CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University

Size: px
Start display at page:

Download "CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University"

Transcription

1 CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University

2 Setting from the last class: AB-A : gets a AB-B : gets b AB-AB : gets max(a, b) Also: Cost c for maintaining both strategies Each node selects behavior that will optimize payoff (given what its neighbors did in at time t-1) How will nodes switch from B to A or AB? -c -c a a max(a,b) A A AB AB b B Payoff 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 2

3 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 3 Path graph: Start with all Bs, a > b (A is better) One node switches to A what happens? With just A, B: A spreads if a > b With A, B, AB: Does A spread? Example: a=3, b=2, c=1 a=3 A a=3 A 0 b=2 b=2 B B B A a=3 A a=3 b=2 b=2 AB B B B Cascade stops -1 So even if A is better, not everyone adopts it

4 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 4 Example: a=5, b=3, c=1 A a=5 A 0 b=3 b=3 B B B A a=5 A a=5 b=3 b=3 AB B B B A a=5 A -1 a=5 a=5 b=3 AB B AB B B -1-1 A a=5 A a=5 a=5 b=3 A AB B AB B Cascade never stops! -1-1

5 Infinite path, start with all Bs Payoffs for w: A:a, B:1, AB:a+1-c What does node w in A-w-B do? c B B vs A A A A AB vs B a+1-c=1 w B 1 B AB AB 1 a AB vs A a+1-c=a 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 5

6 Infinite path, start with all Bs Payoffs for w: A:a, B:1, AB:a+1-c What does node w in A-w-B do? c B Since a<1, c>1 B vs A A a is big c is big A A AB vs B a+1-c=1 w B 1 B AB 1 a is high c <1, AB is opt AB 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 6 a AB vs A a+1-c=a

7 Same reward structure as before but now payoffs for w change: A:a, B:1+1, AB:a+1-c Notice: Now also AB spreads AB w What does node w in AB-w-B do? c B B vs A A A AB vs B B 1 B AB AB AB vs A 1 2 a 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 7

8 Same reward structure as before but now payoffs for w change: A:a, B:1+1, AB:a+1-c Notice: Now also AB spreads AB w What does node w in AB-w-B do? c B a<2, c>1 then 2b > 2a B vs A A a is big c >1 A AB vs B B 1 B AB AB c <1, then a+1-c > a AB is opt AB vs A 1 2 a 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 8

9 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 9 Joining the two pictures: c B A 1 AB B AB A 1 2 a

10 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 10 B is the default throughout the network until new/better A comes along. What happens? Infiltration: If B is too compatible then people will take on both and then drop the worse one (B) Direct conquest: If A makes itself not compatible people on the border must choose. They pick the better one (A) Buffer zone: If you choose an optimal level then you keep a static buffer between A and B c B stays B AB A spreads B A B AB A a

11 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 11 So far: Decision Based Models Utility based Deterministic Node centric: A node observes decisions of its neighbors and makes its own decision Require us to know too much about the data Next: Probabilistic Models Let s you do things by observing data We lose why people do things

12 Simple probabilistic model of cascades where we will learn about the reproductive number

13 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 13 Epidemic Model based on Random Trees (a variant of branching processes) A patient meets d other people With probability q > 0 infects each of them Q: For which values of d and q does the epidemic run forever? Run forever: At least 1infected lim P > h node at depth h Die out: = 0 Root node, patient 0 Start of epidemic 0 d subtrees

14 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 14 pp hh = prob. there is an infected node at depth hh We need: lim h pp h =? (based on qq and dd) Need recurrence for pp hh pp h = 1 1 qq pp h 1 dd llllll No infected node at depth h from the root pp hh = result of iterating hh f x = 1 1 qq xx dd Starting at xx = 1 (since pp 1 = 1) d subtrees

15 f(x) y=x=1 Going to first fixed point What do we know about f(x)? ff 0 = 0 ff 1 = 1 1 qq dd < 1 ff xx = qq dd 1 qqqq dd 1 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 15 x 1 y = f x When is this going to 0? ff 0 = qq dd ssss ff (xx) is monotone decreasing on [0,1]!

16 f(x) y=x y = f x Reproductive number RR 00 = qq dd: There is an epidemic if RR For the epidemic to die out we need f(x) to be below y=x! So: ff 00 = qq dd < 11 lim pp h = 0 wwheeee qq dd < 11 h qq dd = expected # of people at we infect 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, x

17 We will learn about the epidemic threshold

18 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 18 Virus Propagation: 2 Parameters: (Virus) Birth rate β: probability than an infected neighbor attacks (Virus) Death rate δ: Probability that an infected node heals Prob. β Prob. δ N 2 Healthy N 1 Infected N N 3

19 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 19 General scheme for epidemic models: Each node can go through phases: Transition probs. are governed by the model parameters S susceptible E exposed I infected R recovered Z immune

20 SIR model: Node goes through phases ββ δδ Susceptible Infected Recovered Models chickenpox or plague: Once you heal, you can never get infected again Assuming perfect mixing (The network is a complete graph) the S(t) model dynamics is: Number of nodes I(t) R(t) time 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 20

21 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 21 Susceptible-Infective-Susceptible (SIS) model Cured nodes immediately become susceptible Virus strength : s = β / δ Node state transition diagram: Infected by neighbor with prob. β Susceptible Cured with prob. δ Infective

22 Number of nodes Susceptible time Infected Models flu: Susceptible node becomes infected The node then heals and become susceptible again Assuming perfect mixing (complete graph): ds dt di dt = βsi δi 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, I(t) S(t) = β SI +δi 22

23 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 23 SIS Model: Epidemic threshold of an arbitrary graph G is τ, such that: If virus strength s = β / δ < τ the epidemic can not happen (it eventually dies out) Given a graph what is its epidemic threshold?

24 [Wang et al. 2003] 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 24 We have no epidemic if: (Virus) Death rate Epidemic threshold β/δ < τ = 1/ λ 1,A (Virus) Birth rate largest eigenvalue of adj. matrix A λ 1,A alone captures the property of the graph!

25 [Wang et al. 2003] 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 25 Number of Infected Nodes Oregon β = ,900 nodes and 31,180 edges s=β/δ > τ (above threshold) s=β/δ = τ (at the threshold) Time δ: s=β/δ < τ (below threshold)

26 Does it matter how many people are initially infected? 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 26

27 [Gomes et al., Assessing the International Spreading Risk Associated with the 2014 West African Ebola Outbreak, PLOS Current Outbreaks, 2014] 10/16/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 27

28 Gomes et al., 2014] 10/16/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 28

29 Gomes et al., 2014] 10/16/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 29

30

31 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 31 Initially some nodes S are active Each edge (u,v) has probability (weight) p uv b c f a g e 0.3 d i 0.3 h When node u becomes active/infected: It activates each out-neighbor v with prob. p uv Activations spread through the network!

32 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 32 Independent cascade model is simple but requires many parameters! Estimating them from data is very hard [Goyal et al. 2010] Solution: Make all edges have the same weight (which brings us back to the SIR model) 0.4 Simple, but too simple Can we do something better? b c f a g e 0.3 d i 0.3 h

33 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, [KDD 12] 33 From exposures to adoptions Exposure: Node s neighbor exposes the node to the contagion Adoption: The node acts on the contagion

34 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 34 Exposure curve: Probability of adopting new behavior depends on the total number of friends who have already adopted What s the dependence? adopters Prob. of adoption k = number of friends adopting Diminishing returns: Viruses, Information Prob. of adoption k = number of friends adopting Critical mass: Decision making

35 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, [KDD 12] 35 From exposures to adoptions Exposure: Node s neighbor exposes the node to information Adoption: The node acts on the information Adoption curve: Prob(Infection) Probability of infection ever increases Nodes build resistance # exposures

36 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 36 Marketing agency would like you to adopt/buy product X They estimate the adoption curve Should they expose you to X three times? Or, is it better to expose you X, then Y and then X again? 3

37 [Leskovec et al., TWEB 07] 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 37 Senders and followers of recommendations receive discounts on products 10% credit 10% off Data: Incentivized Viral Marketing program 16 million recommendations 4 million people, 500k products [Leskovec-Adamic-Huberman, 2007]

38 10/15/2014 [Leskovec et al., TWEB 07] Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 38 Books Probability of purchasing # recommendations received DVD recommendations (8.2 million observations)

39 10/15/2014 [Backstrom et al. KDD 06] Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 40 Group memberships spread over the network: Red circles represent existing group members Yellow squares may join Question: How does prob. of joining a group depend on the number of friends already in the group?

40 [Backstrom et al., KDD 06] 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 41 LiveJournal group membership Prob. of joining k (number of friends in the group)

41 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 42 Twitter [Romero et al. 11] Aug 09 to Jan 10, 3B tweets, 60M users Avg. exposure curve for the top 500 hashtags What are the most important aspects of the shape of exposure curves? Curve reaches peak fast, decreases after!

42 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 43 Persistence of P is the ratio of the area under the curve P and the area of the rectangle of length max(p), width max(d(p)) D(P) is the domain of P Persistence measures the decay of exposure curves Stickiness of P is max(p) Stickiness is the probability of usage at the most effective exposure

43 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 44 Manually identify 8 broad categories with at least 20 HTs in each Persistence True Rnd. subset Idioms and Music have lower persistence than that of a random subset of hashtags of the same size Politics and Sports have higher persistence than that of a random subset of hashtags of the same size

44 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 45 Technology and Movies have lower stickiness than that of a random subset of hashtags Music has higher stickiness than that of a random subset of hashtags (of the same size)

45

46 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 48 So far we considered pieces of information as independently propagating. Do pieces of information interact? Did 1st cat video decrease adoption probability of 2nd cat video? ` Did cat videos increase adoption probability of dog video?

47 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 49 Goal: Model interaction between many pieces of information Some pieces of information may help each other in adoption Other may compete for attention

48 c2 c0 c1 c3 Neighbors The User P(adopt P(adopt c3 c2 P(adopt exposed c1 exposed c0) to to c2 to c1, c1, c0), c0) 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 50

49 You are reading posts on Twitter: You examine posts one by one Currently you are examining X How does your probability of reposting X depend on what you have seen in the past? Contagions adopted by neighbors: Y2 Y1 X c5 c4 c3 c2 Time Adopt? 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 51

50 Time 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 52 We assume K most recent exposures effect a user s adoption: P(adopt X=c 0 exposed Y 1 =c 1, Y 2 =c 2,..., Y K =c k ) Contagion the user is viewing now. Contagions adopted by neighbors: Contagions the user previously viewed. Y1 Y2 X c5 c4 c3 c2 c1 Adopt?

51 Time 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 53 We assume K most recent exposures effect a user s adoption: P(adopt X=c 0 exposed Y 1 =c 1, Y 2 =c 2,..., Y K =c k ) Contagion the user is viewing now. Contagions adopted by neighbors: Contagions the user previously viewed. Y1 Y2 X c5 c4 c3 c2 c1 c0 Adopt?

52 How many parameters? KK ww 22 Too many! KK history size ww number of contagions 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 54 Imagine we want to estimate: P(X Y 1, Y 5 ) What s the problem? What s the size of probability table P(X Y 1, Y 5 )? = (Num. Contagions) 5 1.9x10 21 Simplification: Assume Y i is independent of Y j PP XX YY 11,, YY KK = KK 11 PP XX KK 11 PP(XX YY kk) kk=11

53 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 55 Goal: Model P(adopt X Y 1,, Y K ) First, assume: Next, assume topics : Prior infection prob. Interaction term (still has w 2 entries!)

54 10/16/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 56 Details Goal: Model P(adopt X Y 1,, Y K ) First, assume: Next, assume topics : Prior infection prob. Interaction term (still has w 2 entries!) Each contagion uu ii has a vector MM ii Entry MM iiss models how much uu ii belongs to topic ss kk ΔΔ cccccccccc ss, tt models the change in infection prob. given that uu ii is on topic ss and exposure k-steps ago was on topic tt

55 10/16/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 57 Details Mj,a cj ci Mi,d (k) a b c d cluster a cluster b cluster c cluster d Memberships to clusters Interactions between clusters

56 10/16/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 58 Details Model parameters: Δ kk topic interaction matrix MM ii,tt... topic membership vector PP(XX)... Prior infection prob. Maximize data likelihood: arg max PP XX XX, YY 1 YY KK 1 PP XX XX, YY 1 YY KK PP xx,mm,δ XX RR XX RR RR contagions X that resulted in infections Solve using stochastic coordinate ascent: Alternate between optimizing Δ and MM

57 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 59 Data from Twitter Complete data from Jan 2011: 3 billion tweets All URLs tweeted by at least 50 users: 191k Task: Predict whether a user will post URL X What do we learn from the model?

58 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 60 How P(post u 2 exp. u 1 ) changes if u 2 and u 1 are similar/different in the content? u 1 is highly viral? Observations: If u 1 is not viral, this boost u 2 If u 1 is highly viral, this kills u 2 BUT: Only if u 1 and u 2 are of low content similarity (LCS) else, u 1 helps u 2 Relative change in infection prob.

59 10/15/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, 61 Modeling contagion interactions 71% of the adoption probability comes from the topic interactions! Modeling user bias does not matter

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University CS224W: Social and Information Network Analysis Jure Leskovec Stanford University Jure Leskovec, Stanford University http://cs224w.stanford.edu [Morris 2000] Based on 2 player coordination game 2 players

More information

CS224W: Analysis of Networks Jure Leskovec, Stanford University

CS224W: Analysis of Networks Jure Leskovec, Stanford University HW2 Q1.1 parts (b) and (c) cancelled. HW3 released. It is long. Start early. CS224W: Analysis of Networks Jure Leskovec, Stanford University http://cs224w.stanford.edu 10/26/17 Jure Leskovec, Stanford

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu Can we identify node groups? (communities, modules, clusters) 2/13/2014 Jure Leskovec, Stanford C246: Mining

More information

The Coral Project: Defending against Large-scale Attacks on the Internet. Chenxi Wang

The Coral Project: Defending against Large-scale Attacks on the Internet. Chenxi Wang 1 The Coral Project: Defending against Large-scale Attacks on the Internet Chenxi Wang chenxi@cmu.edu http://www.ece.cmu.edu/coral.html The Motivation 2 Computer viruses and worms are a prevalent threat

More information

Jure Leskovec Machine Learning Department Carnegie Mellon University

Jure Leskovec Machine Learning Department Carnegie Mellon University Jure Leskovec Machine Learning Department Carnegie Mellon University Currently: Soon: Today: Large on line systems have detailed records of human activity On line communities: Facebook (64 million users,

More information

Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set based Approach

Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set based Approach Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set based Approach Zhuozhao Li and Haiying Shen Dept. of Electrical and Computer Engineering Clemson University, SC, USA Kang Chen

More information

Data mining --- mining graphs

Data mining --- mining graphs Data mining --- mining graphs University of South Florida Xiaoning Qian Today s Lecture 1. Complex networks 2. Graph representation for networks 3. Markov chain 4. Viral propagation 5. Google s PageRank

More information

Using Machine Learning to Optimize Storage Systems

Using Machine Learning to Optimize Storage Systems Using Machine Learning to Optimize Storage Systems Dr. Kiran Gunnam 1 Outline 1. Overview 2. Building Flash Models using Logistic Regression. 3. Storage Object classification 4. Storage Allocation recommendation

More information

ECS 289 / MAE 298, Lecture 15 Mar 2, Diffusion, Cascades and Influence, Part II

ECS 289 / MAE 298, Lecture 15 Mar 2, Diffusion, Cascades and Influence, Part II ECS 289 / MAE 298, Lecture 15 Mar 2, 2011 Diffusion, Cascades and Influence, Part II Diffusion and cascades in networks (Nodes in one of two states) Viruses (human and computer) contact processes epidemic

More information

Large Scale Data Analysis Using Deep Learning

Large Scale Data Analysis Using Deep Learning Large Scale Data Analysis Using Deep Learning Machine Learning Basics - 1 U Kang Seoul National University U Kang 1 In This Lecture Overview of Machine Learning Capacity, overfitting, and underfitting

More information

Social Dynamics of Informa0on Kris0na Lerman USC Informa0on Sciences Ins0tute

Social Dynamics of Informa0on Kris0na Lerman USC Informa0on Sciences Ins0tute Social Dynamics of Informa0on Kris0na Lerman USC Informa0on Sciences Ins0tute h"p://www.isi.edu/~lerman Social media has changed how people create, share and consume informa:on h"p://blog.socialflow.com/post/5246404319/

More information

recruitment Logo Typography Colourways Mechanism Usage Pip Recruitment Brand Toolkit

recruitment Logo Typography Colourways Mechanism Usage Pip Recruitment Brand Toolkit Logo Typography Colourways Mechanism Usage Primary; Secondary; Silhouette; Favicon; Additional Notes; Where possible, use the logo with the striped mechanism behind. Only when it is required to be stripped

More information

Part 1: Link Analysis & Page Rank

Part 1: Link Analysis & Page Rank Chapter 8: Graph Data Part 1: Link Analysis & Page Rank Based on Leskovec, Rajaraman, Ullman 214: Mining of Massive Datasets 1 Graph Data: Social Networks [Source: 4-degrees of separation, Backstrom-Boldi-Rosa-Ugander-Vigna,

More information

CSCI5070 Advanced Topics in Social Computing

CSCI5070 Advanced Topics in Social Computing CSCI5070 Advanced Topics in Social Computing Irwin King The Chinese University of Hong Kong king@cse.cuhk.edu.hk!! 2012 All Rights Reserved. Outline Scale-Free Networks Generation Properties Analysis Dynamic

More information

CS224W: Analysis of Networks Jure Leskovec, Stanford University

CS224W: Analysis of Networks Jure Leskovec, Stanford University CS224W: Analysis of Networks Jure Leskovec, Stanford University http://cs224w.stanford.edu 11/13/17 Jure Leskovec, Stanford CS224W: Analysis of Networks, http://cs224w.stanford.edu 2 Observations Models

More information

Impact of Clustering on Epidemics in Random Networks

Impact of Clustering on Epidemics in Random Networks Impact of Clustering on Epidemics in Random Networks Joint work with Marc Lelarge INRIA-ENS 8 March 2012 Coupechoux - Lelarge (INRIA-ENS) Epidemics in Random Networks 8 March 2012 1 / 19 Outline 1 Introduction

More information

Graph Exploitation Testbed

Graph Exploitation Testbed Graph Exploitation Testbed Peter Jones and Eric Robinson Graph Exploitation Symposium April 18, 2012 This work was sponsored by the Office of Naval Research under Air Force Contract FA8721-05-C-0002. Opinions,

More information

Viral Marketing and Outbreak Detection. Fang Jin Yao Zhang

Viral Marketing and Outbreak Detection. Fang Jin Yao Zhang Viral Marketing and Outbreak Detection Fang Jin Yao Zhang Paper 1: Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, Éva Tardos KDD 2003 Outline Problem Statement

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu SPAM FARMING 2/11/2013 Jure Leskovec, Stanford C246: Mining Massive Datasets 2 2/11/2013 Jure Leskovec, Stanford

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu HITS (Hypertext Induced Topic Selection) Is a measure of importance of pages or documents, similar to PageRank

More information

Lecture 3.3 Robust estimation with RANSAC. Thomas Opsahl

Lecture 3.3 Robust estimation with RANSAC. Thomas Opsahl Lecture 3.3 Robust estimation with RANSAC Thomas Opsahl Motivation If two perspective cameras captures an image of a planar scene, their images are related by a homography HH 2 Motivation If two perspective

More information

Supervised Random Walks

Supervised Random Walks Supervised Random Walks Pawan Goyal CSE, IITKGP September 8, 2014 Pawan Goyal (IIT Kharagpur) Supervised Random Walks September 8, 2014 1 / 17 Correlation Discovery by random walk Problem definition Estimate

More information

Topic mash II: assortativity, resilience, link prediction CS224W

Topic mash II: assortativity, resilience, link prediction CS224W Topic mash II: assortativity, resilience, link prediction CS224W Outline Node vs. edge percolation Resilience of randomly vs. preferentially grown networks Resilience in real-world networks network resilience

More information

A recursive point process model for infectious diseases.

A recursive point process model for infectious diseases. A recursive point process model for infectious diseases. Frederic Paik Schoenberg, UCLA Statistics Collaborators: Marc Hoffmann, Ryan Harrigan. Also thanks to: Project Tycho, CDC, and WHO datasets. 1 1.

More information

Influence Maximization in Location-Based Social Networks Ivan Suarez, Sudarshan Seshadri, Patrick Cho CS224W Final Project Report

Influence Maximization in Location-Based Social Networks Ivan Suarez, Sudarshan Seshadri, Patrick Cho CS224W Final Project Report Influence Maximization in Location-Based Social Networks Ivan Suarez, Sudarshan Seshadri, Patrick Cho CS224W Final Project Report Abstract The goal of influence maximization has led to research into different

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS46: Mining Massive Datasets Jure Leskovec, Stanford University http://cs46.stanford.edu /7/ Jure Leskovec, Stanford C46: Mining Massive Datasets Many real-world problems Web Search and Text Mining Billions

More information

Modularity CMSC 858L

Modularity CMSC 858L Modularity CMSC 858L Module-detection for Function Prediction Biological networks generally modular (Hartwell+, 1999) We can try to find the modules within a network. Once we find modules, we can look

More information

Reinforcement Learning: A brief introduction. Mihaela van der Schaar

Reinforcement Learning: A brief introduction. Mihaela van der Schaar Reinforcement Learning: A brief introduction Mihaela van der Schaar Outline Optimal Decisions & Optimal Forecasts Markov Decision Processes (MDPs) States, actions, rewards and value functions Dynamic Programming

More information

TABLE OF CONTENTS. 3 Intro. 4 Foursquare Logo. 6 Foursquare Icon. 9 Colors. 10 Copy & Tone Of Voice. 11 Typography. 13 Crown Usage.

TABLE OF CONTENTS. 3 Intro. 4 Foursquare Logo. 6 Foursquare Icon. 9 Colors. 10 Copy & Tone Of Voice. 11 Typography. 13 Crown Usage. BRANDBOOK TABLE OF CONTENTS 3 Intro 4 Foursquare Logo 6 Foursquare Icon 9 Colors 10 Copy & Tone Of Voice 11 Typography 13 Crown Usage 14 Badge Usage 15 Iconography 16 Trademark Guidelines 2011 FOURSQUARE

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu 2/24/2014 Jure Leskovec, Stanford CS246: Mining Massive Datasets, http://cs246.stanford.edu 2 High dim. data

More information

Box-Cox Transformation for Simple Linear Regression

Box-Cox Transformation for Simple Linear Regression Chapter 192 Box-Cox Transformation for Simple Linear Regression Introduction This procedure finds the appropriate Box-Cox power transformation (1964) for a dataset containing a pair of variables that are

More information

Cloud Computing: "network access to shared pool of configurable computing resources"

Cloud Computing: network access to shared pool of configurable computing resources Large-Scale Networks Gossip-based Protocols Consistency for Large-Scale Data Replication Uwe Roehm / Vincent Gramoli School of Information Technologies The University of Sydney Page 1 Cloud Computing:

More information

The ABC s of Web Site Evaluation

The ABC s of Web Site Evaluation Aa Bb Cc Dd Ee Ff Gg Hh Ii Jj Kk Ll Mm Nn Oo Pp Qq Rr Ss Tt Uu Vv Ww Xx Yy Zz The ABC s of Web Site Evaluation by Kathy Schrock Digital Literacy by Paul Gilster Digital literacy is the ability to understand

More information

Models and Algorithms for Network Immunization

Models and Algorithms for Network Immunization Models and Algorithms for Network Immunization George Giakkoupis University of Toronto Aristides Gionis, Evimaria Terzi and Panayiotis Tsaparas University of Helsinki Abstract Recently, there has been

More information

Cascades. Rik Sarkar. Social and Technological Networks. University of Edinburgh, 2018.

Cascades. Rik Sarkar. Social and Technological Networks. University of Edinburgh, 2018. Cascades Social and Technological Networks Rik Sarkar University of Edinburgh, 2018. Course Solutions to Ex0 are up Make sure you are comfortable with this material Notes 1 with exercise questions are

More information

Big Data Analytics CSCI 4030

Big Data Analytics CSCI 4030 High dim. data Graph data Infinite data Machine learning Apps Locality sensitive hashing PageRank, SimRank Filtering data streams SVM Recommen der systems Clustering Community Detection Web advertising

More information

Box-Cox Transformation

Box-Cox Transformation Chapter 190 Box-Cox Transformation Introduction This procedure finds the appropriate Box-Cox power transformation (1964) for a single batch of data. It is used to modify the distributional shape of a set

More information

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University http://cs224w.stanford.edu How to organize the Web? First try: Human curated Web directories Yahoo, DMOZ, LookSmart Second

More information

Section 1: Introduction to Geometry Points, Lines, and Planes

Section 1: Introduction to Geometry Points, Lines, and Planes Section 1: Introduction to Geometry Points, Lines, and Planes Topic 1: Basics of Geometry - Part 1... 3 Topic 2: Basics of Geometry Part 2... 5 Topic 3: Midpoint and Distance in the Coordinate Plane Part

More information

Lecture Notes to Big Data Management and Analytics Winter Term 2017/2018 Node Importance and Neighborhoods

Lecture Notes to Big Data Management and Analytics Winter Term 2017/2018 Node Importance and Neighborhoods Lecture Notes to Big Data Management and Analytics Winter Term 2017/2018 Node Importance and Neighborhoods Matthias Schubert, Matthias Renz, Felix Borutta, Evgeniy Faerman, Christian Frey, Klaus Arthur

More information

Modeling of Complex Social. MATH 800 Fall 2011

Modeling of Complex Social. MATH 800 Fall 2011 Modeling of Complex Social Systems MATH 800 Fall 2011 Complex SocialSystems A systemis a set of elements and relationships A complex system is a system whose behavior cannot be easily or intuitively predicted

More information

Brand Guidelines October, 2014

Brand Guidelines October, 2014 Brand Guidelines October, 2014 Contents 1 Logo 2 Graphical Elements 3 Icons 4 Typography 5 Colors 6 Stationery 7 Social Media 8 Templates 9 Product Line logos Brand Guidelines Page 2 1) Logo Logo: Overview

More information

Part I Part II Part III Part IV Part V. Influence Maximization

Part I Part II Part III Part IV Part V. Influence Maximization Part I Part II Part III Part IV Part V Influence Maximization 1 Word-of-mouth (WoM) effect in social networks xphone is good xphone is good xphone is good xphone is good xphone is good xphone is good xphone

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu Web advertising We discussed how to match advertisers to queries in real-time But we did not discuss how to estimate

More information

High-Dimensional Connectivity and Cooperation

High-Dimensional Connectivity and Cooperation GAMES 01. Istanbul 4th World ongress of the Game Theory Society High-imensional onnectivity and ooperation Amparo Urbano, Angel Sánchez & Jose Vila ERI-ES / epartment of Economic Analysis University of

More information

CS6716 Pattern Recognition

CS6716 Pattern Recognition CS6716 Pattern Recognition Prototype Methods Aaron Bobick School of Interactive Computing Administrivia Problem 2b was extended to March 25. Done? PS3 will be out this real soon (tonight) due April 10.

More information

BRANDING AND STYLE GUIDELINES

BRANDING AND STYLE GUIDELINES BRANDING AND STYLE GUIDELINES INTRODUCTION The Dodd family brand is designed for clarity of communication and consistency within departments. Bold colors and photographs are set on simple and clean backdrops

More information

On Instant Messaging Worms, Analysis and Countermeasures

On Instant Messaging Worms, Analysis and Countermeasures COMP 4108 Presentation - Sept 20, 2005 On Instant Messaging Worms, Analysis and Countermeasures Mohammad Mannan School of Computer Science Carleton University, Canada Goals of this talk Discuss a few IM

More information

Clustering Lecture 5: Mixture Model

Clustering Lecture 5: Mixture Model Clustering Lecture 5: Mixture Model Jing Gao SUNY Buffalo 1 Outline Basics Motivation, definition, evaluation Methods Partitional Hierarchical Density-based Mixture model Spectral methods Advanced topics

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University We need your help with our research on human interpretable machine learning. Please complete a survey at http://stanford.io/1wpokco. It should be fun and take about 1min to complete. Thanks a lot for your

More information

Mining of Massive Datasets Jure Leskovec, AnandRajaraman, Jeff Ullman Stanford University

Mining of Massive Datasets Jure Leskovec, AnandRajaraman, Jeff Ullman Stanford University Note to other teachers and users of these slides: We would be delighted if you found this our material useful in giving your own lectures. Feel free to use these slides verbatim, or to modify them to fit

More information

CS249: ADVANCED DATA MINING

CS249: ADVANCED DATA MINING CS249: ADVANCED DATA MINING Classification Evaluation and Practical Issues Instructor: Yizhou Sun yzsun@cs.ucla.edu April 24, 2017 Homework 2 out Announcements Due May 3 rd (11:59pm) Course project proposal

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu [Kumar et al. 99] 2/13/2013 Jure Leskovec, Stanford CS246: Mining Massive Datasets, http://cs246.stanford.edu

More information

Clustering: Classic Methods and Modern Views

Clustering: Classic Methods and Modern Views Clustering: Classic Methods and Modern Views Marina Meilă University of Washington mmp@stat.washington.edu June 22, 2015 Lorentz Center Workshop on Clusters, Games and Axioms Outline Paradigms for clustering

More information

The Role of Information Scent in On-line Browsing:

The Role of Information Scent in On-line Browsing: The Role of Information Scent in On-line Browsing: Extensions of the ACT-R Utility and Concept Formation Mechanisms Peter Pirolli User Interface Research Area Supported in part by Office of Naval Research

More information

Multi-view object segmentation in space and time. Abdelaziz Djelouah, Jean Sebastien Franco, Edmond Boyer

Multi-view object segmentation in space and time. Abdelaziz Djelouah, Jean Sebastien Franco, Edmond Boyer Multi-view object segmentation in space and time Abdelaziz Djelouah, Jean Sebastien Franco, Edmond Boyer Outline Addressed problem Method Results and Conclusion Outline Addressed problem Method Results

More information

Eureka Math. Grade, Module 6. Student File_B. Contains Sprint and Fluency, Exit Ticket, and Assessment Materials

Eureka Math. Grade, Module 6. Student File_B. Contains Sprint and Fluency, Exit Ticket, and Assessment Materials A Story of Units Eureka Math Grade, Module 6 Student File_B Contains Sprint and Fluency, Exit Ticket, and Assessment Materials Published by the non-profit Great Minds. Copyright 05 Great Minds. No part

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu 3/6/2012 Jure Leskovec, Stanford CS246: Mining Massive Datasets, http://cs246.stanford.edu 2 In many data mining

More information

How Infections Spread on Networks CS 523: Complex Adaptive Systems Assignment 4: Due Dec. 2, :00 pm

How Infections Spread on Networks CS 523: Complex Adaptive Systems Assignment 4: Due Dec. 2, :00 pm 1 Introduction How Infections Spread on Networks CS 523: Complex Adaptive Systems Assignment 4: Due Dec. 2, 2015 5:00 pm In this assignment you will investigate the spread of disease on networks. In class

More information

Absorbing Random walks Coverage

Absorbing Random walks Coverage DATA MINING LECTURE 3 Absorbing Random walks Coverage Random Walks on Graphs Random walk: Start from a node chosen uniformly at random with probability. n Pick one of the outgoing edges uniformly at random

More information

Brand Standards. V1 For Internal Use. Newcastle Systems Brand Standards 1

Brand Standards. V1 For Internal Use. Newcastle Systems Brand Standards 1 Brand Standards V1 For Internal Use Newcastle Systems Brand Standards 1 Logo In order to ensure that the logo appears consistent in all mediums do not alter it in any way. This includes stretching, changing

More information

Bland-Altman Plot and Analysis

Bland-Altman Plot and Analysis Chapter 04 Bland-Altman Plot and Analysis Introduction The Bland-Altman (mean-difference or limits of agreement) plot and analysis is used to compare two measurements of the same variable. That is, it

More information

Jure Leskovec Computer Science Department Cornell University / Stanford University

Jure Leskovec Computer Science Department Cornell University / Stanford University Jure Leskovec Computer Science Department Cornell University / Stanford University Large on line systems have detailed records of human activity On line communities: Facebook (64 million users, billion

More information

Eureka Math. Grade 7, Module 6. Student File_A. Contains copy-ready classwork and homework

Eureka Math. Grade 7, Module 6. Student File_A. Contains copy-ready classwork and homework A Story of Ratios Eureka Math Grade 7, Module 6 Student File_A Contains copy-ready classwork and homework Published by the non-profit Great Minds. Copyright 2015 Great Minds. No part of this work may be

More information

Geometric Registration for Deformable Shapes 3.3 Advanced Global Matching

Geometric Registration for Deformable Shapes 3.3 Advanced Global Matching Geometric Registration for Deformable Shapes 3.3 Advanced Global Matching Correlated Correspondences [ASP*04] A Complete Registration System [HAW*08] In this session Advanced Global Matching Some practical

More information

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University http://cs224w.stanford.edu 10/10/2011 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, http://cs224w.stanford.edu

More information

Social Networks. Slides by : I. Koutsopoulos (AUEB), Source:L. Adamic, SN Analysis, Coursera course

Social Networks. Slides by : I. Koutsopoulos (AUEB), Source:L. Adamic, SN Analysis, Coursera course Social Networks Slides by : I. Koutsopoulos (AUEB), Source:L. Adamic, SN Analysis, Coursera course Introduction Political blogs Organizations Facebook networks Ingredient networks SN representation Networks

More information

Extracting Information from Complex Networks

Extracting Information from Complex Networks Extracting Information from Complex Networks 1 Complex Networks Networks that arise from modeling complex systems: relationships Social networks Biological networks Distinguish from random networks uniform

More information

Fall 2018 CSE 482 Big Data Analysis: Exam 1 Total: 36 (+3 bonus points)

Fall 2018 CSE 482 Big Data Analysis: Exam 1 Total: 36 (+3 bonus points) Fall 2018 CSE 482 Big Data Analysis: Exam 1 Total: 36 (+3 bonus points) Name: This exam is open book and notes. You can use a calculator but no laptops, cell phones, nor other electronic devices are allowed.

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu 2/25/2013 Jure Leskovec, Stanford CS246: Mining Massive Datasets, http://cs246.stanford.edu 3 In many data mining

More information

Big Data Analytics CSCI 4030

Big Data Analytics CSCI 4030 High dim. data Graph data Infinite data Machine learning Apps Locality sensitive hashing PageRank, SimRank Filtering data streams SVM Recommen der systems Clustering Community Detection Web advertising

More information

Sequence alignment is an essential concept for bioinformatics, as most of our data analysis and interpretation techniques make use of it.

Sequence alignment is an essential concept for bioinformatics, as most of our data analysis and interpretation techniques make use of it. Sequence Alignments Overview Sequence alignment is an essential concept for bioinformatics, as most of our data analysis and interpretation techniques make use of it. Sequence alignment means arranging

More information

Link Analysis. Hongning Wang

Link Analysis. Hongning Wang Link Analysis Hongning Wang CS@UVa Structured v.s. unstructured data Our claim before IR v.s. DB = unstructured data v.s. structured data As a result, we have assumed Document = a sequence of words Query

More information

Community detection algorithms survey and overlapping communities. Presented by Sai Ravi Kiran Mallampati

Community detection algorithms survey and overlapping communities. Presented by Sai Ravi Kiran Mallampati Community detection algorithms survey and overlapping communities Presented by Sai Ravi Kiran Mallampati (sairavi5@vt.edu) 1 Outline Various community detection algorithms: Intuition * Evaluation of the

More information

Quadratic Functions Date: Per:

Quadratic Functions Date: Per: Math 2 Unit 10 Worksheet 1 Name: Quadratic Functions Date: Per: [1-3] Using the equations and the graphs from section B of the NOTES, fill out the table below. Equation Min or Max? Vertex Domain Range

More information

Absorbing Random walks Coverage

Absorbing Random walks Coverage DATA MINING LECTURE 3 Absorbing Random walks Coverage Random Walks on Graphs Random walk: Start from a node chosen uniformly at random with probability. n Pick one of the outgoing edges uniformly at random

More information

Parsimonious Active Monitoring and Overlay Routing

Parsimonious Active Monitoring and Overlay Routing Séminaire STORE Parsimonious Active Monitoring and Overlay Routing Olivier Brun LAAS CNRS, Toulouse, France February 23 rd, 2017 Olivier Brun STORE Seminar, February 20th, 2017 1 / 34 Outline Introduction

More information

10-701/15-781, Fall 2006, Final

10-701/15-781, Fall 2006, Final -7/-78, Fall 6, Final Dec, :pm-8:pm There are 9 questions in this exam ( pages including this cover sheet). If you need more room to work out your answer to a question, use the back of the page and clearly

More information

Introduction to ANSYS DesignXplorer

Introduction to ANSYS DesignXplorer Lecture 4 14. 5 Release Introduction to ANSYS DesignXplorer 1 2013 ANSYS, Inc. September 27, 2013 s are functions of different nature where the output parameters are described in terms of the input parameters

More information

6.034 Quiz 2, Spring 2005

6.034 Quiz 2, Spring 2005 6.034 Quiz 2, Spring 2005 Open Book, Open Notes Name: Problem 1 (13 pts) 2 (8 pts) 3 (7 pts) 4 (9 pts) 5 (8 pts) 6 (16 pts) 7 (15 pts) 8 (12 pts) 9 (12 pts) Total (100 pts) Score 1 1 Decision Trees (13

More information

Epidemic spreading on networks

Epidemic spreading on networks Epidemic spreading on networks Due date: Sunday October 25th, 2015, at 23:59. Always show all the steps which you made to arrive at your solution. Make sure you answer all parts of each question. Always

More information

Maximizing the Spread of Influence through a Social Network. David Kempe, Jon Kleinberg and Eva Tardos

Maximizing the Spread of Influence through a Social Network. David Kempe, Jon Kleinberg and Eva Tardos Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg and Eva Tardos Group 9 Lauren Thomas, Ryan Lieblein, Joshua Hammock and Mary Hanvey Introduction In a social network,

More information

Eureka Math. Geometry, Module 4. Student File_B. Contains Exit Ticket, and Assessment Materials

Eureka Math. Geometry, Module 4. Student File_B. Contains Exit Ticket, and Assessment Materials A Story of Functions Eureka Math Geometry, Module 4 Student File_B Contains Exit Ticket, and Assessment Materials Published by the non-profit Great Minds. Copyright 2015 Great Minds. No part of this work

More information

Influence Maximization in the Independent Cascade Model

Influence Maximization in the Independent Cascade Model Influence Maximization in the Independent Cascade Model Gianlorenzo D Angelo, Lorenzo Severini, and Yllka Velaj Gran Sasso Science Institute (GSSI), Viale F. Crispi, 7, 67100, L Aquila, Italy. {gianlorenzo.dangelo,lorenzo.severini,yllka.velaj}@gssi.infn.it

More information

Information Networks: PageRank

Information Networks: PageRank Information Networks: PageRank Web Science (VU) (706.716) Elisabeth Lex ISDS, TU Graz June 18, 2018 Elisabeth Lex (ISDS, TU Graz) Links June 18, 2018 1 / 38 Repetition Information Networks Shape of the

More information

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University, y http://cs224w.stanford.edu Due in 1 week: Oct 4 in class! The idea of the reaction papers is: To familiarize yourselves

More information

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University http://cs224w.stanford.edu How to organize the Web? First try: Human curated Web directories Yahoo, DMOZ, LookSmart Second

More information

INTEGRATE MOBILE MESSAGING INTO YOUR MARKETING MIX TO DRIVE IMMEDIATE ROI. Learn more

INTEGRATE MOBILE MESSAGING INTO YOUR MARKETING MIX TO DRIVE IMMEDIATE ROI. Learn more INTEGRATE MOBILE MESSAGING INTO YOUR MARKETING MIX TO DRIVE IMMEDIATE ROI Learn more www.outspoken.com @getoutspoken! BRANDS EMBRACING TEXT MESSAGE MARKETING Text message marketing boasts up to a 45% ROI

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining Lecture #10: Link Analysis-2 Seoul National University 1 In This Lecture Pagerank: Google formulation Make the solution to converge Computing Pagerank for very large graphs

More information

Algorithms and Applications in Social Networks. 2017/2018, Semester B Slava Novgorodov

Algorithms and Applications in Social Networks. 2017/2018, Semester B Slava Novgorodov Algorithms and Applications in Social Networks 2017/2018, Semester B Slava Novgorodov 1 Lesson #1 Administrative questions Course overview Introduction to Social Networks Basic definitions Network properties

More information

Phase Transitions in Random Graphs- Outbreak of Epidemics to Network Robustness and fragility

Phase Transitions in Random Graphs- Outbreak of Epidemics to Network Robustness and fragility Phase Transitions in Random Graphs- Outbreak of Epidemics to Network Robustness and fragility Mayukh Nilay Khan May 13, 2010 Abstract Inspired by empirical studies researchers have tried to model various

More information

MSA220 - Statistical Learning for Big Data

MSA220 - Statistical Learning for Big Data MSA220 - Statistical Learning for Big Data Lecture 13 Rebecka Jörnsten Mathematical Sciences University of Gothenburg and Chalmers University of Technology Clustering Explorative analysis - finding groups

More information

CSE 316: SOCIAL NETWORK ANALYSIS INTRODUCTION. Fall 2017 Marion Neumann

CSE 316: SOCIAL NETWORK ANALYSIS INTRODUCTION. Fall 2017 Marion Neumann CSE 316: SOCIAL NETWORK ANALYSIS Fall 2017 Marion Neumann INTRODUCTION Contents in these slides may be subject to copyright. Some materials are adopted from: http://www.cs.cornell.edu/home /kleinber/ networks-book,

More information

1.2 Round-off Errors and Computer Arithmetic

1.2 Round-off Errors and Computer Arithmetic 1.2 Round-off Errors and Computer Arithmetic 1 In a computer model, a memory storage unit word is used to store a number. A word has only a finite number of bits. These facts imply: 1. Only a small set

More information

Math 1505G, 2013 Graphs and Matrices

Math 1505G, 2013 Graphs and Matrices Math 505G, 0 Graphs and Matrices September 7, 0 These are some notes for the short talk I gave the other day. We ll discuss an interesting application of matrix algebra. This is outside what will be tested

More information

Algorithmic Problems in Epidemiology

Algorithmic Problems in Epidemiology Algorithmic Problems in Epidemiology Anil Vullikanti and Madhav Marathe Dept. of Computer Science and Virginia Bioinformatics Institute Virginia Tech Dynamics of epidemic How many infections? Questions

More information

Big Data Analytics CSCI 4030

Big Data Analytics CSCI 4030 High dim. data Graph data Infinite data Machine learning Apps Locality sensitive hashing PageRank, SimRank Filtering data streams SVM Recommen der systems Clustering Community Detection Queries on streams

More information

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University http://cs224w.stanford.edu 10/4/2011 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, http://cs224w.stanford.edu

More information

Lecture on Modeling Tools for Clustering & Regression

Lecture on Modeling Tools for Clustering & Regression Lecture on Modeling Tools for Clustering & Regression CS 590.21 Analysis and Modeling of Brain Networks Department of Computer Science University of Crete Data Clustering Overview Organizing data into

More information

6.801/866. Segmentation and Line Fitting. T. Darrell

6.801/866. Segmentation and Line Fitting. T. Darrell 6.801/866 Segmentation and Line Fitting T. Darrell Segmentation and Line Fitting Gestalt grouping Background subtraction K-Means Graph cuts Hough transform Iterative fitting (Next time: Probabilistic segmentation)

More information