Thank you! NetMine Data mining on networks IIS AWSOM. Outline. Proposed method. Goals
|
|
- Eugene Harvey
- 8 years ago
- Views:
Transcription
1 NetMine Data mining on networks IIS Christos Faloutsos (CMU) Michalis Faloutsos (UCR) Peggy Agouris George Kollios Fillia Makedon Betty Salzberg Anthony Stefanidis Thank you! NSF-IDM 04 C. Faloutsos & M. Faloutsos 1 NSF-IDM 04 C. Faloutsos & M. Faloutsos 2 Single-link traffic characterization AWSOM Given: a semi-infinite time sequence x 1, x 2, x t, Find: patterns, outliers, and forecast (Traffic matrix) NSF-IDM 04 C. Faloutsos & M. Faloutsos 3 Periodicity? (daily) NSF-IDM 04 C. Faloutsos & M. Faloutsos 4 Goals AUTOMATIC Adapt and handle arbitrary periodic components No human intervention/tuning STREAMING Single pass over the data Limited memory (logarithmic) Any-time frequency Proposed method W l,t W l,t-2 W l,t = b l,1 W l,t-1 + b l,2 W l,t-2 + W l,t-1 W W W l,t -2 l,t -1 l,t W l,t = b l,1 W l,t -1 + b l,2 W l,t -2 + time [VLDB 03] Math NSF-IDM 04 C. Faloutsos & M. Faloutsos 5 NSF-IDM 04 C. Faloutsos & M. Faloutsos 6 1
2 Results Real data Automobile Results Real data Sunspot Automobile traffic Daily periodicity with rush-hour peaks AR fails to capture any trend (average) Seasonal AR estimation fails AWSOM captures periodicity automatically Sunspot intensity Slightly time-varying period AR captures wrong trend (average) Seasonal ARIMA Captures immediate wrong downward trend Requires human to determine seasonal component period (fixed) NSF-IDM 04 C. Faloutsos & M. Faloutsos 7 NSF-IDM 04 C. Faloutsos & M. Faloutsos 8 The SELFIS tool Traffic characterization Is it Poisson? Is there long range dependency (~ self-similarity)? Which of the 4+ methods for LRD should we use? NSF-IDM 04 C. Faloutsos & M. Faloutsos 9 NSF-IDM 04 C. Faloutsos & M. Faloutsos 10 The SELFIS tool Traffic characterization LRD analysis tool by Karagiannis at UCR downloads, from around the world NSF-IDM 04 C. Faloutsos & M. Faloutsos 11 NSF-IDM 04 C. Faloutsos & M. Faloutsos 12 2
3 Introduction Framework Given a graph, (computer/social/ etc network) Will a virus/rumor/fad take over? Needle exchange networks of drug users [Weeks et al. 2002] Susceptible-Infected-Susceptible (SIS) model (like, say, flu ) Cured nodes immediately become susceptible β : (virus) birth rate = prob. an infected neighbor attacks me δ : (virus) death rate = prob. I heal NSF-IDM 04 C. Faloutsos & M. Faloutsos 13 NSF-IDM 04 C. Faloutsos & M. Faloutsos 14 t Defined as the value of τ, such that if β / δ < τ an epidemic can not happen Thus, given a graph compute its epidemic threshold t What should τ depend on? avg. degree? and/or highest degree? and/or variance of degree? and/or something else? NSF-IDM 04 C. Faloutsos & M. Faloutsos 15 NSF-IDM 04 C. Faloutsos & M. Faloutsos 16 Homogeneous graphs: 1/<k> BA (γ=3) <k> / <k 2 > more complicated graphs? arbitrary, REAL graphs? [Theorem] We have no epidemic, if ß/d <t = 1/? 1,A how many parameters?? NSF-IDM 04 C. Faloutsos & M. Faloutsos 17 NSF-IDM 04 C. Faloutsos & M. Faloutsos 18 3
4 [Theorem] We have no epidemic, if recovery prob. attack prob. Proof: [Wang+03] epidemic threshold ß/d <t = 1/? 1,A largest eigenvalue of adj. matrix A Experiments 2 graphs Star network: one hub + 99 spokes Oregon Internet AS graph: 10,900 nodes, edges topology.eecs.umich.edu/data.html NSF-IDM 04 C. Faloutsos & M. Faloutsos 19 NSF-IDM 04 C. Faloutsos & M. Faloutsos 20 Number of Infected Nodes Experiments (Star) Star ß= Time d: ß/d > t (above threshold) ß/d = t (at the threshold) ß/d < t (below threshold) NSF-IDM 04 C. Faloutsos & M. Faloutsos 21 Number of Infected Nodes Experiments (Oregon) Oregon ß = Time d: ß/d > t (above threshold) ß/d = t (at the threshold) ß/d < t (below threshold) NSF-IDM 04 C. Faloutsos & M. Faloutsos 22 Overall conclusions Automatic stream mining: AWSOM; Tool for Long Range Dependencies (LRD): SELFIS graphs and virus propagation: eigenvalue Related work Network traffic network tomography [w/ Airoldi +] Graphs and topology graph partitioning [w/ Deepay+] important subgraphs [w/ Tomkins + McCurley] graph generators [RMAT, w/ Deepay] NSF-IDM 04 C. Faloutsos & M. Faloutsos 23 NSF-IDM 04 C. Faloutsos & M. Faloutsos 24 4
5 SpirosPapadimitriou, Anthony Brockwell and Christos Faloutsos Adaptive, Hands-Off Stream Mining VLDB 2003, Berlin, Germany, Sept (invited for fast track publication to VLDB-Journal) Yasushi Sakurai, Spiros Papadimitriou, Christos Faloutsos AutoLag: Automatic Discovery of Lag Correlations in Stream Data. ICDE 2005 Thomas Karagiannis, Mart Molle, Michalis Faloutsos, Andre Broido A Nonstationary Poisson View of Internet Traffic IEEE INFOCOM, Hong Kong, March Thomas Karagiannis, Michalis Faloutsos, Mart Molle A User-Friendly Self-Similarity Analysis Tool Special Section on Tools and Technologies for Networking Research and Education, ACM SIGCOMM Computer Communication Review, NSF-IDM 04 C. Faloutsos & M. Faloutsos 25 NSF-IDM 04 C. Faloutsos & M. Faloutsos 26 [Wang+03] Yang Wang, Deepayan Chakrabarti, Chenxi Wang and Christos Faloutsos: Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint, SRDS 2003, Florence, Italy. Additional References Christos Faloutsos, Kevin McCurley and Andrew Tomkins, Fast Discovery of 'Connection Subgraphs' KDD 2004, Seattle, WA, Aug Deepayan Chakrabarti, Spiros Papadimitriou, Dharmendra Modha and Christos Faloutsos Fully Automatic Cross-Assocations KDD 2004, Seattle, WA, Aug Edoardo Airoldiand Christos Faloutsos Recovering Latent Time- Series from their Observed Sums: Network Tomography with Particle Filters KDD 2004, Seattle, WA, Aug RMAT: A recursive graph generator, D. Chakrabarti, Y. Zhan, C. Faloutsos, SIAM-DM 2004 NSF-IDM 04 C. Faloutsos & M. Faloutsos 27 NSF-IDM 04 C. Faloutsos & M. Faloutsos 28 Thank you! Contact info: google christos faloutsos cs.cmu.edu NSF-IDM 04 C. Faloutsos & M. Faloutsos 29 5
School of Computer Science Carnegie Mellon Graph Mining, self-similarity and power laws
Graph Mining, self-similarity and power laws Christos Faloutsos University Overview Achievements global patterns and laws (static/dynamic) generators influence propagation communities; graph partitioning
More informationThe Internet Is Like A Jellyfish
The Internet Is Like A Jellyfish Michalis Faloutsos UC Riverside Joint work with: Leslie Tauro, Georgos Siganos (UCR) Chris Palmer(CMU) Big Picture: Modeling the Internet Topology Traffic Protocols Routing,
More informationNetwork protection against worms and cascading failures using modularity partitioning
Network protection against worms and cascading failures using modularity partitioning Jasmina Omić Network Architectures and Services Delft University of Technology Delft, Netherlands Email: J.Omic@tudelft.nl
More informationMining Large Graphs. ECML/PKDD 2007 tutorial. Part 2: Diffusion and cascading behavior
Mining Large Graphs ECML/PKDD 2007 tutorial Part 2: Diffusion and cascading behavior Jure Leskovec and Christos Faloutsos Machine Learning Department Joint work with: Lada Adamic, Deepay Chakrabarti, Natalie
More informationTowards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks
Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks Paul Parker Shouhuai Xu Department of Computer Science, University of Texas at San Antonio {pparker,shxu}@cs.utsa.edu
More informationThe Effect of Network Topology on the Spread of Epidemics
1 The Effect of Network Topology on the Spread of Epidemics A. Ganesh, L. Massoulié, D. Towsley Microsoft Research Dept. of Computer Science 7 J.J. Thomson Avenue University of Massachusetts CB3 0FB Cambridge,
More informationTime Series Analysis of Network Traffic
Time Series Analysis of Network Traffic Cyriac James IIT MADRAS February 9, 211 Cyriac James (IIT MADRAS) February 9, 211 1 / 31 Outline of the presentation Background Motivation for the Work Network Trace
More informationAnalysis of Internet Topologies: A Historical View
Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,
More informationAnalysis of Internet Topologies
Analysis of Internet Topologies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British
More informationNetwork Monitoring Using Traffic Dispersion Graphs (TDGs)
Network Monitoring Using Traffic Dispersion Graphs (TDGs) Marios Iliofotou Joint work with: Prashanth Pappu (Cisco), Michalis Faloutsos (UCR), M. Mitzenmacher (Harvard), Sumeet Singh(Cisco) and George
More informationA Game Theoretic Model for Network Virus Protection
A Game Theoretic Model for Network Virus Protection Iyed Khammassi, Rachid Elazouzi, Majed Haddad and Issam Mabrouki University of Avignon, 84 Avignon, FRANCE Email: firstname.lastname@univ-avignon.fr
More informationGraph Mining and Social Network Analysis. Data Mining; EECS 4412 Darren Rolfe + Vince Chu 11.06.14
Graph Mining and Social Network nalysis Data Mining; EES 4412 Darren Rolfe + Vince hu 11.06.14 genda Graph Mining Methods for Mining Frequent Subgraphs priori-based pproach: GM, FSG Pattern-Growth pproach:
More informationThe Shape of the Network. The Shape of the Internet. Why study topology? Internet topologies. Early work. More on topologies..
The Shape of the Internet Slides assembled by Jeff Chase Duke University (thanks to and ) The Shape of the Network Characterizing shape : AS-level topology: who connects to whom Router-level topology:
More informationCommunity Detection Proseminar - Elementary Data Mining Techniques by Simon Grätzer
Community Detection Proseminar - Elementary Data Mining Techniques by Simon Grätzer 1 Content What is Community Detection? Motivation Defining a community Methods to find communities Overlapping communities
More informationCOS 116 The Computational Universe Laboratory 9: Virus and Worm Propagation in Networks
COS 116 The Computational Universe Laboratory 9: Virus and Worm Propagation in Networks You learned in lecture about computer viruses and worms. In this lab you will study virus propagation at the quantitative
More informationAhmed Metwally Google Inc. 1600 Amphitheatre Pkwy Mountain View, CA 94043 (805) 403-9725 ametwally@gmail.com
Education: Ahmed Metwally Google Inc. 1600 Amphitheatre Pkwy Mountain View, CA 94043 (805) 403-9725 ametwally@gmail.com 2002-2007: PhD; UC Santa Barbara, Department of Computer Science. Advisors: Prof.
More informationSpread of Viruses on a Computer Network
Spread of Viruses on a Computer Network New Mexico Supercomputing Challenge Final Report March 31, 2015 Team Number: 63 Los Alamos Middle School Team: Christie Djidjev Teacher: Project Mentors: Hristo
More informationEpidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point
Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point Nicholas C. Valler 1, B. Aditya Prakash 2, Hanghang Tong 3, Michalis Faloutsos 1, and Christos Faloutsos 2 1 Dept. of Computer Science
More informationComputer Network Topologies: Models and Generation Tools
Consiglio Nazionale delle Ricerche Technical Report n. 5/200 Computer Network Topologies: Models and Generation Tools Giuseppe Di Fatta, Giuseppe Lo Presti 2, Giuseppe Lo Re CE.R.E. Researcher 2 CE.R.E.,
More informationProtein Protein Interaction Networks
Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics
More informationGraphs over Time Densification Laws, Shrinking Diameters and Possible Explanations
Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Jurij Leskovec, CMU Jon Kleinberg, Cornell Christos Faloutsos, CMU 1 Introduction What can we do with graphs? What patterns
More informationExistence Theorems and Approximation Algorithms for Generalized Network Security Games
Existence Theorems and Approximation Algorithms for Generalized Network Security Games V.S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun, Ravi Sundaram, College of Computer & Information Science, Northeastern
More informationFoundations of Multidimensional Network Analysis
2 International Conference on Advances in Social Networks Analysis and Mining Foundations of Multidimensional Network Analysis Michele Berlingerio Michele Coscia 2 Fosca Giannotti Anna Monreale 2 Dino
More informationTowards Modelling The Internet Topology The Interactive Growth Model
Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS
More informationJune Zhang (Zhong-Ju Zhang)
(Zhong-Ju Zhang) Carnegie Mellon University Dept. Electrical and Computer Engineering, 5000 Forbes Ave. Pittsburgh, PA 15213 Phone: 678-899-2492 E-Mail: junez@andrew.cmu.edu http://users.ece.cmu.edu/~junez
More informationUnivariate and Multivariate Methods PEARSON. Addison Wesley
Time Series Analysis Univariate and Multivariate Methods SECOND EDITION William W. S. Wei Department of Statistics The Fox School of Business and Management Temple University PEARSON Addison Wesley Boston
More informationCMU SCS Mining Large Graphs and Tensors - Patterns, Tools and Discoveries.
Mining Large Graphs and Tensors - Patterns, Tools and Discoveries. Christos Faloutsos CMU Thank you! Nikos Sidiropoulos Kuo-Chu Chang Zhi (Gerry) Tian C. Faloutsos (CMU) 2 Roadmap Introduction Motivation
More informationYale University Department of Computer Science
Yale University Department of Computer Science Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem James Aspnes 1 2 Kevin Chang 1 3 Aleksandr Yampolskiy 1 4 YALEU/DCS/TR-1295
More informationGraph Mining Techniques for Social Media Analysis
Graph Mining Techniques for Social Media Analysis Mary McGlohon Christos Faloutsos 1 1-1 What is graph mining? Extracting useful knowledge (patterns, outliers, etc.) from structured data that can be represented
More informationOptimization of network protection against virus spread
Optimization of network protection against virus spread Eric Gourdin Orange Labs, Issy-les-Moulineaux, France Email: eric.gourdin@orange-ftgroup.com Jasmina Omic and Piet Van Mieghem Faculty of Electrical
More informationThe Impacts of Link Failure on Routing Dynamics
The Impacts of Link Failure Location on Routing Dynamics: A Formal Analysis Xiaoliang Zhao, Beichuan Zhang, Daniel Massey, Andreas Terzis, Lixia Zhang ABSTRACT One approach to understanding the complex
More informationStorm Prediction in a Cloud. Ian Davis, Hadi Hemmati, Ric Holt, Mike Godfrey Douglas Neuse, Serge Mankovskii
Storm Prediction in a Cloud Ian Davis, Hadi Hemmati, Ric Holt, Mike Godfrey Douglas Neuse, Serge Mankovskii Load Balancing in Clouds The goal / balancing act: Want to maximise delivery of cloud services
More informationPhishing Training Strategies: Useful or Wasteful?
Phishing Training Strategies: Useful or Wasteful? Elizabeth Walkup Stanford University ewalkup@stanford.edu 1. INTRODUCTION In the security community, it is commonly known that, no matter how well-built
More informationPart 1: Link Analysis & Page Rank
Chapter 8: Graph Data Part 1: Link Analysis & Page Rank Based on Leskovec, Rajaraman, Ullman 214: Mining of Massive Datasets 1 Exam on the 5th of February, 216, 14. to 16. If you wish to attend, please
More informationAN EFFICIENT SELECTIVE DATA MINING ALGORITHM FOR BIG DATA ANALYTICS THROUGH HADOOP
AN EFFICIENT SELECTIVE DATA MINING ALGORITHM FOR BIG DATA ANALYTICS THROUGH HADOOP Asst.Prof Mr. M.I Peter Shiyam,M.E * Department of Computer Science and Engineering, DMI Engineering college, Aralvaimozhi.
More informationSubgraph Patterns: Network Motifs and Graphlets. Pedro Ribeiro
Subgraph Patterns: Network Motifs and Graphlets Pedro Ribeiro Analyzing Complex Networks We have been talking about extracting information from networks Some possible tasks: General Patterns Ex: scale-free,
More informationAnomaly Detection and Predictive Maintenance
Anomaly Detection and Predictive Maintenance Rosaria Silipo Iris Adae Christian Dietz Phil Winters Rosaria.Silipo@knime.com Iris.Adae@uni-konstanz.de Christian.Dietz@uni-konstanz.de Phil.Winters@knime.com
More informationA Study of YouTube recommendation graph based on measurements and stochastic tools
A Study of YouTube recommendation graph based on measurements and stochastic tools Yonathan Portilla, Alexandre Reiffers, Eitan Altman, Rachid El-Azouzi ABSTRACT The Youtube recommendation is one the most
More informationWhy Rumors Spread Fast in Social Networks
Why Rumors Spread Fast in Social Networks Benjamin Doerr 1, Mahmoud Fouz 2, and Tobias Friedrich 1,2 1 Max-Planck-Institut für Informatik, Saarbrücken, Germany 2 Universität des Saarlandes, Saarbrücken,
More informationClustering Data Streams
Clustering Data Streams Mohamed Elasmar Prashant Thiruvengadachari Javier Salinas Martin gtg091e@mail.gatech.edu tprashant@gmail.com javisal1@gatech.edu Introduction: Data mining is the science of extracting
More informationCharacterizing and Modelling Clustering Features in AS-Level Internet Topology
Characterizing and Modelling Clustering Features in AS-Level Topology Yan Li, Jun-Hong Cui, Dario Maggiorini and Michalis Faloutsos yan.li@uconn.edu, jcui@engr.uconn.edu, dario@dico.unimi.it, michalis@cs.ucr.edu
More informationGraph Processing and Social Networks
Graph Processing and Social Networks Presented by Shu Jiayu, Yang Ji Department of Computer Science and Engineering The Hong Kong University of Science and Technology 2015/4/20 1 Outline Background Graph
More informationBig Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AUTONOMOUS NETWORK SECURITY FOR UNSUPERVISED DETECTION OF NETWORK ATTACKS MS. PRITI
More informationLecture 10: Regression Trees
Lecture 10: Regression Trees 36-350: Data Mining October 11, 2006 Reading: Textbook, sections 5.2 and 10.5. The next three lectures are going to be about a particular kind of nonlinear predictive model,
More informationTemporal Data Mining for Small and Big Data. Theophano Mitsa, Ph.D. Independent Data Mining/Analytics Consultant
Temporal Data Mining for Small and Big Data Theophano Mitsa, Ph.D. Independent Data Mining/Analytics Consultant What is Temporal Data Mining? Knowledge discovery in data that contain temporal information.
More informationThe Usage Analysis of Web and Email Traffic on the University Internet Backbone Links
Universal Journal of Communications and Network 3(1): 26-33, 2015 DOI: 10.13189/ujcn.2015.030104 http://www.hrpub.org The Usage Analysis of Web and Email Traffic on the University Internet Backbone Links
More informationSTATISTICAL ANALYSIS AND MODELING OF INTERNET TRAFFIC IP- BASED NETWORK FOR TELE-TRAFFIC ENGINEERING
STATISTICAL ANALYSIS AND MODELING OF INTERNET TRAFFIC IP- BASED NETWORK FOR TELE-TRAFFIC ENGINEERING Murizah Kassim 1, 2, Mahamod Ismail 1 and Mat Ikram Yusof 2 1 Faculty of Engineering and Built Environment,
More informationTraffic Monitoring and Application Classification: A Novel Approach
Traffic Monitoring and Application Classification: A Novel Approach Michalis Faloutsos, UC Riverside QuickTime and a TIFF (Uncompressed) decompressor are needed to see this picture. QuickTime and a TIFF
More informationSecurity Adoption in Heterogeneous Networks: the Influence of Cyber-insurance Market
Security Adoption in Heterogeneous Networks: the Influence of Cyber-insurance Market Zichao Yang and John C.S. Lui Computer Science & Engineering Department The Chinese University of Hong Kong Abstract.
More informationDynamics of information spread on networks. Kristina Lerman USC Information Sciences Institute
Dynamics of information spread on networks Kristina Lerman USC Information Sciences Institute Information spread in online social networks Diffusion of activation on a graph, where each infected (activated)
More informationInformation Management course
Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli (alberto.ceselli@unimi.it)
More informationRobust Router Congestion Control Using Acceptance and Departure Rate Measures
Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {ganeshg@microsoft.com}, Microsoft Corporation,
More informationDualIso: Scalable Subgraph Pattern Matching On Large Labeled Graphs SUPPLEMENT. Computer Science Department
DualIso: Scalable Subgraph Pattern Matching On Large Labeled Graphs SUPPLEMENT Matthew Saltz, Ayushi Jain, Abhishek Kothari, Arash Fard, John A. Miller and Lakshmish Ramaswamy Computer Science Department
More informationSecurity Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
More informationMassive Streaming Data Analytics: A Case Study with Clustering Coefficients. David Ediger, Karl Jiang, Jason Riedy and David A.
Massive Streaming Data Analytics: A Case Study with Clustering Coefficients David Ediger, Karl Jiang, Jason Riedy and David A. Bader Overview Motivation A Framework for Massive Streaming hello Data Analytics
More informationCan Twitter Predict Royal Baby's Name?
Summary Can Twitter Predict Royal Baby's Name? Bohdan Pavlyshenko Ivan Franko Lviv National University,Ukraine, b.pavlyshenko@gmail.com In this paper, we analyze the existence of possible correlation between
More informationAnalysis of an Artificial Hormone System (Extended abstract)
c 2013. This is the author s version of the work. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purpose or for creating
More informationComplex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics
Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Zhao Wenbin 1, Zhao Zhengxu 2 1 School of Instrument Science and Engineering, Southeast University, Nanjing, Jiangsu
More informationData Mining Cluster Analysis: Advanced Concepts and Algorithms. Lecture Notes for Chapter 9. Introduction to Data Mining
Data Mining Cluster Analysis: Advanced Concepts and Algorithms Lecture Notes for Chapter 9 Introduction to Data Mining by Tan, Steinbach, Kumar Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004
More informationSHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH
31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,
More informationBotnet Detection by Abnormal IRC Traffic Analysis
Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National
More informationComplex Networks Analysis: Clustering Methods
Complex Networks Analysis: Clustering Methods Nikolai Nefedov Spring 2013 ISI ETH Zurich nefedov@isi.ee.ethz.ch 1 Outline Purpose to give an overview of modern graph-clustering methods and their applications
More informationTime Series Analysis and Forecasting Methods for Temporal Mining of Interlinked Documents
Time Series Analysis and Forecasting Methods for Temporal Mining of Interlinked Documents Prasanna Desikan and Jaideep Srivastava Department of Computer Science University of Minnesota. @cs.umn.edu
More informationEnergy Benefit of Network Coding for Multiple Unicast in Wireless Networks
Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Jasper Goseling IRCTR/CWPC, WMC Group Delft University of Technology The Netherlands j.goseling@tudelft.nl Abstract Jos H. Weber
More informationSystems and Algorithms for Big Data Analytics
Systems and Algorithms for Big Data Analytics YAN, Da Email: yanda@cse.cuhk.edu.hk My Research Graph Data Distributed Graph Processing Spatial Data Spatial Query Processing Uncertain Data Querying & Mining
More informationNetwork TrafficBehaviorAnalysisby Decomposition into Control and Data Planes
Network TrafficBehaviorAnalysisby Decomposition into Control and Data Planes Basil AsSadhan, Hyong Kim, José M. F. Moura, Xiaohui Wang Carnegie Mellon University Electrical and Computer Engineering Department
More informationEvery tree contains a large induced subgraph with all degrees odd
Every tree contains a large induced subgraph with all degrees odd A.J. Radcliffe Carnegie Mellon University, Pittsburgh, PA A.D. Scott Department of Pure Mathematics and Mathematical Statistics University
More informationInformation Discovery on Electronic Medical Records
Information Discovery on Electronic Medical Records Vagelis Hristidis, Fernando Farfán, Redmond P. Burke, MD Anthony F. Rossi, MD Jeffrey A. White, FIU FIU Miami Children s Hospital Miami Children s Hospital
More informationExistence of pure Nash equilibria (NE): Complexity of computing pure NE: Approximating the social optimum: Empirical results:
Existence Theorems and Approximation Algorithms for Generalized Network Security Games V.S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun, Ravi Sundaram, College of Computer & Information Science, Northeastern
More informationMining the Temporal Dimension of the Information Propagation
Mining the Temporal Dimension of the Information Propagation Michele Berlingerio, Michele Coscia 2, and Fosca Giannotti 3 IMT-Lucca, Lucca, Italy 2 Dipartimento di Informatica, Pisa, Italy {name.surname}@isti.cnr.it
More informationAnalyzing and modelling the AS-level Internet topology
Analyzing and modelling the AS-level Internet topology Shi Zhou & Raul J. Mondragon Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS, United Kingdom Email:
More informationAdvances in Health Care Predictive Analytics
Advances in Health Care Predictive Analytics Graphical Models Part I: Intelligent Reasoning with Bayesian Networks Jarrod E. Dalton COLD OR FLU? How do we tell? A Simple Bayesian Network P() Prob. No 70%
More informationOPERATING SYSTEMS DEADLOCKS
OPERATING SYSTEMS DEADLOCKS Jerry Breecher 7: Deadlocks OPERATING SYSTEM Deadlocks What is a deadlock? What Is In This Chapter? Staying Safe: Preventing and Avoiding Deadlocks Living Dangerously: Let the
More informationTRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, VOL. 1, NO. 1, MARCH 2014 99
TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, VOL. 1, NO. 1, MARCH 2014 99 Optimal Resource Allocation for Network Protection Against Spreading Processes Victor M. Preciado, Member, IEEE, Michael Zargham,
More informationImplementing Graph Pattern Mining for Big Data in the Cloud
Implementing Graph Pattern Mining for Big Data in the Cloud Chandana Ojah M.Tech in Computer Science & Engineering Department of Computer Science & Engineering, PES College of Engineering, Mandya Ojah.chandana@gmail.com
More informationDegree distribution of the FKP network model
Degree distribution of the FKP network model Noam Berger 1, Béla Bollobás 2,3, Christian Borgs 4, Jennifer Chayes 4, and Oliver Riordan 3 1 Department of Statistics, University of California, Berkeley,
More informationNetwork Coding for Distributed Storage
Network Coding for Distributed Storage Alex Dimakis USC Overview Motivation Data centers Mobile distributed storage for D2D Specific storage problems Fundamental tradeoff between repair communication and
More informationDynamic Quarantine of Internet Worms
The International Conference on Dependable Systems and Networks (DSN-24). Palazzo dei Congressi, Florence, Italy. June 28th - July, 24. Dynamic Quarantine of Internet Worms Cynthia Wong, Chenxi Wang, Dawn
More informationAn apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
More informationDecentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu
More informationSecurity-Aware Beacon Based Network Monitoring
Security-Aware Beacon Based Network Monitoring Masahiro Sasaki, Liang Zhao, Hiroshi Nagamochi Graduate School of Informatics, Kyoto University, Kyoto, Japan Email: {sasaki, liang, nag}@amp.i.kyoto-u.ac.jp
More informationZipf s law and the Internet
Glottometrics 3, 2002,143-150 To honor G.K. Zipf Zipf s law and the Internet Lada A. Adamic 1 Bernardo A. Huberman Abstract. Zipf's law governs many features of the Internet. Observations of Zipf distributions,
More informationResearch Statement. Michalis Faloutsos
Research Statement Michalis Faloutsos My research focuses on computer security and networks and can be grouped into the following, partiallyoverlapping areas: 1. Web security focusing on the detection
More informationAn Analysis on Density Based Clustering of Multi Dimensional Spatial Data
An Analysis on Density Based Clustering of Multi Dimensional Spatial Data K. Mumtaz 1 Assistant Professor, Department of MCA Vivekanandha Institute of Information and Management Studies, Tiruchengode,
More informationResearch Article Worms Propagation Modeling and Analysis in Big Data Environment
Distributed Sensor Networks Volume 2015, Article ID 985856, 8 pages http://dxdoiorg/101155/2015/985856 Research Article Worms Propagation Modeling and Analysis in Big Data Environment Song He, 1 Can Zhang,
More informationMathematical Challenges in Cybersecurity
SANDIA REPORT SAND 2009-0805 Unlimited Release Printed February 2009 Mathematical Challenges in Cybersecurity Daniel M. Dunlavy, Bruce Hendrickson, and Tamara G. Kolda Prepared by Sandia National Laboratories
More informationInvestigating Clinical Care Pathways Correlated with Outcomes
Investigating Clinical Care Pathways Correlated with Outcomes Geetika T. Lakshmanan, Szabolcs Rozsnyai, Fei Wang IBM T. J. Watson Research Center, NY, USA August 2013 Outline Care Pathways Typical Challenges
More informationA Study of Mass-mailing Worms
A Study of Mass-mailing Worms Cynthia Wong, Stan Bielski, Jonathan M. McCune, Chenxi Wang Carnegie Mellon University 5 Forbes Avenue, Pittsburgh, PA, 15213 {cindywon, bielski, jonmccune, chenxi}@cmu.edu
More informationOn Mining Group Patterns of Mobile Users
On Mining Group Patterns of Mobile Users Yida Wang 1, Ee-Peng Lim 1, and San-Yih Hwang 2 1 Centre for Advanced Information Systems, School of Computer Engineering Nanyang Technological University, Singapore
More informationData Mining Cluster Analysis: Advanced Concepts and Algorithms. Lecture Notes for Chapter 9. Introduction to Data Mining
Data Mining Cluster Analysis: Advanced Concepts and Algorithms Lecture Notes for Chapter 9 Introduction to Data Mining by Tan, Steinbach, Kumar Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004
More informationQ. Yan, X. Huang School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, 100876 Email: yq_10@sohu.
JOURNAL OF NETWORKS, VOL. 3, NO. 7, JULY 28 1 fuser Behavior and Topology Analysis Q. Yan, X. Huang School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China,
More informationEchidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Abdun Mahmood, Christopher Leckie, Parampalli Udaya Department of Computer Science and Software Engineering University of
More informationTime Series Analysis
Time Series Analysis Identifying possible ARIMA models Andrés M. Alonso Carolina García-Martos Universidad Carlos III de Madrid Universidad Politécnica de Madrid June July, 2012 Alonso and García-Martos
More informationMapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research
MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With
More informationIndustry 4.0 market study: demand for connected software solutions
Industry 4.0 market study: demand for connected software solutions September 2015 Software Innovations 2 Market Survey Industry 4.0 2015 Introduction Turning data into new knowledge A key raw material
More informationOPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION
OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering
More informationSmall-World, Scale-Free and Beyond Xiao Fan Wang and Guanrong Chen
Feature Complex Networks: Small-World, Scale-Free and Beyond Xiao Fan Wang and Guanrong Chen DIGITAL VISION, LTD. Abstract In the past few years, the discovery of small-world and scale-free properties
More informationPortfolio Distribution Modelling and Computation. Harry Zheng Department of Mathematics Imperial College h.zheng@imperial.ac.uk
Portfolio Distribution Modelling and Computation Harry Zheng Department of Mathematics Imperial College h.zheng@imperial.ac.uk Workshop on Fast Financial Algorithms Tanaka Business School Imperial College
More information