AMiner (ArnetMiner) Toward understanding big scholar data. Jie Tang Tsinghua University
|
|
- Lynette McDaniel
- 7 years ago
- Views:
Transcription
1 AMiner (ArnetMiner) Toward understanding big scholar data Jie Tang Tsinghua University [1] J. Tang, J. Zhang, L. Yao, J. Li, L. Zhang, and Z. Su. ArnetMiner: Extraction and Mining of Academic Social Networks. KDD 08. pp
2 An author-centric academic search and mining system
3 Expert Search Finding experts, for data mining 3 Demographics: gender, language, location, etc. Similar Authors Knowledge about data mining
4 Researcher Profile Basic Info. Research Interests Citation Statistics 4 Ego Network
5 p Academic search and mining system p Online since 006 p p p p >136 million researcher profiles >101 million publication papers >341 million requests AMiner 100K IP access from 170 countries per month p Deep analysis, mining, and search 5
6 User Distribution 8.3 million IP from 0 countries/regions 6
7 User Distribution 8.3 million IP from 0 countries/regions Top 10 countries 1. USA 6. Canada. China 7. Japan 3. Germany 8. Spain 4. India 9. France 5. UK 10. Italy 7
8 Technologies How to populate a semantic-based profile database for researchers? Extraction Integration Mining 8
9 1 1 9 Ruud Bolle DBLP: Ruud Bolle EE EE EE EE EE Extracting Semantics from the Web (ACM TKDD, WWW 1, ISWC 06, ICDM 07, ACL 07) Office: 1S-D58 Letters: IBM T.J. Watson Research Center video database indexing Contact Information Ruud Bolle P.O. Box 704 video processing 1 Office: 1S-D58 Yorktown Heights, NY USA visual human-computer interaction Letters: Packages: IBM T.J. Watson IBM T.J. Research Watson Center Research Center IBM T.J. Watson biometrics applications P.O. Box Skyline Drive Research Center Hawthorne, NY 1053 USA IBM T.J. Watson Research Yorktown Heights, NY USA Packages: IBM bolle@us.ibm.com T.J. Watson Research Center Research_Interest Center Research Staff 19 Skyline Drive 19 Skyline Drive Ruud M. Bolle was born in Voorburg, The Netherlands. He received the Bachelor's Affiliation Hawthorne, NY 1053 USA Hawthorne, NY 1053 USA Degree in Analog Electronics in bolle@us.ibm.com 1977 and the Master's Degree in Electrical Address IBM T.J. Watson Research Engineering in 1980, both from Delft University of Technology, Delft, The ecvg/people/bolle.html Position Center Ruud M. Netherlands. Bolle was born In 1983 in Voorburg, he received The the Netherlands. Master's Educational Degree He received in Applied the History Bachelor's Mathematics and in P.O. Box 704 Degree in 1984 Analog the Ph.D. Electronics in Electrical in 1977 Engineering and the Master's from Brown Degree University, in Electrical Providence, Rhode Address Yorktown Heights, Island. In 1984 he became a Research Staff Member at the IBM Thomas J. Watson Homepage Engineering in 1980, both from Delft University of Technology, Delft, The NY USA Netherlands. Research In 1983 Center in the Artificial Intelligence Department of Computer Science Department. Two he received the In 1988 he became questions: Master's Degree in Applied Mathematics and in 1984 the Ph.D. in Electrical Engineering from manager Brown of University, the newly formed Providence, Exploratory Rhode Computer Ruud Bolle Photo bolle@us.ibm.com Island. In Vision 1984 Group he became which a is Research part of the Staff Math Member Sciences at the Department. Name IBM Thomas J. Watson Research Center in the Artificial Intelligence Department of the Computer Science 1984 Phddate Ruud Bolle Bsdate 1977 Department. Currently, In 1988 his he research became interests manager are of focused the newly on formed video database Exploratory indexing, Computer video Phduniv Bsuniv Vision Group processing, which visual part human-computer of the Math Sciences interaction Department. and biometrics applications. Brown University 1 Phdmajor Delft University of Technology How to accurately extract Electrical Engineering the semantic-based Bsmajor Currently, Ruud his research M. Bolle interests is a Fellow are focused the IEEE on and video the database AIPR. He indexing, is Area Editor video of Computer Msdate processing, Vision visual and human-computer Image Understanding interaction and Associate and biometrics Editor applications. of Pattern Recognition. Ruud Analog Electronics 1980 M. Bolle is a Member profile the IBM Academy information of Academic Technology. Services from the Web? Msuniv Msmajor Msmajor Ruud M. Bolle is a Fellow of the IEEE and the AIPR. He is Area Editor of Computer Delft University of Technology Electrical Engineering Vision and Image Understanding and Associate Editor of Pattern Recognition. Ruud Co-author Applied Mathematics Co-author M. Bolle is a Member of the IBM Academy of Technology. How to deal with the name ambiguity problem? 006 Nalini K. Ratha, Jonathan Connell, Ruud M. Bolle, Sharat Chikkerur: Cancelable Biometrics: A Case Study in Fingerprints. ICPR (4) 006: Sharat Chikkerur, Sharath Pankanti, Alan Jea, Nalini K. Ratha, Ruud M. Bolle: Fingerprint Representation Using Localized Texture Features. ICPR (4) 006: Andrew Senior, Arun Hampapur, Ying-li Tian, Lisa Brown, Sharath Pankanti, Ruud M. Bolle: Appearance models for occlusion handling. Image Vision Comput. 4(11): (006) 005 Ruud M. Bolle, Jonathan H. Connell, Sharath Pankanti, Nalini K. Ratha, Andrew W. Senior: The Relation between the ROC Curve and the CMC. AutoID 005: 15-0 Sharat Chikkerur, Venu Govindaraju, Sharath Pankanti, Ruud M. Bolle, Nalini K. Ratha: Novel Approaches for Minutiae Verification in Fingerprint Images. WACV. 005: Publications Title Cancelable Biometrics: A Case Study in Fingerprints Publication #3 Publication #5 Publication 1# ICPR 370 Date Venue End_page Start_page coauthor coauthor Title Fingerprint Representation Using Localized Texture Features Ruud Bolle Publication # ICPR 51 Date Venue End_page Start_page affiliation position UIUC Professor
10 Researcher Network Extraction [1,] Research_Interest Affiliation Postion Person Photo Homepage Name Phddate Phduniv Phdmajor Coauthor Researcher Msdate Msuniv Fax Phone Address Msmajor Authored Bsdate Bsuniv Bsmajor Title Publication_venue Start_page Publication End_page Date 70.60% of the researchers have at least one homepage or an introducing page 85.6% from universities 71.9% are homepages 40% are in lists and tables 14.4% from companies 8.1% are introducing pages 60% are natural language text There are a large number of person names having the ambiguity problem Even 3 Yi Li graduated the author s lab 70% moved at least one time [1] J. Tang, L. Yao, D. Zhang, and J. Zhang. A Combination Approach to Web User Profiling. ACM Transactions on Knowledge Discovery from Data (TKDD), (vol. 5 no. 1), Article (December 010), 44 pages. 10 [] J. Tang, D. Zhang, and L. Yao. Social Network Extraction of Academic Researchers. ICDM 07. pp
11 Our Approach Picture based on Markov Random Field Markov Property: Y a Y b { } PY ( Y Y Y ) i j j i { } = PY ( Y Y ~ Y ) i j j i Y d Y c Y e Special Cases: - Conditional Random Fields - Hidden Markov Random Fields Y f y 4= y 9=3 y 1=1 co-conference y =1 cite y 3=1 t-coauthor y 7= cite y 5= y 6= cite co-conference y 8=1 coauthor y 10=3 coauthor coauthor y 11=3 coauthor x 4 x 9 11 Researcher Profiling x 1 Name Disambiguation x x 3 x 5 x 6 x 7 x 11 x 8 x 10
12 Researcher Profile Database Extracted more than 1,000,000 researcher profiles from the Web J. Tang, L. Yao, D. Zhang, and J. Zhang. A Combination Approach to Web User Profiling. ACM Transactions on Knowledge Discovery from Data (TKDD), (vol. 5 no. 1), Article (December 010), 44 pages. 1
13 Name Disambiguation Name Affiliation Shanghai Jiao Tong Univ. Yunnan Univ. Tsinghua Univ. Jing Zhang (6) Alabama Univ. Univ. of California, Davis Carnegie Mellon University Henan Institute of Education - How to perform the assignment automatically? - How to estimate the person number? [1] J. Tang, A.C.M. Fong, B. Wang, and J. Zhang. A Unified Probabilistic Framework for Name Disambiguation in Digital Library. IEEE Transaction on Knowledge and Data Engineering (TKDE), Volume 4, Issue 6, 01, Pages [] X. Wang, J. Tang, H. Cheng, and P. S. Yu. ADANA: Active Name Disambiguation. ICDM 11, pages , 011.
14 Our Method to Name Disambiguation y 1 =1 co-conference y =1 cite y 3 =1 y 4 = y 9 =3 t-coauthor y 7 = coauthor cite y 5 = y 10 =3 y 6 = coauthor cite coauthor co-conference y 11 =3 y 8 =1 coauthor A hidden Markov Random Field model Observable Variables X represent publications x 4 x 9 Hidden Variables Y represent the labels of publications x 1 x x 3 x 5 x 6 x 7 x 8 x 11 x 10 Paper relationships define the dependencies over hidden variables J. Tang, A.C.M. Fong, B. Wang, and J. Zhang. A Unified Probabilistic Framework for Name Disambiguation in Digital Library. IEEE Transaction on Knowledge and Data Engineering (TKDE), Volume 4, Issue 6, 01, Pages
15 Disambiguation Performance ADANA Sacluser CONSTRAINT HAC DISTINCT
16 Still problems? P1: error propagation in the profile extraction Homepage finding Profile extraction from the identified pages P: the accurately extracted semantics are not really accurate? 16
17 17 Is this Enough?
18 Semantics are distributed Wikipedia Homepage LinkedIn AMiner 18
19 Integrating Semantics across Networks Identifying users from multiple heterogeneous networks and integrating semantics from the different networks together. LinkedIn WikiPedia Jeannette Wing Jeannette Wing Google Scholar 19 AMiner
20 Local + Global consistency AMiner v 1 1 Network matching 网络一致性 v 1 v 1 G 1 v 1 1 Username: Ortiz_Brandy Nation: USA Gender: female v 3 1 Global 全局一致性 inconsistency Local 局部一致性 consistency v 1 3 Nation: USA Gender: female v 1 v 1 x 1 v 1 1 v 1 v 1 3 x v 1 3 x Inconsistent! G v 1 v 1 3 v v 3 v 3 v 3 3 G 3 x v 1 1 x v 1 x v 1 3 0
21 COSNET: Connecting Social Networks with Local and Global Consistency f e (y 1, y ) y f e (y, y 3 ) G 1 v 1 1 y 1 f e (y, y 4 ) f e (y, y 5 ) y 3 v 1 1 v 1 v 1 1 v v 1 1 v 3 v 1 1 v 1 v 1 1 v 3 y 4 y 5 v 1 v 3 1 s v 1 v 1 v 1 v v 1 v 3 v 1 v f l (x 1 ) f l (x ) f l (x 4 ) f l (x 5 ) f l (x 3 ) G v v 1 v 3 Matching Graph Generation v 3 1 v 1 v 3 1 v v 3 1 v 3 Candidate Pruning v 3 1 v 1 v 3 1 v 3 Model Construction x 1 x x 3 v 1 1 v 1 x 4 x 5 v 3 1 v 1 v 1 v v 3 1 v 3 v 1 1 v 3 (a) Two input networks (b) The generated matching graph (c) Matching graph after pruning (d) The constructed model Yutao Zhang, Jie Tang, Zhilin Yang, Jian Pei, and Philip Yu. COSNET: Connecting Heterogeneous Social Networks with Local and Global 1 Consistency. KDD 15, page
22 AMiner
23 AMiner Ego Network 3
24 Network Semantics How to mine semantics within networks? Who are Jiawei Han s students and advisor? 4
25 Mining Network Semantics Input: Temporal collaboration network 1999 Output: Semantic Relationship network analysis (0.9, [/, 1998]) Ada 000 Bob Ada (0.4, [/, 1998]) (0.5, [/, 000]) 000 (0.8, [1999,000]) Ying Smith Jerry Bob (0.7, [000, 001]) (0.65, [00, 004]) Ying (0.49, [/, 1999]) Jerry (0., [001, 003]) 004 Smith C. Wang, J. Han, Y. Jia, J. Tang, D. Zhang, Y. Yu, and J. Guo. Mining Advisor-Advisee Relationships from Research Publication 5 Networks. KDD'10, pages 03-1.
26 Partially Labeled Pairwise Factor Graph Model (PLP-FGM) Constraint factor h Input: Social Network v 4 v 3 v 5 v v 1 PLP-FGM y 1 =Friend y 1 =advisor y 1 Latent Variable h (y 1, y 1 ) y 1 g (y 1, y 34 ) g (y 1,y 45 ) f(x,x 1,y 1 ) f(x 1,x,y 1 ) y 1 =advisee y 1 =Friend r 1 r 34 r 1 y 34 =? y 34 f(x 3,x 4,y 34 ) g (y 45, y 34 ) y 45 y 34 y 16 =coauthor y 16 =Other f(x 4,x 5,y 45 ) r 34 r 45 Wenbin Tang, Honglei Zhuang, and Jie Tang. Learning to Infer Social Ties in Large Networks. In ECML/PKDD'011. pp (Best Student Paper Runner-up) y 34 =? f(x 3,x 4,y 34 ) Correlation factor g relationships Attribute factors f Input Model Map relationship to nodes in model Example: Example: #Coauthored Author papers A has by a two longer authors? publication history than both B and C.
27 AMiner Ego Network 7
28 Why you will love AMiner? finding collaborations, applying PhD, reviewing, recruiting Related publications: ACM TKDD (), IEEE TKDE (3), KDD 08-15, WWW 1-15,J. Informetrics, SIGMOD 09, IJCAI 09-15, ICML 14 8
29 Examples Expert search When starting a Work on a new research topic; Or brainstorming for novel ideas. Researcher Who are experts in this field? What are the top conferences in the field? What are the best papers? What are the top research labs? 9
30 Examples Collaboration Recommendation Data Mining Theory Large Graph Heterogeneous Network Social Network 30
31 Examples More Challenging Questions Organization or Agency Looking for researchers from the U.S. who can speak Chinese Want to recruit female researchers working on WSDM 31
32 Examples Reviewer Suggestion Conf. Committee Journal Editors Who are best matching reviewers for each paper? Who will accept the invitation to review the paper Paper content 3
33 33 Applications
34 Data Mining Experts 34
35 35 NSFC (NSF of China) proposal reviewer recommendation
36 Integration with ScholarOne Find the extension reviewer recommender from Chrome Web Store 36 ScholarOne is a submission management system used by many journals such as IEEE Transactions and ACM Transactions.
37 37 Knowledge Trend for AI
38 Organization By different metrics Ranking 38
39 Widely used.. l l The largest publisher: Elsevier Conferences KDD WSDM 011 ICDM 011 ICDM 01 SocInfo 011 ICMLA 011 WAIM 011 etc. 39
40 40 Academic Social Platform
41 41
42 4
43 43
44 44
45 45 Open Big Scholar Data
46 Citation Network 46
47 Collaboration Network with Rich Semantics 47
48 AMiner (ArnetMiner) Toward understanding big scholar data Semantics + Social + Open Data Science of Science! [1] J. Tang, J. Zhang, L. Yao, J. Li, L. Zhang, and Z. Su. ArnetMiner: Extraction and Mining of Academic Social Networks. KDD 08. pp
49 AMiner (ArnetMiner) Toward understanding big scholar data Thanks to our partners [1] J. Tang, J. Zhang, L. Yao, J. Li, L. Zhang, and Z. Su. ArnetMiner: Extraction and Mining of Academic Social Networks. KDD 08. pp
50 AMiner (ArnetMiner) Toward understanding big scholar data Special 50 thanks to Yuxiao Dong from ND for helping cook the slides!
51 Why AMiner.org Academic search was treated as document search, but ignored semantics 51
Social Prediction in Mobile Networks: Can we infer users emotions and social ties?
Social Prediction in Mobile Networks: Can we infer users emotions and social ties? Jie Tang Tsinghua University, China 1 Collaborate with John Hopcroft, Jon Kleinberg (Cornell) Jinghai Rao (Nokia), Jimeng
More informationMALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of
More informationMachine Learning Department, School of Computer Science, Carnegie Mellon University, PA
Pengtao Xie Carnegie Mellon University Machine Learning Department School of Computer Science 5000 Forbes Ave Pittsburgh, PA 15213 Tel: (412) 916-9798 Email: pengtaox@cs.cmu.edu Web: http://www.cs.cmu.edu/
More informationTeaching in School of Electronic, Information and Electrical Engineering
Introduction to Teaching in School of Electronic, Information and Electrical Engineering Shanghai Jiao Tong University Outline Organization of SEIEE Faculty Enrollments Undergraduate Programs Sample Curricula
More informationCollective Behavior Prediction in Social Media. Lei Tang Data Mining & Machine Learning Group Arizona State University
Collective Behavior Prediction in Social Media Lei Tang Data Mining & Machine Learning Group Arizona State University Social Media Landscape Social Network Content Sharing Social Media Blogs Wiki Forum
More informationInternational Ranking. Institutional Research
International Ranking & Institutional Research Yang Zhang, Director of Institutional Research, University of Hawaii at Mānoa Diana Bitting, representing the Thomson Reuters Profiles Project Baerbel Eckelmann,
More informationGet To the Top and Stay There: A Study of Citation Rank Dynamics in Academia
Get To the Top and Stay There: A Study of Citation Rank Dynamics in Academia Yan Wu Department of Information Engineering The Chinese University of Hong Kong Shatin, Hong Kong yanwu@ie.cuhk.edu.hk Srini
More informationSemantic Web Development in China
Semantic Web Development in China Outline Web development in China Semantic Web communities in China Semantic Web projects in China IODT from IBM Research China Falcon from Southeast University APEX from
More informationData Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
More informationIJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS
IJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS V.Sudhakar 1 and G. Draksha 2 Abstract:- Collective behavior refers to the behaviors of individuals
More informationSix Degrees of Separation in Online Society
Six Degrees of Separation in Online Society Lei Zhang * Tsinghua-Southampton Joint Lab on Web Science Graduate School in Shenzhen, Tsinghua University Shenzhen, Guangdong Province, P.R.China zhanglei@sz.tsinghua.edu.cn
More informationAntonino Freno. Curriculum Vitae. Phone (office): Office: +33 (0)3 59 35 87 27. antonino.freno@inria.fr; http://researchers.lille.inria.fr/~freno/.
Antonino Freno Curriculum Vitae Personal Information First name: Antonino Family name: Freno Date of birth: July 1, 1980 Place of birth: Reggio Calabria (RC) Italy Citizenship: Italian Phone (office):
More informationJiliang Tang. 701 First Avenue Yahoo!, Voice: (408) 744-2053 E-mail: jlt@yahoo-inc.com Sunnyvale, CA, 94089 US. Contact Information
Jiliang Tang Contact Information Research Interests 701 First Avenue Yahoo!, Voice: (408) 744-2053 Yahoo Labs E-mail: jlt@yahoo-inc.com Sunnyvale, CA, 94089 US URL: http://www.public.asu.edu/~jtang20 Data
More informationMATTEO RIONDATO Curriculum vitae
MATTEO RIONDATO Curriculum vitae 100 Avenue of the Americas, 16 th Fl. New York, NY 10013, USA +1 646 292 6641 riondato@acm.org http://matteo.rionda.to EDUCATION Ph.D. Computer Science, Brown University,
More informationVisual Analytics and Information Fusion
Visual Analytics and Information Fusion Data in many real world applications may arise from multiple sources, and can be viewed from different aspects. It is a significant analytical challenge to extract
More informationData Mining: Opportunities and Challenges
Data Mining: Opportunities and Challenges Xindong Wu University of Vermont, USA; Hefei University of Technology, China ( 合 肥 工 业 大 学 计 算 机 应 用 长 江 学 者 讲 座 教 授 ) 1 Deduction Induction: My Research Background
More informationDoctoral Education Quality Assurance System of Shanghai Jiao Tong University. Yaguang Wang Nov.14, 2014
Doctoral Education Quality Assurance System of Shanghai Jiao Tong University Yaguang Wang Nov.14, 2014 Contents Ⅰ. Basic Information of Doctoral Education Ⅱ. Quality Assurance System of Doctoral Education
More informationCorporate Leaders Analytics and Network System (CLANS): Constructing and Mining Social Networks among Corporations and Business Elites in China
Corporate Leaders Analytics and Network System (CLANS): Constructing and Mining Social Networks among Corporations and Business Elites in China Yuanyuan Man, Shuai Wang, Yi Li, Yong Zhang, Long Cheng,
More informationEmmanouil Papangelis (Manos Papagelis)
Emmanouil Papangelis (Manos Papagelis) 2919 1/2B Shattuck Ave, Berkeley, CA, 94705, United States +1.647.995.8500 (cell) papaggel@berkeley.edu http://www.ischool.berkeley.edu/people/faculty/manospapagelis
More informationUsing i for Transformational Creativity in Requirements Engineering
Using i for Transformational Creativity in Requirements Engineering Sushma Rayasam and Nan Niu Department of EECS, University of Cincinnati Cincinnati, OH, USA 45221 rayasasa@mail.uc.edu, nan.niu@uc.edu
More informationUser Modeling in Big Data. Qiang Yang, Huawei Noah s Ark Lab and Hong Kong University of Science and Technology 杨 强, 华 为 诺 亚 方 舟 实 验 室, 香 港 科 大
User Modeling in Big Data Qiang Yang, Huawei Noah s Ark Lab and Hong Kong University of Science and Technology 杨 强, 华 为 诺 亚 方 舟 实 验 室, 香 港 科 大 Who we are: Noah s Ark LAB Have you watched the movie 2012?
More informationWeb Mining Seminar CSE 450. Spring 2008 MWF 11:10 12:00pm Maginnes 113
CSE 450 Web Mining Seminar Spring 2008 MWF 11:10 12:00pm Maginnes 113 Instructor: Dr. Brian D. Davison Dept. of Computer Science & Engineering Lehigh University davison@cse.lehigh.edu http://www.cse.lehigh.edu/~brian/course/webmining/
More informationNAVIGATING SCIENTIFIC LITERATURE A HOLISTIC PERSPECTIVE. Venu Govindaraju
NAVIGATING SCIENTIFIC LITERATURE A HOLISTIC PERSPECTIVE Venu Govindaraju BIOMETRICS DOCUMENT ANALYSIS PATTERN RECOGNITION 8/24/2015 ICDAR- 2015 2 Towards a Globally Optimal Approach for Learning Deep Unsupervised
More informationStatic Data Mining Algorithm with Progressive Approach for Mining Knowledge
Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 85-93 Research India Publications http://www.ripublication.com Static Data Mining Algorithm with Progressive
More informationProject Participants
Annual Report for Period:10/2006-09/2007 Submitted on: 08/15/2007 Principal Investigator: Yang, Li. Award ID: 0414857 Organization: Western Michigan Univ Title: Projection and Interactive Exploration of
More informationCurriculum Vitae. 1 Person Dr. Horst O. Bunke, Prof. Em. Date of birth July 30, 1949 Place of birth Langenzenn, Germany Citizenship Swiss and German
Curriculum Vitae 1 Person Name Dr. Horst O. Bunke, Prof. Em. Date of birth July 30, 1949 Place of birth Langenzenn, Germany Citizenship Swiss and German 2 Education 1974 Dipl.-Inf. Degree from the University
More informationSOCIAL NETWORK DATA ANALYTICS
SOCIAL NETWORK DATA ANALYTICS SOCIAL NETWORK DATA ANALYTICS Edited by CHARU C. AGGARWAL IBM T. J. Watson Research Center, Yorktown Heights, NY 10598, USA Kluwer Academic Publishers Boston/Dordrecht/London
More informationResearch on the cloud platform resource management technology for surveillance video analysis
Research on the cloud platform resource management technology for surveillance video analysis Yonglong Zhuang 1*, Xiaolan Weng 2, Xianghe Wei 2 1 Modern Educational Technology Center, Huaiyin rmal University,
More informationInformation Management course
Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli (alberto.ceselli@unimi.it)
More informationParallel Data Mining. Team 2 Flash Coders Team Research Investigation Presentation 2. Foundations of Parallel Computing Oct 2014
Parallel Data Mining Team 2 Flash Coders Team Research Investigation Presentation 2 Foundations of Parallel Computing Oct 2014 Agenda Overview of topic Analysis of research papers Software design Overview
More informationBlog Post Extraction Using Title Finding
Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School
More informationSEARCH ENGINE OPTIMIZATION USING D-DICTIONARY
SEARCH ENGINE OPTIMIZATION USING D-DICTIONARY G.Evangelin Jenifer #1, Mrs.J.Jaya Sherin *2 # PG Scholar, Department of Electronics and Communication Engineering(Communication and Networking), CSI Institute
More informationRESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics
FENG GU Assistant Professor of Computer Science College of Staten Island, City University of New York 2800 Victory Boulevard, Staten Island, NY 10314 Doctoral Faculty of Computer Science Graduate Center
More informationNetwork Big Data: Facing and Tackling the Complexities Xiaolong Jin
Network Big Data: Facing and Tackling the Complexities Xiaolong Jin CAS Key Laboratory of Network Data Science & Technology Institute of Computing Technology Chinese Academy of Sciences (CAS) 2015-08-10
More informationII. OLAP(ONLINE ANALYTICAL PROCESSING)
Association Rule Mining Method On OLAP Cube Jigna J. Jadav*, Mahesh Panchal** *( PG-CSE Student, Department of Computer Engineering, Kalol Institute of Technology & Research Centre, Gujarat, India) **
More informationKarthik Sridharan. 424 Gates Hall Ithaca, E-mail: sridharan@cs.cornell.edu http://www.cs.cornell.edu/ sridharan/ Contact Information
Karthik Sridharan Contact Information 424 Gates Hall Ithaca, NY 14853-7501 USA E-mail: sridharan@cs.cornell.edu http://www.cs.cornell.edu/ sridharan/ Research Interests Machine Learning, Statistical Learning
More informationTop Top 10 Algorithms in Data Mining
ICDM 06 Panel on Top Top 10 Algorithms in Data Mining 1. The 3-step identification process 2. The 18 identified candidates 3. Algorithm presentations 4. Top 10 algorithms: summary 5. Open discussions ICDM
More informationAn Introduction to Data Mining
An Introduction to Intel Beijing wei.heng@intel.com January 17, 2014 Outline 1 DW Overview What is Notable Application of Conference, Software and Applications Major Process in 2 Major Tasks in Detail
More informationA Solution for Data Inconsistency in Data Integration *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 681-695 (2011) A Solution for Data Inconsistency in Data Integration * Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai,
More informationCurriculum Vitae. Summer internship in a financial company that is active in quantitative analysis or development of quantitative
Curriculum Vitae XIAOXIAO SHI Department of Computer Science University of Illinois at Chicago Office: 851 S. Morgan St., Rm 1336 SEO, Chicago, IL 60607 xshi9@uic.edu, xiao.x.shi@gmail.com (preferred)
More informationRandom forest algorithm in big data environment
Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest
More informationDiscovering Social Media Experts by Integrating Social Networks and Contents
Proceedings of the Twenty-Third Australasian Database Conference (ADC 2012), Melbourne, Australia Discovering Social Media Experts by Integrating Social Networks and Contents Zhao Zhang Bin Zhao Weining
More informationA Time Efficient Algorithm for Web Log Analysis
A Time Efficient Algorithm for Web Log Analysis Santosh Shakya Anju Singh Divakar Singh Student [M.Tech.6 th sem (CSE)] Asst.Proff, Dept. of CSE BU HOD (CSE), BUIT, BUIT,BU Bhopal Barkatullah University,
More informationInternational Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014 442 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014 442 Over viewing issues of data mining with highlights of data warehousing Rushabh H. Baldaniya, Prof H.J.Baldaniya,
More informationResearch of Postal Data mining system based on big data
3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Research of Postal Data mining system based on big data Xia Hu 1, Yanfeng Jin 1, Fan Wang 1 1 Shi Jiazhuang Post & Telecommunication
More informationDiscover Viterbi: New Programs in Computer Science
Discover Viterbi: New Programs in Computer Science Gaurav S. Sukhatme Professor and Chairman USC Computer Science Department Meghan McKenna Balding Graduate & Professional Programs April 23, 2013 WebEx
More informationIntroduction to Data Mining. Lijun Zhang zlj@nju.edu.cn http://cs.nju.edu.cn/zlj
Introduction to Data Mining Lijun Zhang zlj@nju.edu.cn http://cs.nju.edu.cn/zlj Outline Overview Introduction The Data Mining Process The Basic Data Types The Major Building Blocks Scalability and Streaming
More informationThe Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
More informationAcademic Ranking of World Universities And the Performance of Asia Pacific Universities
Academic Ranking of World Universities And the Performance of Asia Pacific Universities Prof. Nian Cai LIU and Dr. Ying CHENG Center for World-Class Universities, Graduate School of Education Shanghai
More informationTop 10 Algorithms in Data Mining
Top 10 Algorithms in Data Mining Xindong Wu ( 吴 信 东 ) Department of Computer Science University of Vermont, USA; 合 肥 工 业 大 学 计 算 机 与 信 息 学 院 1 Top 10 Algorithms in Data Mining by the IEEE ICDM Conference
More informationUsable Multi-Factor Authentication and Risk-Based Authorization
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Usable Multi-Factor Authentication and Risk-Based Authorization IBM T. J. Watson Research Center Larry Koved, Research Staff Member 17 September 2013
More informationResume of Hanan H. Elazhary
Resume of Hanan H. Elazhary Home Phone: 35853017, 35853986 Cell Phone: 0112302019 E-mail: hanan@eri.sci.eg, hananelazhary@hotmail.com Nationality: Egyptian Gender: Female EDUCATION Ph.D. in Computer Science
More informationIBM Announces Eight Universities Contributing to the Watson Computing System's Development
IBM Announces Eight Universities Contributing to the Watson Computing System's Development Press release Related XML feeds Contact(s) information Related resources ARMONK, N.Y. - 11 Feb 2011: IBM (NYSE:
More informationExploration and Visualization of Post-Market Data
Exploration and Visualization of Post-Market Data Jianying Hu, PhD Joint work with David Gotz, Shahram Ebadollahi, Jimeng Sun, Fei Wang, Marianthi Markatou Healthcare Analytics Research IBM T.J. Watson
More informationMining Signatures in Healthcare Data Based on Event Sequences and its Applications
Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Siddhanth Gokarapu 1, J. Laxmi Narayana 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India 1
More informationA Comparative Study on Sentiment Classification and Ranking on Product Reviews
A Comparative Study on Sentiment Classification and Ranking on Product Reviews C.EMELDA Research Scholar, PG and Research Department of Computer Science, Nehru Memorial College, Putthanampatti, Bharathidasan
More informationWeb Database Integration
Web Database Integration Wei Liu School of Information Renmin University of China Beijing, 100872, China gue2@ruc.edu.cn Xiaofeng Meng School of Information Renmin University of China Beijing, 100872,
More informationMing-Wei Chang. Machine learning and its applications to natural language processing, information retrieval and data mining.
Ming-Wei Chang 201 N Goodwin Ave, Department of Computer Science University of Illinois at Urbana-Champaign, Urbana, IL 61801 +1 (917) 345-6125 mchang21@uiuc.edu http://flake.cs.uiuc.edu/~mchang21 Research
More informationDegree Recognition & its Impact on Student Mobility
Degree Recognition & its Impact on Student Mobility Mariam Assefa Executive Director World Education Services DAAD Seminar NAFSA 2009 INTERNATIONAL EDUCATION INTELLIGENCE Content The context The environment
More informationTIETS34 Seminar: Data Mining on Biometric identification
TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland Youming.Zhang@uta.fi Course Description Content
More informationHaiyi ZHU Curriculum Vitae
Haiyi ZHU ( ) Contact Department of Computer Science & Engineering University of Minnesota, Twin Cities 200 Union Street S.E. Minneapolis, MN 55455 Phone: 412-799-3769 Email: Website: http://haiyizhu.com
More informationAn Automatic and Accurate Segmentation for High Resolution Satellite Image S.Saumya 1, D.V.Jiji Thanka Ligoshia 2
An Automatic and Accurate Segmentation for High Resolution Satellite Image S.Saumya 1, D.V.Jiji Thanka Ligoshia 2 Assistant Professor, Dept of ECE, Bethlahem Institute of Engineering, Karungal, Tamilnadu,
More informationScalable Multiple NameNodes Hadoop Cloud Storage System
Vol.8, No.1 (2015), pp.105-110 http://dx.doi.org/10.14257/ijdta.2015.8.1.12 Scalable Multiple NameNodes Hadoop Cloud Storage System Kun Bi 1 and Dezhi Han 1,2 1 College of Information Engineering, Shanghai
More informationData Mining & Data Stream Mining Open Source Tools
Data Mining & Data Stream Mining Open Source Tools Darshana Parikh, Priyanka Tirkha Student M.Tech, Dept. of CSE, Sri Balaji College Of Engg. & Tech, Jaipur, Rajasthan, India Assistant Professor, Dept.
More informationKaiquan Xu, Associate Professor, Nanjing University. Kaiquan Xu
Kaiquan Xu Marketing & ebusiness Department, Business School, Nanjing University Email: xukaiquan@nju.edu.cn Tel: +86-25-83592129 Employment Associate Professor, Marketing & ebusiness Department, Nanjing
More informationCitationBase: A social tagging management portal for references
CitationBase: A social tagging management portal for references Martin Hofmann Department of Computer Science, University of Innsbruck, Austria m_ho@aon.at Ying Ding School of Library and Information Science,
More informationMATHEMATICAL LOGIC FOR COMPUTER SCIENCE
MATHEMATICAL LOGIC FOR COMPUTER SCIENCE Second Edition WORLD SCIENTIFIC SERIES IN COMPUTER SCIENCE 25: Computer Epistemology A Treatise on the Feasibility of the Unfeasible or Old Ideas Brewed New (T Vamos)
More informationFingerprint s Core Point Detection using Gradient Field Mask
Fingerprint s Core Point Detection using Gradient Field Mask Ashish Mishra Assistant Professor Dept. of Computer Science, GGCT, Jabalpur, [M.P.], Dr.Madhu Shandilya Associate Professor Dept. of Electronics.MANIT,Bhopal[M.P.]
More informationMA2823: Foundations of Machine Learning
MA2823: Foundations of Machine Learning École Centrale Paris Fall 2015 Chloé-Agathe Azencot Centre for Computational Biology, Mines ParisTech chloe agathe.azencott@mines paristech.fr TAs: Jiaqian Yu jiaqian.yu@centralesupelec.fr
More informationVeracity in Big Data Reliability of Routes
Veracity in Big Data Reliability of Routes Dr. Tobias Emrich Post-Doctoral Scholar Integrated Media Systems Center (IMSC) Viterbi School of Engineering University of Southern California Los Angeles, CA
More informationENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES
International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 2, March-April 2016, pp. 24 29, Article ID: IJCET_07_02_003 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=2
More informationResearch on Distributed Knowledge Base System Architecture for Knowledge Sharing of Virtual Organization
Research on Distributed Knowledge Base System Architecture for Knowledge Sharing of Virtual Organization Ruzhi Xu 1,2 Peiguang Lin 1 Cheng Liu 1 1 School of Computer & Information Engineering, Shandong
More informationInSciTe Project. Hanmin Jung Head of the Dept. of Computer Intelligence Research. Copyright 2013, KISTI. MSRA Meeting (2013.1)
InSciTe Project Hanmin Jung Head of the Dept. of Computer Intelligence Research KISTI Institute of Advanced Information S/W Research Center Dept. of Computer Intelligence Research Human vs. Machine Intelligence
More informationInvestigation and Study on the Present Situation of Enterprise Website Construction of Intellectual Property Agencies
2732 JOURNAL OF SOFTWARE, VOL. 9, NO. 10, OCTOBER 2014 Investigation and Study on the Present Situation of Enterprise Website Construction of Intellectual Property Agencies Xiaohong Wang Management College
More informationUsable Multi-Factor Authentication and Risk- Based Authorization
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Usable Multi-Factor Authentication and Risk- Based Authorization IBM T.J. Watson Research Center Larry Koved December 18, 2014 Team Profile
More informationCurriculum Vitae Ruben Sipos
Curriculum Vitae Ruben Sipos Mailing Address: 349 Gates Hall Cornell University Ithaca, NY 14853 USA Mobile Phone: +1 607-229-0872 Date of Birth: 8 October 1985 E-mail: rs@cs.cornell.edu Web: http://www.cs.cornell.edu/~rs/
More informationYifan Chen, Guirong Xue and Yong Yu Apex Data & Knowledge Management LabShanghai Jiao Tong University
Yifan Chen, Guirong Xue and Yong Yu Apex Data & Knowledge Management LabShanghai Jiao Tong University Presented by Qiang Yang, Hong Kong Univ. of Science and Technology 1 In a Search Engine Company Advertisers
More informationUser Profiling Trends, Techniques and Applications
User Profiling Trends, Techniques and Applications Sumitkumar Kanoje, Sheetal Girase, Debajyoti Mukhopadhyay Dept. of Information Techonlogy, Maharashtra Institute of Technology, Pune sumitkanoje@gmail.com,
More informationEnhanced Cloud Security through KFAC
Enhanced Cloud Security through KFAC Mahesh S Darak, Dr. N. K. Deshmukh Assistant Professor, School of Computational Sciences, S. R. T. M. University, Nanded, Maharashtra, India ABSTRACT: The current era
More informationThe multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2
2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 1 School of
More informationSU Qiang Professor ---------------------------------------------------------------------------------------------------------------------------------
SU Qiang Professor PhD Advisor Department: Department of Management Science and Engineering Email: suq@tongji.edu.cn Office Phone: +86-21-65981443 ---------------------------------------------------------------------------------------------------------------------------------
More information1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014
1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 Combining various trust factors for e-commerce platforms using Analytic Hierarchy Process Bo Li a, Yu Zhang b,, Haoxue Wang c, Haixia Xia d, Yanfei Liu
More informationPreventing Denial-of-request Inference Attacks in Location-sharing Services
Preventing Denial-of-request Inference Attacks in Location-sharing Services Kazuhiro Minami Institute of Statistical Mathematics, Tokyo, Japan Email: kminami@ism.ac.jp Abstract Location-sharing services
More informationA Way to Understand Various Patterns of Data Mining Techniques for Selected Domains
A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains Dr. Kanak Saxena Professor & Head, Computer Application SATI, Vidisha, kanak.saxena@gmail.com D.S. Rajpoot Registrar,
More informationEFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
More informationResearch on the UHF RFID Channel Coding Technology based on Simulink
Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai
More informationSchool of Computer Science Carnegie Mellon Graph Mining, self-similarity and power laws
Graph Mining, self-similarity and power laws Christos Faloutsos University Overview Achievements global patterns and laws (static/dynamic) generators influence propagation communities; graph partitioning
More informationDiscover Viterbi: Computer Science
Discover Viterbi: Computer Science Gaurav S. Sukhatme Professor and Chairman USC Computer Science Department Meghan Balding Graduate & Professional Programs November 2, 2015 WebEx Quick Facts Will I be
More informationRESEARCH ON THE FRAMEWORK OF SPATIO-TEMPORAL DATA WAREHOUSE
RESEARCH ON THE FRAMEWORK OF SPATIO-TEMPORAL DATA WAREHOUSE WANG Jizhou, LI Chengming Institute of GIS, Chinese Academy of Surveying and Mapping No.16, Road Beitaiping, District Haidian, Beijing, P.R.China,
More informationYampolskiy, Analysis of Cyber Infrastructure Authentication Failure Vulnerabilities to Inform Security Decisions
CREATE FY2016 Statement of Work Yampolskiy, Analysis of Cyber Infrastructure Authentication Failure Vulnerabilities to Inform Security Decisions In this project, we develop and apply a model for estimating
More informationAnalysing Various Alerts & Evaluating Threat Techniques In NSA
International Journal of Scientific & Engineering Research Volume 4, Issue 2, February-2013 1 Analysing Various Alerts & Evaluating Threat Techniques In NSA Prof.TambeShital B.,Prof. Sonkar S.K.. Abstract-A
More informationData Mining Framework for Direct Marketing: A Case Study of Bank Marketing
www.ijcsi.org 198 Data Mining Framework for Direct Marketing: A Case Study of Bank Marketing Lilian Sing oei 1 and Jiayang Wang 2 1 School of Information Science and Engineering, Central South University
More informationResearch Article Distributed Data Mining Based on Deep Neural Network for Wireless Sensor Network
Distributed Sensor Networks Volume 2015, Article ID 157453, 7 pages http://dx.doi.org/10.1155/2015/157453 Research Article Distributed Data Mining Based on Deep Neural Network for Wireless Sensor Network
More informationA survey on click modeling in web search
A survey on click modeling in web search Lianghao Li Hong Kong University of Science and Technology Outline 1 An overview of web search marketing 2 An overview of click modeling 3 A survey on click models
More informationA Tempo-Topographical Model Inference of a Camera Network for Video Surveillance
International Journal of Computer and Electrical Engineering, Vol. 5, No. 4, August 203 A Tempo-Topographical Model Inference of a Camera Network for Video Surveillance Khalid Al-Shalfan and M. Elarbi-Boudihir
More information2010 Master of Science Computer Science Department, University of Massachusetts Amherst
Scott Niekum Postdoctoral Research Fellow The Robotics Institute, Carnegie Mellon University Contact Information Smith Hall, Room 228 Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213
More informationLink Prediction and Recommendation across Heterogeneous Social Networks
Link Prediction and Recommendation across Heterogeneous Social Networks Yuxiao Dong, Jie Tang, Sen Wu, Jilei Tian, Nitesh V. Chawla, Jinghai Rao, Huanhuan Cao Department of Computer Science and Technology,
More informationMachine Learning and Statistics: What s the Connection?
Machine Learning and Statistics: What s the Connection? Institute for Adaptive and Neural Computation School of Informatics, University of Edinburgh, UK August 2006 Outline The roots of machine learning
More informationSpeaker: Prof. Mubarak Shah, University of Central Florida. Title: Representing Human Actions as Motion Patterns
Speaker: Prof. Mubarak Shah, University of Central Florida Title: Representing Human Actions as Motion Patterns Abstract: Automatic analysis of videos is one of most challenging problems in Computer vision.
More information