. ACT (not pictured): ASU Coordination Tracker Uses social media to track and enhance disaster response efforts at the site. Data Mining and Machine Learning Lab 10
11 Additional Information Textbook and Monographs Social Media Mining, Cambridge University Press, February, 2014 Twitter Data Analytics, Springer Briefs, 2013, Free Download Provenance Data in Social Media, Morgan & Claypool, May, 2013 Community Detection and Mining, Morgan & Claypool, August, 2010 Websites Social Computing Data Repository Feature Selection Data and Algorithms Respository Demos TweetTracker, and TweetXplorer ACT for Humanitarian Assistance and Disaster Relief Data Mining and Machine Learning Lab 11
12 Contact Information + Huan Liu, Professor of Computer Science & Eng. Fellow of IEEE, ACM Distinguished Scientist huanliu@asu.edu, dmml.asu.edu Recent Collaborators: CMU, UIUC, Boston U, GDIT, PDC Recent Users: HumanityRoad, USMA, Welcome to our lab poster display Sponsors: NSF, ONR, ARO, Yahoo! Labs (FREP) Data Mining and Machine Learning Lab Huan.Liu@asu.edu 12
Lessons Learned in Using Social Media for Disaster Relief - ASU Crisis Response Game
Lessons Learned in Using Social Media for Disaster Relief - ASU Crisis Response Game Mohammad-Ali Abbasi, Shamanth Kumar, Jose Augusto Andrade Filho, Huan Liu Computer Science and Engineering, Arizona
More informationNodes, Ties and Influence
Nodes, Ties and Influence Chapter 2 Chapter 2, Community Detec:on and Mining in Social Media. Lei Tang and Huan Liu, Morgan & Claypool, September, 2010. 1 IMPORTANCE OF NODES 2 Importance of Nodes Not
More informationFred Morstatter (330) 812-0898
Fred Morstatter (330) 812-0898 699 S. Mill Ave. fred.morstatter@asu.edu Tempe, AZ, 85281 http://www.fredmorstatter.com Education Arizona State University PhD in Computer Science Tempe, AZ Aug. 2011 - Present
More informationUnderstanding User Migration Patterns in Social Media
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence Understanding User Migration Patterns in Social Media Shamanth Kumar, Reza Zafarani, and Huan Liu Computer Science & Engineering,
More informationMining Social Media: A Brief Introduction
INFORMS 2012 c 2012 INFORMS isbn 978-0-9843378-3-5 http://dx.doi.org/10.1287/educ.1120.0105 Mining Social Media: A Brief Introduction Pritam Gundecha, Huan Liu Arizona State University, Tempe, Arizona
More informationSocial media has recently played a critical
C Y B E R - P H Y S I C A L - S O C I A L S Y S T E M S Editor: Daniel Zeng, University of Arizona, zeng@email.arizona.edu Harnessing the Crowdsourcing Power of Social Media for Disaster Relief Huiji Gao
More informationMALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of
More informationMINFS544: Business Network Data Analytics and Applications
MINFS544: Business Network Data Analytics and Applications March 30 th, 2015 Daning Hu, Ph.D., Department of Informatics University of Zurich F Schweitzer et al. Science 2009 Stop Contagious Failures in
More informationA Platform for Supporting Data Analytics on Twitter: Challenges and Objectives 1
A Platform for Supporting Data Analytics on Twitter: Challenges and Objectives 1 Yannis Stavrakas Vassilis Plachouras IMIS / RC ATHENA Athens, Greece {yannis, vplachouras}@imis.athena-innovation.gr Abstract.
More informationIntroduction. Chapter 1
This chapter is from Social Media Mining: An Introduction. By Reza Zafarani, Mohammad Ali Abbasi, and Huan Liu. Cambridge University Press, 2014. Draft version: April 20, 2014. Complete Draft and Slides
More informationDIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE
DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE INTRODUCTION RESEARCH IN PRACTICE PAPER SERIES, FALL 2011. BUSINESS INTELLIGENCE AND PREDICTIVE ANALYTICS
More informationOracle WebCenter Sites Mobility Server Enabling exceptional mobile and tablet web applications and web sites without compromise
Oracle WebCenter Sites Mobility Server Enabling exceptional mobile and tablet web applications and web sites without compromise Mobility Server offers state-of-the-art technology and a comprehensive solution
More informationSocial Influence Analysis in Social Networking Big Data: Opportunities and Challenges. Presenter: Sancheng Peng Zhaoqing University
Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges Presenter: Sancheng Peng Zhaoqing University 1 2 3 4 35 46 7 Contents Introduction Relationship between SIA and BD
More informationThe Software Industry and Software Engineering
The Software Industry and Software Engineering Dror Feitelson Basic Seminar on Software Engineering Hebrew University 2009 What Software Did You Use Today? We are usually unaware of most software... What
More informationSpam detection with data mining method:
Spam detection with data mining method: Ensemble learning with multiple SVM based classifiers to optimize generalization ability of email spam classification Keywords: ensemble learning, SVM classifier,
More informationMonitoring Database Management System (DBMS) Activity for Detecting Data Exfiltration by Insiders
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Monitoring Database Management System (DBMS) Activity for Detecting Data Exfiltration by Insiders Northrop Grumman Information Systems Donald Steiner,
More informationDiscover Viterbi: Computer Science
Discover Viterbi: Computer Science Gaurav S. Sukhatme Professor and Chairman USC Computer Science Department Meghan Balding Graduate & Professional Programs November 2, 2015 WebEx Quick Facts Will I be
More informationGuide: Social Media Metrics in Government
Guide: Social Media Metrics in Government Guide: Social Media Metrics in Government Why Social Media Metrics Matter to Your Agency In a digital strategy, nearly anything can be measured, compiled and analyzed.
More informationPROGRAM DIRECTOR: Arthur O Connor Email Contact: URL : THE PROGRAM Careers in Data Analytics Admissions Criteria CURRICULUM Program Requirements
Data Analytics (MS) PROGRAM DIRECTOR: Arthur O Connor CUNY School of Professional Studies 101 West 31 st Street, 7 th Floor New York, NY 10001 Email Contact: Arthur O Connor, arthur.oconnor@cuny.edu URL:
More informationThe University of Jordan
The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S
More informationRequirements When Considering a Next- Generation Firewall
White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration
More informationMeasuring User Credibility in Social Media
Measuring User Credibility in Social Media Mohammad-Ali Abbasi and Huan Liu Computer Science and Engineering, Arizona State University Ali.abbasi@asu.edu,Huan.liu@asu.edu Abstract. People increasingly
More informationJiliang Tang. 701 First Avenue Yahoo!, Voice: (408) 744-2053 E-mail: jlt@yahoo-inc.com Sunnyvale, CA, 94089 US. Contact Information
Jiliang Tang Contact Information Research Interests 701 First Avenue Yahoo!, Voice: (408) 744-2053 Yahoo Labs E-mail: jlt@yahoo-inc.com Sunnyvale, CA, 94089 US URL: http://www.public.asu.edu/~jtang20 Data
More informationDiscover Viterbi: New Programs in Computer Science
Discover Viterbi: New Programs in Computer Science Gaurav S. Sukhatme Professor and Chairman USC Computer Science Department Meghan McKenna Balding Graduate & Professional Programs April 23, 2013 WebEx
More informationUS Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)
US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST) william.newhouse@nist.gov NITRD Structure for US Federal Cybersecurity
More informationWhat Is In-Memory Computing and What Does It Mean to U.S. Leaders? EXECUTIVE WHITE PAPER
What Is In-Memory Computing and What Does It Mean to U.S. Leaders? EXECUTIVE WHITE PAPER A NEW PARADIGM IN INFORMATION TECHNOLOGY There is a revolution happening in information technology, and it s not
More informationHow To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
More informationCourse 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Oman College of Management and Technology Course 803401 DSS Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization CS/MIS Department Information Sharing
More informationIBM Big Data in Government
IBM Big in Government Turning big data into smarter decisions Deepak Mohapatra Sr. Consultant Government IBM Software Group dmohapatra@us.ibm.com The Big Paradigm Shift 2 Big Creates A Challenge And an
More informationNetwork Architectures & Services
Network Architectures & Services Fernando Kuipers (F.A.Kuipers@tudelft.nl) Multi-dimensional analysis Network peopleware Network software Network hardware Individual: Quality of Experience Friends: Recommendation
More informationMLg. Big Data and Its Implication to Research Methodologies and Funding. Cornelia Caragea TARDIS 2014. November 7, 2014. Machine Learning Group
Big Data and Its Implication to Research Methodologies and Funding Cornelia Caragea TARDIS 2014 November 7, 2014 UNT Computer Science and Engineering Data Everywhere Lots of data is being collected and
More informationChapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Turban, Aronson, and Liang Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
More informationVinay Parisa 1, Biswajit Mohapatra 2 ;
Predictive Analytics for Enterprise Modernization Vinay Parisa 1, Biswajit Mohapatra 2 ; IBM Global Business Services, IBM India Pvt Ltd 1, IBM Global Business Services, IBM India Pvt Ltd 2 vinay.parisa@in.ibm.com
More informationIndustrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced
More informationEMC ACADEMIC ALLIANCE
EMC ACADEMIC ALLIANCE Preparing the next generation of IT professionals for careers in virtualized and cloud environments. Equip your students with the broad and deep knowledge required in today s complex
More informationCustomer Driven Big-Data Analytics for the Companies Servitization
Customer Driven Big-Data Analytics for the Companies Servitization Eugen Molnár, Natalia Kryvinska, Michal Greguš Comenius University in Bratislava, Faculty of Management Principal interactions in a PSS
More informationBetween Friends Sites like Facebook are proving the value of the "social graph."
Page 1 of 10 March/April 2008 Between Friends Sites like Facebook are proving the value of the "social graph." By Erica Naone The idea of a social graph--a representation of a person's network of friends,
More informationViral Marketing in Social Network Using Data Mining
Viral Marketing in Social Network Using Data Mining Shalini Sharma*,Vishal Shrivastava** *M.Tech. Scholar, Arya College of Engg. & I.T, Jaipur (Raj.) **Associate Proffessor(Dept. of CSE), Arya College
More informationTECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING Sunghae Jun 1 1 Professor, Department of Statistics, Cheongju University, Chungbuk, Korea Abstract The internet of things (IoT) is an
More informationTransforming Big Data Into Smart Advertising Insights. Lessons Learned from Performance Marketing about Tracking Digital Spend
Transforming Big Data Into Smart Advertising Insights Lessons Learned from Performance Marketing about Tracking Digital Spend Transforming Big Data Into Smart Advertising Insights Lessons Learned from
More informationBreaking News! Big Data is Solved. What Is In-Memory Computing and What Does It Mean to U.S. Leaders? EXECUTIVE WHITE PAPER
Breaking News! Big Data is Solved. What Is In-Memory Computing and What Does It Mean to U.S. Leaders? EXECUTIVE WHITE PAPER There is a revolution happening in information technology, and it s not just
More informationAutomated Discovery and Visualization of Communication Networks from Social Media
Automated Discovery and Visualization of Communication Networks from Social Media Anatoliy Gruzd @gruzd gruzd@dal.ca Associate Professor, School of Information Management Director, Social Media Lab Faculty
More informationhmetrix Revolutionizing Healthcare Analytics with Vertica & Tableau
Powered by Vertica Solution Series in conjunction with: hmetrix Revolutionizing Healthcare Analytics with Vertica & Tableau The cost of healthcare in the US continues to escalate. Consumers, employers,
More informationFive Steps For Securing The Data Center: Why Traditional Security May Not Work
White Paper Five Steps For Securing The Data Center: Why Traditional Security May Not Work What You Will Learn Data center administrators face a significant challenge: They need to secure the data center
More informationA Hurwitz white paper. Inventing the Future. Judith Hurwitz President and CEO. Sponsored by Hitachi
Judith Hurwitz President and CEO Sponsored by Hitachi Introduction Only a few years ago, the greatest concern for businesses was being able to link traditional IT with the requirements of business units.
More informationWHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
More informationIronfan Your Foundation for Flexible Big Data Infrastructure
Ironfan Your Foundation for Flexible Big Data Infrastructure Benefits With Ironfan, you can expect: Reduced cycle time. Provision servers in minutes not days. Improved visibility. Increased transparency
More informationCapturing Meaningful Competitive Intelligence from the Social Media Movement
Capturing Meaningful Competitive Intelligence from the Social Media Movement Social media has evolved from a creative marketing medium and networking resource to a goldmine for robust competitive intelligence
More informationBlackStratus for Managed Service Providers
BLACKSTRATUS FOR MSP SOLUTION GUIDE PAGE TM BlackStratus for Managed Service Providers With BlackStratus MSP suite of solutions, you can quickly and effectively ramp up customer security offerings and
More informationAugmented Search for Software Testing
Augmented Search for Software Testing For Testers, Developers, and QA Managers New frontier in big log data analysis and application intelligence Business white paper May 2015 During software testing cycles,
More informationUnlocking the Intelligence in. Big Data. Ron Kasabian General Manager Big Data Solutions Intel Corporation
Unlocking the Intelligence in Big Data Ron Kasabian General Manager Big Data Solutions Intel Corporation Volume & Type of Data What s Driving Big Data? 10X Data growth by 2016 90% unstructured 1 Lower
More informationBUDT 758B-0501: Big Data Analytics (Fall 2015) Decisions, Operations & Information Technologies Robert H. Smith School of Business
BUDT 758B-0501: Big Data Analytics (Fall 2015) Decisions, Operations & Information Technologies Robert H. Smith School of Business Instructor: Kunpeng Zhang (kzhang@rmsmith.umd.edu) Lecture-Discussions:
More informationTIME TO RETHINK REAL-TIME BIG DATA ANALYTICS
TIME TO RETHINK REAL-TIME BIG DATA ANALYTICS Real-Time Big Data Analytics (RTBDA) has emerged as a new topic in big data discussions. The concepts underpinning RTBDA can be applied in a telecom context,
More informationAnnex: Concept Note. Big Data for Policy, Development and Official Statistics New York, 22 February 2013
Annex: Concept Note Friday Seminar on Emerging Issues Big Data for Policy, Development and Official Statistics New York, 22 February 2013 How is Big Data different from just very large databases? 1 Traditionally,
More informationPRACTICAL DATA SCIENCE
PRACTICAL DATA SCIENCE INFO-GB.3359.10 Fall 2013 SYLLABUS Professors Josh Attenberg Office; Hours Wednesdays 2-3, KMC 8-171 & By appointment Email jattenbe@stern.nyu.edu Emails should have subject tag:
More informationnfx One for Managed Service Providers
NFX FOR MSP SOLUTION GUIDE nfx One for Managed Service Providers With netforensics MSP suite of solutions, you can quickly and effectively ramp up customer security offerings and increase your bottom line
More informationExploring Big Data in Social Networks
Exploring Big Data in Social Networks virgilio@dcc.ufmg.br (meira@dcc.ufmg.br) INWEB National Science and Technology Institute for Web Federal University of Minas Gerais - UFMG May 2013 Some thoughts about
More informationData Mining & Data Stream Mining Open Source Tools
Data Mining & Data Stream Mining Open Source Tools Darshana Parikh, Priyanka Tirkha Student M.Tech, Dept. of CSE, Sri Balaji College Of Engg. & Tech, Jaipur, Rajasthan, India Assistant Professor, Dept.
More informationBig Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
More informationDecision Support Optimization through Predictive Analytics - Leuven Statistical Day 2010
Decision Support Optimization through Predictive Analytics - Leuven Statistical Day 2010 Ernst van Waning Senior Sales Engineer May 28, 2010 Agenda SPSS, an IBM Company SPSS Statistics User-driven product
More informationPOSITION STATEMENT ACADEMIC STAFF UTS:HUMAN RESOURCES
POSITION STATEMENT ACADEMIC STAFF UTS:HUMAN RESOURCES POSITION: FACULTY: Research Fellow: Data Science Connected Intelligence Centre, Office of the DVC (Education and Students) ACADEMIC SUPERVISOR S NAME:
More informationCymon.io. Open Threat Intelligence. 29 October 2015 Copyright 2015 esentire, Inc. 1
Cymon.io Open Threat Intelligence 29 October 2015 Copyright 2015 esentire, Inc. 1 #> whoami» Roy Firestein» Senior Consultant» Doing Research & Development» Other work include:» docping.me» threatlab.io
More informationContemporary Techniques for Data Mining Social Media
Contemporary Techniques for Data Mining Social Media Stephen Cutting (100063482) 1 Introduction Social media websites such as Facebook, Twitter and Google+ allow millions of users to communicate with one
More informationIJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS
IJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS V.Sudhakar 1 and G. Draksha 2 Abstract:- Collective behavior refers to the behaviors of individuals
More informationThe 2012 Data Informed Analytics and Data Survey
The 2012 Data Informed Analytics and Data Survey Table of Contents Page 2: Page 2: Page 4: Page 21: Page 36: Page 39 Introduction Who Responded? What They Want to Know What They Don t Understand Managing
More informationHow To Map Human Dynamics With Social Media For Disaster Alerts
Mapping Human Dynamics with Social Media for Disaster Alerts Dr. Ming-Hsiang Tsou mtsou@mail.sdsu.edu Professor of Geography, Director of the Center for Human Dynamics in the Mobile Age, San Diego State
More informationIBM Announces Eight Universities Contributing to the Watson Computing System's Development
IBM Announces Eight Universities Contributing to the Watson Computing System's Development Press release Related XML feeds Contact(s) information Related resources ARMONK, N.Y. - 11 Feb 2011: IBM (NYSE:
More informationKeeping Pace with Big Data
- A Data Mining Perspec>ve Huan Liu, Tempe, AZ hep://www.public.asu.edu/~huanliu NSF Workshop on Big Data Analy6cs for Infrastructure and Building Resilience and Sustainability, Beijing, China Sept 19-20,
More informationBad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
More informationReal-Time Analytics: Integrating Social Media Insights with Traditional Data
SAP Brief SAP Rapid Deployment s SAP HANA Sentiment Intelligence Rapid-Deployment Objectives Real-Time Analytics: Integrating Social Media Insights with Traditional Data Capturing customer sentiment from
More informationIDC MaturityScape Benchmark: Big Data and Analytics in Government. Adelaide O Brien Research Director IDC Government Insights June 20, 2014
IDC MaturityScape Benchmark: Big Data and Analytics in Government Adelaide O Brien Research Director IDC Government Insights June 20, 2014 IDC MaturityScape Benchmark: Big Data and Analytics in Government
More informationTestimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology
Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois
More informationWindows Server 2003 Migration: Take a Fresh Look at Your IT Infrastructure
EXECUTIVE BRIEF Windows Server 2003 Migration: Take a Fresh Look at Your IT Infrastructure Sponsored by: Symantec Carla Arend December 2014 Andrew Buss IDC Opinion Microsoft will be ending Extended Support
More informationSocial media has recently played a critical
C Y B E R - P H Y S I C A L - S O C I A L S Y S T E M S Editor: Daniel Zeng, University of Arizona, zeng@email.arizona.edu Harnessing the Crowdsourcing Power of Social Media for Disaster Relief Huiji Gao
More informationAn Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
More informationAdvanced In-Database Analytics
Advanced In-Database Analytics Tallinn, Sept. 25th, 2012 Mikko-Pekka Bertling, BDM Greenplum EMEA 1 That sounds complicated? 2 Who can tell me how best to solve this 3 What are the main mathematical functions??
More informationDelivering new insights and value to consumer products companies through big data
IBM Software White Paper Consumer Products Delivering new insights and value to consumer products companies through big data 2 Delivering new insights and value to consumer products companies through big
More informationMEASURING GLOBAL ATTENTION: HOW THE APPINIONS PATENTED ALGORITHMS ARE REVOLUTIONIZING INFLUENCE ANALYTICS
WHITE PAPER MEASURING GLOBAL ATTENTION: HOW THE APPINIONS PATENTED ALGORITHMS ARE REVOLUTIONIZING INFLUENCE ANALYTICS Overview There are many associations that come to mind when people hear the word, influence.
More informationData Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania ruxandra_stefania.petre@yahoo.com Over
More informationData Warehousing Fundamentals for IT Professionals. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2171973/ Data Warehousing Fundamentals for IT Professionals. 2nd Edition Description: Cutting-edge content and guidance from a data
More informationUnderstanding Your Customer Journey by Extending Adobe Analytics with Big Data
SOLUTION BRIEF Understanding Your Customer Journey by Extending Adobe Analytics with Big Data Business Challenge Today s digital marketing teams are overwhelmed by the volume and variety of customer interaction
More information"BIG DATA A PROLIFIC USE OF INFORMATION"
Ojulari Moshood Cameron University - IT4444 Capstone 2013 "BIG DATA A PROLIFIC USE OF INFORMATION" Abstract: The idea of big data is to better use the information generated by individual to remake and
More informationIMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD
Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated
More informationPanel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
More informationBig Data and Complex Networks Analytics. Timos Sellis, CSIT Kathy Horadam, MGS
Big Data and Complex Networks Analytics Timos Sellis, CSIT Kathy Horadam, MGS Big Data What is it? Most commonly accepted definition, by Gartner (the 3 Vs) Big data is high-volume, high-velocity and high-variety
More informationIBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
More informationConversion Optimization Tools
Conversion Optimization Tools Choosing the right optimization tools can make a significant difference to your bottom line. Learn all about the latest tools and how they can improve the volume of visitors
More informationIs big data the new oil fuelling development?
Is big data the new oil fuelling development? 12th National Convention on Statistics Manila, Philippines 2 October, 2013 Johannes Jütting PARIS21 Big data (2 The future? Linked data: Is this the future?..
More informationWhite Paper. How Streaming Data Analytics Enables Real-Time Decisions
White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream
More informationVisualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC
Visualization, Modeling and Predictive Analysis of Internet Attacks Thermopylae Sciences + Technology, LLC Administrative POC: Ms. Jeannine Feasel, jfeasel@t-sciences.com Technical POC: George Romas, gromas@t-sciences.com
More informationWhy your business decisions still rely more on gut feel than data driven insights.
Why your business decisions still rely more on gut feel than data driven insights. THERE ARE BIG PROMISES FROM BIG DATA, BUT FEW ARE CONNECTING INSIGHTS TO HIGH CONFIDENCE DECISION-MAKING 85% of Business
More informationUS Federal Cyber Security Research Program. NITRD Program
US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related
More informationChapter 5. Warehousing, Data Acquisition, Data. Visualization
Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization 5-1 Learning Objectives
More informationHOW WILL BIG DATA AFFECT RADIOLOGY (RESEARCH / ANALYTICS)? Ronald Arenson, MD
HOW WILL BIG DATA AFFECT RADIOLOGY (RESEARCH / ANALYTICS)? Ronald Arenson, MD DEFINITION OF BIG DATA Big data is a broad term for data sets so large or complex that traditional data processing applications
More informationProfessional. Compliance & Ethics. 19 The seven deadly sins of unethical organizations. 49 Anti-corruption and global supply chains
Compliance & Ethics April 2014 Professional a publication of the society of corporate compliance and ethics www.corporatecompliance.org Meet Tyrell J. Campbell Investigator Pinnacle Investigations, Inc.
More informationIBM QRadar Security Intelligence Platform appliances
IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event
More informationHow To Protect Your Mobile Device From Attack
Manage and Secure the Mobile Data, Not Just the Device Stijn Paumen VP Business Development, Wandera The Great Platform Shift 60,000,000 iphone BlackBerry 50,000,000 40,000,000 30,000,000 20,000,000 10,000,000
More informationAn Industrial Perspective on the Hadoop Ecosystem. Eldar Khalilov Pavel Valov
An Industrial Perspective on the Hadoop Ecosystem Eldar Khalilov Pavel Valov agenda 03.12.2015 2 agenda Introduction 03.12.2015 2 agenda Introduction Research goals 03.12.2015 2 agenda Introduction Research
More information