CS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University
|
|
- Griselda Osborne
- 7 years ago
- Views:
Transcription
1 CS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University
2 Thursday: guest lecture Lars Backstrom (Facebook/Cornell) on networks & geography 2
3 Blogs information epidemics Which are the influential/infectious blogs? Viral marketing Who arethe trendsetters? Influential people? Disease spreading Where to place monitoring stations to detect epidemics? 3
4 Most influential set of a 0.4 d 0.4 size k: set S of k nodes producing largest b f e expected cascade size f(s) if activated g [Domingos Richardson 01] c 0.4 i 0.2 h 0.3 Optimization problem: max f ( S ) p p S of size k 4
5 f is submodular: S T f(s {u}) f(s) f(t {u}) f(t) Gain of adding a node to a small set Natural example: S A A A B A Sets A 1, A 2,, A n f(a) = size of union of A i (i (size of covered area) Gain of adding a node to a large set u If f 1,,f,f K are submodular, then p i f i is submodular 5
6 Start with S 0 ={} For i=1 k Choose node v that max f(s i 1 {v}) Let S i = S i 1 {v} b d a f(s i 1 {v}) a b c Hill climbing produces a c solution S where f(s) (1 1/e) 1/e) of optimal value (~63%) when f is monotone and submodular [Hemhauser, Fisher, Wolsey 78] e d e 6
7 [Leskovec et al., KDD 07] Lazy hill climbing: Keep an ordered list of marginal benefits b i fromprevious iteration Re evaluate evaluate b i only for top node Re sortand prune Marginal gain a b c d e b c d a e 11/3/2009 Jure Leskovec, Stanford CS322: Network Analysis Part 2 7
8 [Leskovec et al., KDD 07] Lazy hill climbing: Keep an ordered list of marginal benefits b i fromprevious iteration Re evaluate evaluate b i only for top node Re sortand prune Marginal gain a b c d e b c d a e 11/3/2009 Jure Leskovec, Stanford CS322: Network Analysis Part 2 8
9 [Leskovec et al., KDD 07] Lazy hill climbing: Keep an ordered list of marginal benefits b i fromprevious iteration Re evaluate evaluate b i only for top node Re sortand prune Marginal gain a d b e c b c d a e 11/3/2009 Jure Leskovec, Stanford CS322: Network Analysis Part 2 9
10 [Leskovec et al., KDD 07] Given a real city water distribution network And ddt data on how contaminants spread in the network Problem posed by US Environmental Protection Agency S 10
11 [Leskovec et al., KDD 07] Given a graph G(V,E) and a budget tbb for sensors and data on how contaminations spread over the network: for each contamination i we know the time T(i,u) when it contaminated node u Select a subset of nodes A that maximize the expected reward subject to cost(a) < B Reward for detecting contamination i 11
12 S 2 S 4 [Leskovec et al., KDD 07] Observation: Diminishing returns New sensor: S 1 N S S 1 S 3 S 2 Placement A={S 1, S 2 } Adding S helps a lot Placement B={S 1, S 2, S 3, S 4 } Adding S helps very littlel 12
13 [Leskovec et al., KDD 07] Claim: Reward function is submodular Consider cascade i: f i (u k ) = set of nodes saved from u k f i (A) = size of union f i (u k ), u k A f i is submodular Global optimization: f(a) = Prob(i) f i (A) f is submodular Cascade i u 2 f i (u 2 ) u 1 f i (u 1 ) 13
14 [Leskovec et al., KDD 07] Consider: hill climbing ignoring the cost Ignore sensor cost. Repeatedly select sensor with highest marginal gain It always prefers more expensive sensor with reward r to a cheaper sensor with reward r ε For variable cost it can fail arbitrarily badly Idea: What if we optimize benefit cost ratio? 14
15 [Leskovec et al., KDD 07] Benefit cost ratio can fail arbitrarily badly Consider: budget B: 2 locations s 1 and s 2 : Costs: c(s 1 )=ε,c(s 2 )=B Only 1 cascade: R(s 1 )=2ε, R(s 2 )=B Then benefit cost ratio is bc(s 1 )=2 and bc(s 2 )=1 So, we first select s 1 and then can not afford s 2 We get reward 2ε instead of B Now send ε to 0 and we get arbitrarily bad 15
16 [Leskovec et al., KDD 07] CELF (cost effective lazy forward selection): A two pass greedy algorithm: Set (solution) A: use benefit cost greedy Set (solution) B: use unit cost greedy Final solution: argmax(r(a), R(B)) Theorem: CELF is near optimal CELF achieves ½(1-1/e) 1/ ) factor approximation i 16
17 [Leskovec et al., KDD 07] Real metropolitan area water network V = 21,000 nodes E = 25,000 pipes Use a cluster of 50 machines for a month Simulate 3.6 million epidemic scenarios (152 GB of epidemic data) By exploiting sparsity we fit it into main memory (16GB) 17
18 [Leskovec et al., KDD 07] Offline bound: OPT/(1 1/e) 1/e) Online bound on OPT [Leskovec et al., KDD 07] CELF The online (data dependent) bound gives much better estimate of how far from unknown optimal solution is the CELF solution 18
19 [Leskovec et al., KDD 07] Heuristics placements perform much worse One really needs to consider the spread of epidemics 19
20 [Leskovec et al., KDD 07] 20
21 [Leskovec et al., KDD 07] CELF is an order of magnitude faster than hill climbing 21
22 = I have 10 minutes. Which? blogs should I read to be most up to date? = Who are the most influential bloggers? 22
23 Want to read things before others do. Detect blue & yellow soon but miss red. Detect all stories but late. 23
24 [Leskovec et al., KDD 07] Online bound [Leskovec et al., KDD 07] is much tighter 13% instead of 37% Old bound Our bound CELF 24
25 [Leskovec et al., KDD 07] Unit cost: algorithm picks large popular blogs: instapundit.com, michellemalkin.com lki Variable cost: proportional to the number of posts Variable cost Unit cost We can do much better when considering costs 25
26 [Leskovec et al., KDD 07] But then algorithm picks lots of small blogs that participate in few cascades We pick best solution that interpolates between the costs We can get good solutions with few blogs and few posts Each curve represents solutions with ih same final reward 26
27 [Leskovec et al., KDD 07] Heuristics perform much worse One really needs to perform optimization 27
28 [Leskovec et al., KDD 07] CELF runs 700 times faster than simple hillclimbing algorithm 28
29
30 [Onnela et al. 07] Real edge strengths in mobile call graph 30
31 Findings so far suggest that network groups are tightly connected Network communities: Sets of nodes with lots of connections inside and few to outside (the rest of the network) Communities, clusters, groups, modules 31
32 How to automatically find such densely connected groups ofnodes? Ideally such automatically detected clusters would then correspond to real groups For example: Communities, clusters, groups, modules 32
33 Zachary s Karate club network: Observe social ties and rivalries in a university karate club During his observation, conflicts led the group to split Split could be explained by a minimum cut in the network 11/3/2009 Jure Leskovec, Stanford CS322: Network Analysis Part 1 33
34 Find micro markets markets by partitioning the query x advertiser graph: query advertiser 34
35 Many methods: Linear (low rank) methods: If Gaussian, then low rank space is good Kernel (non linear) methods: If low dimensional manifold, then kernels are good Hierarchical methods: Top down and bottom up common in social sciences Graph partitioning methods: Define edge counting metric conductance, expansion, modularity, etc. and optimize! 35
36 What is a good notion that would extract such clusters? 36
37 [Girvan Newman PNAS 02] Divisive hierarchical clustering based on the notion of edge betweenness: Number of shortest paths passing through the edge Remove edges in decreasing betweenness
38 [Girvan Newman PNAS 02] 38
39 [Newman Girvan PhysRevE 03] Zachary s Karate club: hierarchical decomposition 39
40 [Newman Girvan PhysRevE 03] Communities in physics collaborations 40
41 Breath first search starting ti from A: Want to compute betweenness of paths starting at node A 41
42 Count the number of shortest paths from A to all other nodes of the network: 42
43 Compute betweenness by working up the tree: If there are multiple paths count them fractionally Repeat the BFS procedure for each node of the network Add edge scores 1 path to K Split evenly 1+1 paths to H Split evenly paths to J Split 1:2 43
Cost effective Outbreak Detection in Networks
Cost effective Outbreak Detection in Networks Jure Leskovec Joint work with Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, and Natalie Glance Diffusion in Social Networks One of
More informationMining Large Graphs. ECML/PKDD 2007 tutorial. Part 2: Diffusion and cascading behavior
Mining Large Graphs ECML/PKDD 2007 tutorial Part 2: Diffusion and cascading behavior Jure Leskovec and Christos Faloutsos Machine Learning Department Joint work with: Lada Adamic, Deepay Chakrabarti, Natalie
More informationCost-effective Outbreak Detection in Networks
Cost-effective Outbreak Detection in Networks Jure Leskovec Carnegie Mellon University Christos Faloutsos Carnegie Mellon University Andreas Krause Carnegie Mellon University Jeanne VanBriesen Carnegie
More informationStrong and Weak Ties
Strong and Weak Ties Web Science (VU) (707.000) Elisabeth Lex KTI, TU Graz April 11, 2016 Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 1 / 66 Outline 1 Repetition 2 Strong and Weak Ties 3 General
More informationMining Social Network Graphs
Mining Social Network Graphs Debapriyo Majumdar Data Mining Fall 2014 Indian Statistical Institute Kolkata November 13, 17, 2014 Social Network No introduc+on required Really? We s7ll need to understand
More informationIn Search of Influential Event Organizers in Online Social Networks
In Search of Influential Event Organizers in Online Social Networks ABSTRACT Kaiyu Feng 1,2 Gao Cong 2 Sourav S. Bhowmick 2 Shuai Ma 3 1 LILY, Interdisciplinary Graduate School. Nanyang Technological University,
More informationCSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms
More informationPart 2: Community Detection
Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -
More informationCompetitive Influence Maximization in Social Networks
Competitive Influence Maximization in Social Networks Shishir Bharathi David Kempe Mahyar Salek Department of Computer Science, University of Southern California Abstract. Social networks often serve as
More informationMapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research
MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With
More informationLoad Balancing. Load Balancing 1 / 24
Load Balancing Backtracking, branch & bound and alpha-beta pruning: how to assign work to idle processes without much communication? Additionally for alpha-beta pruning: implementing the young-brothers-wait
More informationMechanisms for Fair Attribution
Mechanisms for Fair Attribution Eric Balkanski Yaron Singer Abstract We propose a new framework for optimization under fairness constraints. The problems we consider model procurement where the goal is
More informationEfficient Crawling of Community Structures in Online Social Networks
Efficient Crawling of Community Structures in Online Social Networks Network Architectures and Services PVM 2011-071 Efficient Crawling of Community Structures in Online Social Networks For the degree
More informationCollective Behavior Prediction in Social Media. Lei Tang Data Mining & Machine Learning Group Arizona State University
Collective Behavior Prediction in Social Media Lei Tang Data Mining & Machine Learning Group Arizona State University Social Media Landscape Social Network Content Sharing Social Media Blogs Wiki Forum
More informationThe tipping point is often referred to in popular literature. First introduced in Schelling 78 and Granovetter 78
Paulo Shakarian and Damon Paulo Dept. Electrical Engineering and Computer Science and Network Science Center U.S. Military Academy West Point, NY ASONAM 2012 The tipping point is often referred to in popular
More informationMaximizing the Spread of Influence through a Social Network
Maximizing the Spread of Influence through a Social Network David Kempe Dept. of Computer Science Cornell University, Ithaca NY kempe@cs.cornell.edu Jon Kleinberg Dept. of Computer Science Cornell University,
More informationGraph Database Proof of Concept Report
Objectivity, Inc. Graph Database Proof of Concept Report Managing The Internet of Things Table of Contents Executive Summary 3 Background 3 Proof of Concept 4 Dataset 4 Process 4 Query Catalog 4 Environment
More informationClassifying Large Data Sets Using SVMs with Hierarchical Clusters. Presented by :Limou Wang
Classifying Large Data Sets Using SVMs with Hierarchical Clusters Presented by :Limou Wang Overview SVM Overview Motivation Hierarchical micro-clustering algorithm Clustering-Based SVM (CB-SVM) Experimental
More informationInvited Applications Paper
Invited Applications Paper - - Thore Graepel Joaquin Quiñonero Candela Thomas Borchert Ralf Herbrich Microsoft Research Ltd., 7 J J Thomson Avenue, Cambridge CB3 0FB, UK THOREG@MICROSOFT.COM JOAQUINC@MICROSOFT.COM
More informationProtein Protein Interaction Networks
Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics
More informationUnsupervised Data Mining (Clustering)
Unsupervised Data Mining (Clustering) Javier Béjar KEMLG December 01 Javier Béjar (KEMLG) Unsupervised Data Mining (Clustering) December 01 1 / 51 Introduction Clustering in KDD One of the main tasks in
More informationSocial Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
More informationSingle machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max. structure of a schedule Q...
Lecture 4 Scheduling 1 Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max structure of a schedule 0 Q 1100 11 00 11 000 111 0 0 1 1 00 11 00 11 00
More informationParallel Algorithms for Small-world Network. David A. Bader and Kamesh Madduri
Parallel Algorithms for Small-world Network Analysis ayssand Partitioning atto g(s (SNAP) David A. Bader and Kamesh Madduri Overview Informatics networks, small-world topology Community Identification/Graph
More informationDynamics of information spread on networks. Kristina Lerman USC Information Sciences Institute
Dynamics of information spread on networks Kristina Lerman USC Information Sciences Institute Information spread in online social networks Diffusion of activation on a graph, where each infected (activated)
More informationAPPM4720/5720: Fast algorithms for big data. Gunnar Martinsson The University of Colorado at Boulder
APPM4720/5720: Fast algorithms for big data Gunnar Martinsson The University of Colorado at Boulder Course objectives: The purpose of this course is to teach efficient algorithms for processing very large
More informationFUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
More informationA scalable multilevel algorithm for graph clustering and community structure detection
A scalable multilevel algorithm for graph clustering and community structure detection Hristo N. Djidjev 1 Los Alamos National Laboratory, Los Alamos, NM 87545 Abstract. One of the most useful measures
More informationThe Taxman Game. Robert K. Moniot September 5, 2003
The Taxman Game Robert K. Moniot September 5, 2003 1 Introduction Want to know how to beat the taxman? Legally, that is? Read on, and we will explore this cute little mathematical game. The taxman game
More informationFeature Selection with Monte-Carlo Tree Search
Feature Selection with Monte-Carlo Tree Search Robert Pinsler 20.01.2015 20.01.2015 Fachbereich Informatik DKE: Seminar zu maschinellem Lernen Robert Pinsler 1 Agenda 1 Feature Selection 2 Feature Selection
More informationApproximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
More information5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
More informationEfficient Informative Sensing using Multiple Robots
Journal of Artificial Intelligence Research 34 (2009) 707-755 Submitted 08/08; published 04/09 Efficient Informative Sensing using Multiple Robots Amarjeet Singh Andreas Krause Carlos Guestrin William
More informationChapter 6. Decoding. Statistical Machine Translation
Chapter 6 Decoding Statistical Machine Translation Decoding We have a mathematical model for translation p(e f) Task of decoding: find the translation e best with highest probability Two types of error
More informationUSING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu
More informationFast Multipole Method for particle interactions: an open source parallel library component
Fast Multipole Method for particle interactions: an open source parallel library component F. A. Cruz 1,M.G.Knepley 2,andL.A.Barba 1 1 Department of Mathematics, University of Bristol, University Walk,
More informationCost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:
CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm
More informationViral Marketing and the Diffusion of Trends on Social Networks
Viral Marketing and the Diffusion of Trends on Social Networks Jennifer Wortman Technical Report MS-CIS-08-19 Department of Computer and Information Science University of Pennsylvania May 15, 2008 Abstract
More informationEfficient Influence Maximization in Social Networks
Efficient Influence Maximization in Social Networks Wei Chen Microsoft Research weic@microsoft.com Yajun Wang Microsoft Research Asia yajunw@microsoft.com Siyu Yang Tsinghua University siyu.yang@gmail.com
More informationRecent Advances in Information Diffusion and Influence Maximization of Complex Social Networks
Chapter 1 Recent Advances in Information Diffusion and Influence Maximization of Complex Social Networks Huiyuan Zhang University of Florida Subhankar Mishra University of Florida My T. Thai University
More informationLoad balancing in a heterogeneous computer system by self-organizing Kohonen network
Bull. Nov. Comp. Center, Comp. Science, 25 (2006), 69 74 c 2006 NCC Publisher Load balancing in a heterogeneous computer system by self-organizing Kohonen network Mikhail S. Tarkov, Yakov S. Bezrukov Abstract.
More informationIC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com>
IC05 Introduction on Networks &Visualization Nov. 2009 Overview 1. Networks Introduction Networks across disciplines Properties Models 2. Visualization InfoVis Data exploration
More informationARTIFICIAL INTELLIGENCE (CSCU9YE) LECTURE 6: MACHINE LEARNING 2: UNSUPERVISED LEARNING (CLUSTERING)
ARTIFICIAL INTELLIGENCE (CSCU9YE) LECTURE 6: MACHINE LEARNING 2: UNSUPERVISED LEARNING (CLUSTERING) Gabriela Ochoa http://www.cs.stir.ac.uk/~goc/ OUTLINE Preliminaries Classification and Clustering Applications
More informationChapter 20: Data Analysis
Chapter 20: Data Analysis Database System Concepts, 6 th Ed. See www.db-book.com for conditions on re-use Chapter 20: Data Analysis Decision Support Systems Data Warehousing Data Mining Classification
More informationInfluence Propagation in Social Networks: a Data Mining Perspective
Influence Propagation in Social Networks: a Data Mining Perspective Francesco Bonchi Yahoo! Research Barcelona - Spain bonchi@yahoo-inc.com http://francescobonchi.com/ Acknowledgments Amit Goyal (University
More informationD1.1 Service Discovery system: Load balancing mechanisms
D1.1 Service Discovery system: Load balancing mechanisms VERSION 1.0 DATE 2011 EDITORIAL MANAGER Eddy Caron AUTHORS STAFF Eddy Caron, Cédric Tedeschi Copyright ANR SPADES. 08-ANR-SEGI-025. Contents Introduction
More informationBig Graph Analytics on Neo4j with Apache Spark. Michael Hunger Original work by Kenny Bastani Berlin Buzzwords, Open Stage
Big Graph Analytics on Neo4j with Apache Spark Michael Hunger Original work by Kenny Bastani Berlin Buzzwords, Open Stage My background I only make it to the Open Stages :) Probably because Apache Neo4j
More informationScheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
More informationIntroduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
More informationNear Optimal Solutions
Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.
More informationSingle-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Satyajeet S. Ahuja, Srinivasan Ramasubramanian, and Marwan Krunz Department of ECE, University of Arizona, Tucson,
More informationQuerying Past and Future in Web Applications
Querying Past and Future in Web Applications Daniel Deutch Tel-Aviv University Tova Milo Customer HR System Logistics ERP Bank ecomm CRM Supplier Outline Introduction & Motivation Querying Future [VLDB
More informationApplied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
More informationFeature Selection vs. Extraction
Feature Selection In many applications, we often encounter a very large number of potential features that can be used Which subset of features should be used for the best classification? Need for a small
More informationA Connectivity-Based Popularity Prediction Approach for Social Networks
A Connectivity-Based Popularity Prediction Approach for Social Networks Huangmao Quan, Ana Milicic, Slobodan Vucetic, and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia,
More informationData Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining
Data Mining Cluster Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 8 by Tan, Steinbach, Kumar 1 What is Cluster Analysis? Finding groups of objects such that the objects in a group will
More informationGraph Mining and Social Network Analysis
Graph Mining and Social Network Analysis Data Mining and Text Mining (UIC 583 @ Politecnico di Milano) References Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques", The Morgan Kaufmann
More informationBetween Friends Sites like Facebook are proving the value of the "social graph."
Page 1 of 10 March/April 2008 Between Friends Sites like Facebook are proving the value of the "social graph." By Erica Naone The idea of a social graph--a representation of a person's network of friends,
More informationInformation Management course
Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli (alberto.ceselli@unimi.it)
More informationClustering & Visualization
Chapter 5 Clustering & Visualization Clustering in high-dimensional databases is an important problem and there are a number of different clustering paradigms which are applicable to high-dimensional data.
More informationOverview of the Stateof-the-Art. Networks. Evolution of social network studies
Overview of the Stateof-the-Art in Social Networks INF5370 spring 2013 Evolution of social network studies 1950-1970: mathematical studies of networks formed by the actual human interactions Pandemics,
More informationCompact Representations and Approximations for Compuation in Games
Compact Representations and Approximations for Compuation in Games Kevin Swersky April 23, 2008 Abstract Compact representations have recently been developed as a way of both encoding the strategic interactions
More informationDistributed Aggregation in Cloud Databases. By: Aparna Tiwari tiwaria@umail.iu.edu
Distributed Aggregation in Cloud Databases By: Aparna Tiwari tiwaria@umail.iu.edu ABSTRACT Data intensive applications rely heavily on aggregation functions for extraction of data according to user requirements.
More informationCollaborative Filtering. Radek Pelánek
Collaborative Filtering Radek Pelánek 2015 Collaborative Filtering assumption: users with similar taste in past will have similar taste in future requires only matrix of ratings applicable in many domains
More informationTopological Tree Clustering of Social Network Search Results
Topological Tree Clustering of Social Network Search Results Richard T. Freeman Capgemini, FS Business Information Management No. 1 Forge End, Woking, Surrey, GU21 6DB United Kingdom richard.freeman@capgemini.com
More informationFinite Horizon Investment Risk Management
History Collaborative research with Ralph Vince, LSP Partners, LLC, and Marcos Lopez de Prado, Guggenheim Partners. Qiji Zhu Western Michigan University Workshop on Optimization, Nonlinear Analysis, Randomness
More informationCS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010
CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected
More informationThe Open University s repository of research publications and other research outputs
Open Research Online The Open University s repository of research publications and other research outputs Online survey for collective clustering of computer generated architectural floor plans Conference
More informationOutline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits
Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique
More informationOn the effect of forwarding table size on SDN network utilization
IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz
More informationSpecific Usage of Visual Data Analysis Techniques
Specific Usage of Visual Data Analysis Techniques Snezana Savoska 1 and Suzana Loskovska 2 1 Faculty of Administration and Management of Information systems, Partizanska bb, 7000, Bitola, Republic of Macedonia
More informationDynamic programming formulation
1.24 Lecture 14 Dynamic programming: Job scheduling Dynamic programming formulation To formulate a problem as a dynamic program: Sort by a criterion that will allow infeasible combinations to be eli minated
More informationPerformance of Dynamic Load Balancing Algorithms for Unstructured Mesh Calculations
Performance of Dynamic Load Balancing Algorithms for Unstructured Mesh Calculations Roy D. Williams, 1990 Presented by Chris Eldred Outline Summary Finite Element Solver Load Balancing Results Types Conclusions
More informationDistributed Caching Algorithms for Content Distribution Networks
Distributed Caching Algorithms for Content Distribution Networks Sem Borst, Varun Gupta, Anwar Walid Alcatel-Lucent Bell Labs, CMU BCAM Seminar Bilbao, September 30, 2010 Introduction Scope: personalized/on-demand
More information! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
More informationAlgorithmic Methods for Complex Network Analysis: Graph Clustering
Algorithmic Methods for Complex Network Analysis: Graph Clustering Summer School on Algorithm Engineering Dorothea Wagner September 9, 204 K ARLSRUHE I NSTITUTE OF T ECHNOLOGY I NSTITUTE OF T HEORETICAL
More informationAI: A Modern Approach, Chpts. 3-4 Russell and Norvig
AI: A Modern Approach, Chpts. 3-4 Russell and Norvig Sequential Decision Making in Robotics CS 599 Geoffrey Hollinger and Gaurav Sukhatme (Some slide content from Stuart Russell and HweeTou Ng) Spring,
More informationDistributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
More informationNew Approach of Computing Data Cubes in Data Warehousing
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 14 (2014), pp. 1411-1417 International Research Publications House http://www. irphouse.com New Approach of
More informationVisualizing Large, Complex Data
Visualizing Large, Complex Data Outline Visualizing Large Scientific Simulation Data Importance-driven visualization Multidimensional filtering Visualizing Large Networks A layout method Filtering methods
More informationLABEL PROPAGATION ON GRAPHS. SEMI-SUPERVISED LEARNING. ----Changsheng Liu 10-30-2014
LABEL PROPAGATION ON GRAPHS. SEMI-SUPERVISED LEARNING ----Changsheng Liu 10-30-2014 Agenda Semi Supervised Learning Topics in Semi Supervised Learning Label Propagation Local and global consistency Graph
More informationBig graphs for big data: parallel matching and clustering on billion-vertex graphs
1 Big graphs for big data: parallel matching and clustering on billion-vertex graphs Rob H. Bisseling Mathematical Institute, Utrecht University Collaborators: Bas Fagginger Auer, Fredrik Manne, Albert-Jan
More informationOptimizing the Placement of Integration Points in Multi-hop Wireless Networks
Optimizing the Placement of Integration Points in Multi-hop Wireless Networks Lili Qiu, Ranveer Chandra, Kamal Jain, and Mohammad Mahdian ABSTRACT Efficient integration of a multi-hop wireless network
More informationChapter 6: Episode discovery process
Chapter 6: Episode discovery process Algorithmic Methods of Data Mining, Fall 2005, Chapter 6: Episode discovery process 1 6. Episode discovery process The knowledge discovery process KDD process of analyzing
More informationEfficient Algorithms for Masking and Finding Quasi-Identifiers
Efficient Algorithms for Masking and Finding Quasi-Identifiers Rajeev Motwani Stanford University rajeev@cs.stanford.edu Ying Xu Stanford University xuying@cs.stanford.edu ABSTRACT A quasi-identifier refers
More informationONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015
ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE STEINER FOREST PROBLEM An initially given graph G. s 1 s 2 A sequence of demands (s i, t i ) arriving
More informationStatistical Data Mining. Practical Assignment 3 Discriminant Analysis and Decision Trees
Statistical Data Mining Practical Assignment 3 Discriminant Analysis and Decision Trees In this practical we discuss linear and quadratic discriminant analysis and tree-based classification techniques.
More informationMaking Sense of the Mayhem: Machine Learning and March Madness
Making Sense of the Mayhem: Machine Learning and March Madness Alex Tran and Adam Ginzberg Stanford University atran3@stanford.edu ginzberg@stanford.edu I. Introduction III. Model The goal of our research
More informationOptimizing the Placement of Integration Points in Multi-hop Wireless Networks
Optimizing the Placement of Integration Points in Multi-hop Wireless Networks Ranveer Chandra, Lili Qiu, Kamal Jain, Mohammad Mahdian Cornell University Microsoft Research Abstract Efficient integration
More informationServer Load Prediction
Server Load Prediction Suthee Chaidaroon (unsuthee@stanford.edu) Joon Yeong Kim (kim64@stanford.edu) Jonghan Seo (jonghan@stanford.edu) Abstract Estimating server load average is one of the methods that
More informationIJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS
IJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS V.Sudhakar 1 and G. Draksha 2 Abstract:- Collective behavior refers to the behaviors of individuals
More informationOnline Matching and Ad Allocation. Contents
Foundations and Trends R in Theoretical Computer Science Vol. 8, No. 4 (2012) 265 368 c 2013 A. Mehta DOI: 10.1561/0400000057 Online Matching and Ad Allocation By Aranyak Mehta Contents 1 Introduction
More informationGraph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003
Graph models for the Web and the Internet Elias Koutsoupias University of Athens and UCLA Crete, July 2003 Outline of the lecture Small world phenomenon The shape of the Web graph Searching and navigation
More informationData Structures for Moving Objects
Data Structures for Moving Objects Pankaj K. Agarwal Department of Computer Science Duke University Geometric Data Structures S: Set of geometric objects Points, segments, polygons Ask several queries
More informationFP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez To cite this version: Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez. FP-Hadoop:
More informationJoint Optimization of Overlapping Phases in MapReduce
Joint Optimization of Overlapping Phases in MapReduce Minghong Lin, Li Zhang, Adam Wierman, Jian Tan Abstract MapReduce is a scalable parallel computing framework for big data processing. It exhibits multiple
More informationBig Data, Statistics, and the Internet
Big Data, Statistics, and the Internet Steven L. Scott April, 4 Steve Scott (Google) Big Data, Statistics, and the Internet April, 4 / 39 Summary Big data live on more than one machine. Computing takes
More informationGerry Hobbs, Department of Statistics, West Virginia University
Decision Trees as a Predictive Modeling Method Gerry Hobbs, Department of Statistics, West Virginia University Abstract Predictive modeling has become an important area of interest in tasks such as credit
More informationChapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
More informationCross-validation for detecting and preventing overfitting
Cross-validation for detecting and preventing overfitting Note to other teachers and users of these slides. Andrew would be delighted if ou found this source material useful in giving our own lectures.
More information