HYDRA Large-scale Social Identity Linkage via Heterogeneous Behavior Modeling
|
|
- Eunice Walker
- 5 years ago
- Views:
Transcription
1 HYDRA Large-scale Social Identity Linkage via Heterogeneous Behavior Modeling Siyuan Liu Carnegie Mellon. University Siyuan Liu, Shuhui Wang, Feida Zhu, Jinbo Zhang, Ramayya Krishnan. HYDRA: Large-scale Social Identity Linkage via Heterogeneous Behavior Modeling. The 41 st ACM SIGMOD International Conference on Management of Data Snowbird, USA.
2 Social Identity Linkage Link up all the data of the same social user across different social platforms
3 Background The recent blossom of social network services of all kinds has revolutionized our social life Many different social networks. Many different social users. Various information shared like never before (e.g., microblogs, images, videos, reviews, check-ins).
4 Completeness Problem Social Identity Linkage Cross-platform user linkage would enrich an otherwisefragmented user profile to enable an all-around understanding of a user s interests and behavior patterns. Consistency Cross-checking among multiple platforms helps improve the consistency of user information. Continuity User identity linkage makes it possible to integrate useful user information from those platforms that have over time become less popular or even abandoned.
5 Example: Easy
6 Example: Not Easy
7 Challenges Unreliable Usernames Traditional approaches that heavily rely on username parsing to link users may fail on more diversified communities. Statistical models (e.g. SVM) or rule based models constructed with mere username and attribute analysis are far from being robust to accurately identify user linkage across online social communities.
8 Challenges Missing Information At least 80% of users are missing at least 2 profile attributes out of the 6 most popular ones, and merely 5% of users have all attributes filled up.
9 Challenges Misaligned Information Veracity. Platform Difference. Heterogeneous behavior: The user behavior can be represented by various types of media, e.g., locations, blogs, tweets, videos and images Behavior Asynchrony. Data Imbalance.
10 Question Can we make it? Social Identity Linkage Across Different Social Platforms
11 Demo: HYDRA We made it!!
12 Problem Formulation Social Identity Linkage (SIL) Given two social network platforms S and S', find a function f to decide if any two users picked from S and S respectively correspond to the same natural person, f: C S C S {0,1}, such that for any pair of users, we have: f(u i, u i ) = 1, if φ S(u i ) = φ S (u i ) 0, otherwise
13 HYDRA Framework
14 Main Steps Behavior Similarity Modeling Calculate the multi-dimensional similarity vector between two users of a pair for all user pairs via heterogeneous behavior modeling. Structure Information Modeling We construct the structure consistency graph on user pairs by considering both the core network structure of the users and their behavior similarities. Multi-objective Optimization with Missing Information A two-class classification model via optimizing two kinds of objective functions simultaneously.
15 HETEROGENEOUS BEHAVIOR MODEL
16 User Attributes User Social Data Demographic information, contact, etc. UGC(User Generated Content) Text (reviews, microblogs, etc.), images, videos and so on. User Behavior Trajectory Befriend, follow/unfollow, retweet, thumb-up/thumb-down. User Core Social Network The most frequently contacted friends.
17 User Attribute Modeling The relative importance of different attributes is modeled to avoid over-matching Textual Attributes: age, gender, nationality, company etc. Visual Attributes: a safe facial image verification strategy to judge if the profile images are the same person.
18 User Topic Modeling Topic Distribution: modeling the topic distribution in multiple time ranges 16 days 8 days 4 days t t i i' C t time buckets 2C t time buckets 4C t time buckets Two kinds of topics are considered: Content Genre Distribution. Sentiment Pattern Distribution.
19 User Style Modeling Comments, tweets and re-tweets usually reflect a user s opinions and language style. Extract the most unique words of each user by a simple term frequency analysis on the whole database. Conduct simple matching on the unique patterns.
20 User Behavior Trajectory Consider the asynchronization of the same behavior (operation) on different platforms. S mr = 1 N N i=1 s mr (i) q 1 q, q 1 Typical behavior patterns: Location and Mobile Trajectory Information Multimedia Content Generation and Sharing
21 Multi-resolution Behavior Modeling A neuro-network like behavior pattern matching and similarity aggregation in different temporal resolutions.
22 Pattern-matching Sensors Location Matching Sensor: detect if users appear in the same location within a time range. Near Duplicate Multimedia Sensor: detect if the videos / audios / images that two users uploaded are duplicate with multimedia processing tools.
23 Core Social Network Modeling People may share similar habit with their closest friends. A behavior similarity aggregation of the most contact friends of users provides informative description on how users interact with their social ties.
24 MULTI-OBJECTIVE MODEL LEARNING
25 Multi-objective Optimization Supervised Learning Framework Structure Consistency Modeling Multi-objective Optimization Remark: A two-class classification problem and construct multi-objective optimization which jointly optimizes the prediction accuracy on the labeled user pairs and multiple structure consistency measurements across different platforms.
26 A Structure Consistency modeling framework Platform S Platform S Bob Bob Henry Henry Alice Alice Black arrows: the ground-truth linkage information. Red arrows: the correct linkage. Green arrows: the falsely linked persons.
27 Multi-objective Optimization Framework Decision Model on Pairwise Similarity Support vector machine: High Order Structure Consistency An eigen-decomposition on the structure consistency graph Multi-objective Optimization A generalized semi-supervised learning framework by optimizing the abovementioned two objective functions.
28 Discussion of the Model The solution of our model is necessary and sufficient for Pareto optimality. Proof in sketch: See Athan et. al. and Yu et. al. Our model performs social identity linkage on the core social structure level by MOO rather than merely person-to-person judgments. Athan et al. A note on weighted criteria methods for compromise solutions in multiobjective optimization. Engineering Optimization, 27: , Yu et al. Multiple-criteria decision making: concepts, techniques, and extensions. Plenum Press New York, 1985.
29 EXPERIMENTAL EVALUATION
30 Experiment Setup Chinese (5 million users) SinaWeibo Tecent Weibo Renren Douban Kaixin English (5 million users) Twitter Facebook
31 Effectiveness: # Labeled Pairs
32 Effectiveness: # Unlabeled Pairs
33 Effectiveness: # Social Communities
34 Effectiveness: Various Social Platforms
35 Efficiency: Running Time
36 Sensitivity: Missing Data
37 CONCLUSION
38 Contribution Heterogeneous Behavior Model Robustly deal with missing information and misaligned behavior by long-term behavior distribution construction A multi-resolution temporal behavior matching paradigm Structure Consistency Leverage users core social network structure Multi-objective Model Learning
39 A Question Who knows/ understands you better? Google? Only access 0.001% of all the online information 1 Facebook? Twitter? Yourself?! 1 Social Media and Big Data. McKinsey
40 Thank you!
ISSN Vol.04,Issue.11, August-2016, Pages:
WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.11, August-2016, Pages:1950-1956 HYDRA: Social Identity Relation via Heterogeneous Behavior Modeling P.ESWARAIAH 1, PASUPULETI JHANSI 2 1 Assocaite Professor,
More informationA Novel deep learning models for Cold Start Product Recommendation using Micro blogging Information
A Novel deep learning models for Cold Start Product Recommendation using Micro blogging Information Chunchu.Harika, PG Scholar, Department of CSE, QIS College of Engineering and Technology, Ongole, Andhra
More informationSocial Network Mining An Introduction
Social Network Mining An Introduction Jiawei Zhang Assistant Professor Florida State University Big Data A Questionnaire Please raise your hands, if you (1) use Facebook (2) use Instagram (3) use Snapchat
More informationSOCIAL MEDIA. Charles Murphy
SOCIAL MEDIA Charles Murphy Social Media Overview 1. Introduction 2. Social Media Areas Blogging Bookmarking Deals Location-based Music Photo sharing Video 3. The Fab Four FaceBook Google+ Linked In Twitter
More informationMeta-path based Multi-Network Collective Link Prediction
Meta-path based Multi-Network Collective Link Prediction Jiawei Zhang 1,2, Philip S. Yu 1, Zhi-Hua Zhou 2 University of Illinois at Chicago 2, Nanjing University 2 Traditional social link prediction in
More informationLink Analysis in Weibo
Link Analysis in Weibo Liwen Sun AMPLab, EECS liwen@cs.berkeley.edu Di Wang Theory Group, EECS wangd@eecs.berkeley.edu Abstract With the widespread use of social network applications, online user behaviors,
More informationExtracting Information from Social Networks
Extracting Information from Social Networks Reminder: Social networks Catch-all term for social networking sites Facebook microblogging sites Twitter blog sites (for some purposes) 1 2 Ways we can use
More informationMining Social Media Users Interest
Mining Social Media Users Interest Presenters: Heng Wang,Man Yuan April, 4 th, 2016 Agenda Introduction to Text Mining Tool & Dataset Data Pre-processing Text Mining on Twitter Summary & Future Improvement
More informationQMiner is a data analytics platform for processing large-scale real-time streams containing structured and unstructured data.
Data analytics with QMiner This topic provides a practical insights on data analytics using QMiner. QMiner implements a comprehensive set of techniques for supervised, unsupervised and active learning
More informationELEC6910Q Analytics and Systems for Social Media and Big Data Applications Lecture 4. Prof. James She
ELEC6910Q Analytics and Systems for Social Media and Big Data Applications Lecture 4 Prof. James She james.she@ust.hk 1 Selected Works of Activity 4 2 Selected Works of Activity 4 3 Last lecture 4 Mid-term
More informationUser-centric Cross-network Social Multimedia Computing
Part III User-centric Cross-network Social Multimedia Computing Jitao Sang Multimedia Computing Group National Lab of Pattern Recognition, Institute of Automation Chinese Academy of Sciences Big Data &
More informationAn Oracle White Paper October Oracle Social Cloud Platform Text Analytics
An Oracle White Paper October 2012 Oracle Social Cloud Platform Text Analytics Executive Overview Oracle s social cloud text analytics platform is able to process unstructured text-based conversations
More informationCombining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating
Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Dipak J Kakade, Nilesh P Sable Department of Computer Engineering, JSPM S Imperial College of Engg. And Research,
More informationPinterest. What is Pinterest?
Pinterest What is Pinterest? Pinterest is like an electronic bulletin board that allows users to save and share photos they find on the internet. Usually when a user pins a photo it is linked to a blog
More informationover Multi Label Images
IBM Research Compact Hashing for Mixed Image Keyword Query over Multi Label Images Xianglong Liu 1, Yadong Mu 2, Bo Lang 1 and Shih Fu Chang 2 1 Beihang University, Beijing, China 2 Columbia University,
More informationHTML 5 and CSS 3, Illustrated Complete. Unit M: Integrating Social Media Tools
HTML 5 and CSS 3, Illustrated Complete Unit M: Integrating Social Media Tools Objectives Understand social networking Integrate a Facebook account with a Web site Integrate a Twitter account feed Add a
More informationCollecting social media data based on open APIs
Collecting social media data based on open APIs Ye Li With Qunyan Zhang, Haixin Ma, Weining Qian, and Aoying Zhou http://database.ecnu.edu.cn/ Outline Social Media Data Set Data Feature Data Model Data
More informationA data-driven framework for archiving and exploring social media data
A data-driven framework for archiving and exploring social media data Qunying Huang and Chen Xu Yongqi An, 20599957 Oct 18, 2016 Introduction Social media applications are widely deployed in various platforms
More informationKernels + K-Means Introduction to Machine Learning. Matt Gormley Lecture 29 April 25, 2018
10-601 Introduction to Machine Learning Machine Learning Department School of Computer Science Carnegie Mellon University Kernels + K-Means Matt Gormley Lecture 29 April 25, 2018 1 Reminders Homework 8:
More informationSurvey on Recommendation of Personalized Travel Sequence
Survey on Recommendation of Personalized Travel Sequence Mayuri D. Aswale 1, Dr. S. C. Dharmadhikari 2 ME Student, Department of Information Technology, PICT, Pune, India 1 Head of Department, Department
More informationD B M G Data Base and Data Mining Group of Politecnico di Torino
DataBase and Data Mining Group of Data mining fundamentals Data Base and Data Mining Group of Data analysis Most companies own huge databases containing operational data textual documents experiment results
More informationIEEE TRANSACTIONS ON MULTIMEDIA, VOL. 17, NO. 7, JULY Relational User Attribute Inference in Social Media
IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 17, NO. 7, JULY 2015 1031 Relational User Attribute Inference in Social Media Quan Fang, Jitao Sang, Changsheng Xu, Fellow, IEEE, and M. Shamim Hossain, Senior Member,
More informationThe Design of a Live Social Observatory System
The Design of a Live Social Observatory System Huanbo Luan 1,2, Juanzi Li 2, Maosong Sun 2, Tat-Seng Chua 1 1 School of Computing, National University of Singapore 2 Department of Computer Science and
More informationDescribable Visual Attributes for Face Verification and Image Search
Advanced Topics in Multimedia Analysis and Indexing, Spring 2011, NTU. 1 Describable Visual Attributes for Face Verification and Image Search Kumar, Berg, Belhumeur, Nayar. PAMI, 2011. Ryan Lei 2011/05/05
More informationNetvibes A field guide for missions, posts and IRCs
Netvibes A field guide for missions, posts and IRCs 7/2/2012 U.S. Department of State International Information Programs Office of Innovative Engagement Table of Contents Introduction... 3 Setting up your
More informationCIRGDISCO at RepLab2012 Filtering Task: A Two-Pass Approach for Company Name Disambiguation in Tweets
CIRGDISCO at RepLab2012 Filtering Task: A Two-Pass Approach for Company Name Disambiguation in Tweets Arjumand Younus 1,2, Colm O Riordan 1, and Gabriella Pasi 2 1 Computational Intelligence Research Group,
More informationMeta-path based Multi-Network Collective Link Prediction
Meta-path based Multi-Network Collective Link Prediction Jiawei Zhang Big Data and Social Computing (BDSC) Lab University of Illinois at Chicago Chicago, IL, USA jzhan9@uic.edu Philip S. Yu Big Data and
More informationStructured data can be processed, but unstructured data cannot. We cannot use various kinds of data unrestrictedly in the field of business
Problems in the use of big Structured can be processed, but unstructured cannot There are many big solutions, but no solution can process big at the same level as humans can interpret them We cannot use
More informationAN ENHANCED ATTRIBUTE RERANKING DESIGN FOR WEB IMAGE SEARCH
AN ENHANCED ATTRIBUTE RERANKING DESIGN FOR WEB IMAGE SEARCH Sai Tejaswi Dasari #1 and G K Kishore Babu *2 # Student,Cse, CIET, Lam,Guntur, India * Assistant Professort,Cse, CIET, Lam,Guntur, India Abstract-
More informationOutsourcing Privacy-Preserving Social Networks to a Cloud
IEEE INFOCOM 2013, April 14-19, Turin, Italy Outsourcing Privacy-Preserving Social Networks to a Cloud Guojun Wang a, Qin Liu a, Feng Li c, Shuhui Yang d, and Jie Wu b a Central South University, China
More informationTag Based Image Search by Social Re-ranking
Tag Based Image Search by Social Re-ranking Vilas Dilip Mane, Prof.Nilesh P. Sable Student, Department of Computer Engineering, Imperial College of Engineering & Research, Wagholi, Pune, Savitribai Phule
More informationInformation Retrieval
Multimedia Computing: Algorithms, Systems, and Applications: Information Retrieval and Search Engine By Dr. Yu Cao Department of Computer Science The University of Massachusetts Lowell Lowell, MA 01854,
More informationDesign of a Social Networking Analysis and Information Logger Tool
Design of a Social Networking Analysis and Information Logger Tool William Gauvin and Benyuan Liu Department of Computer Science University of Massachusetts Lowell {wgauvin,bliu}@cs.uml.edu Abstract. This
More informationSocial Networking in Action
Social Networking In Action 1 Social Networking in Action I. Facebook Friends Friends are people on Facebook whom you know, which can run the range from your immediate family to that person from high school
More informationSocial Networking for Business. Kathryn McCauley MidYork Library System
Social Networking for Business Kathryn McCauley MidYork Library System WHERE SHOULD I START? 1. What kinds of content do you want to post? Lengthy stories Links Multimedia (video, pictures) Short updates
More informationImporting Contacts to Hotmail/Outlook Account
Submitted by Jess on Tue, 04/16/2013-08:13 If you are using a web browser to access your Hotmail account, (or MSN account or Live account), you can add your existing contacts or those contacts of your
More informationChapter 1. Introduction. 1.1 Content Quality - Motivation
2 Chapter 1 Introduction The meteoric rise of the Internet has led to an increase of Web 2.0 websites on the World Wide Web (WWW). Web 2.0 websites are a paradigm shift from the traditional websites and
More informationModule 3: GATE and Social Media. Part 4. Named entities
Module 3: GATE and Social Media Part 4. Named entities The 1995-2018 This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs Licence Named Entity Recognition Texts frequently
More informationUnsupervised User Identity Linkage via Factoid Embedding
Unsupervised User Identity Linkage via Factoid Embedding Wei Xie, Xin Mu, Roy Ka-Wei Lee, Feida Zhu and Ee-Peng Lim Living Analytics Research Centre Singapore Management University, Singapore Email: {weixie,roylee.2013,fdzhu,eplim}@smu.edu.sg
More informationAccounts and Account Groups
Accounts and Account Groups Accounts and Account Groups Adding Account Properties Create Account Targeting from SAM Use Targeting in a Post Deactivating an Account Providing Permission to Access an Account
More informationA Performance Evaluation of Lfun Algorithm on the Detection of Drifted Spam Tweets
A Performance Evaluation of Lfun Algorithm on the Detection of Drifted Spam Tweets Varsha Palandulkar 1, Siddhesh Bhujbal 2, Aayesha Momin 3, Vandana Kirane 4, Raj Naybal 5 Professor, AISSMS Polytechnic
More informationDetect Rumors in Microblog Posts Using Propagation Structure via Kernel Learning
Detect Rumors in Microblog Posts Using Propagation Structure via Kernel Learning Jing Ma 1, Wei Gao 2*, Kam-Fai Wong 1,3 1 The Chinese University of Hong Kong 2 Victoria University of Wellington, New Zealand
More informationUSER GUIDE DESIGN A STEP BY STEP GUIDE
USER GUIDE DESIGN A STEP BY STEP GUIDE UNDERSTANDING THE NEW DESIGN TAB Users with Design privileges choose how your data will display within your dashboard visually. Under DASHBOARD DESIGN, you can change
More informationRanking Assessment of Event Tweets for Credibility
Ranking Assessment of Event Tweets for Credibility Sravan Kumar G Student, Computer Science in CVR College of Engineering, JNTUH, Hyderabad, India Abstract: Online social network services have become a
More informationKnow your neighbours: Machine Learning on Graphs
Know your neighbours: Machine Learning on Graphs Andrew Docherty Senior Research Engineer andrew.docherty@data61.csiro.au www.data61.csiro.au 2 Graphs are Everywhere Online Social Networks Transportation
More informationProbabilistic Models in Social Network Analysis
Probabilistic Models in Social Network Analysis Sargur N. Srihari University at Buffalo, The State University of New York USA US-India Workshop on Large Scale Data Analytics and Intelligent Services December
More informationConvex and Distributed Optimization. Thomas Ropars
>>> Presentation of this master2 course Convex and Distributed Optimization Franck Iutzeler Jérôme Malick Thomas Ropars Dmitry Grishchenko from LJK, the applied maths and computer science laboratory and
More informationCyberpeace A Guide to. Social Networking And Privacy Settings
Cyberpeace A Guide to Social Networking And Privacy Settings facebook Facebook gives the user the ability to choose his or her own privacy settings. By clicking the arrow and then the link that says Privacy
More informationGraph-based Techniques for Searching Large-Scale Noisy Multimedia Data
Graph-based Techniques for Searching Large-Scale Noisy Multimedia Data Shih-Fu Chang Department of Electrical Engineering Department of Computer Science Columbia University Joint work with Jun Wang (IBM),
More informationby the customer who is going to purchase the product.
SURVEY ON WORD ALIGNMENT MODEL IN OPINION MINING R.Monisha 1,D.Mani 2,V.Meenasree 3, S.Navaneetha krishnan 4 SNS College of Technology, Coimbatore. megaladev@gmail.com, meenaveerasamy31@gmail.com. ABSTRACT-
More informationLink Prediction for Social Network
Link Prediction for Social Network Ning Lin Computer Science and Engineering University of California, San Diego Email: nil016@eng.ucsd.edu Abstract Friendship recommendation has become an important issue
More informationA Guide to using Social Media (Facebook and Twitter)
A Guide to using Social Media (Facebook and Twitter) Facebook 1. Visit www.facebook.com 2. Click the green Sign up button on the top left-hand corner (see diagram below) 3. Enter all the information required
More informationReal-time Scheduling of Skewed MapReduce Jobs in Heterogeneous Environments
Real-time Scheduling of Skewed MapReduce Jobs in Heterogeneous Environments Nikos Zacheilas, Vana Kalogeraki Department of Informatics Athens University of Economics and Business 1 Big Data era has arrived!
More informationLatent Space Model for Road Networks to Predict Time-Varying Traffic. Presented by: Rob Fitzgerald Spring 2017
Latent Space Model for Road Networks to Predict Time-Varying Traffic Presented by: Rob Fitzgerald Spring 2017 Definition of Latent https://en.oxforddictionaries.com/definition/latent Latent Space Model?
More informationSupervised Random Walks
Supervised Random Walks Pawan Goyal CSE, IITKGP September 8, 2014 Pawan Goyal (IIT Kharagpur) Supervised Random Walks September 8, 2014 1 / 17 Correlation Discovery by random walk Problem definition Estimate
More informationAUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS
AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS Nilam B. Lonkar 1, Dinesh B. Hanchate 2 Student of Computer Engineering, Pune University VPKBIET, Baramati, India Computer Engineering, Pune University VPKBIET,
More informationTechnology Review Report
10/17/2011 Web 2.0 tools are Internet based applications. The users can share, modify, update, integrate and manage the web contents. There are many types of Web 2.0 tools such as media sharing, social
More informationMEMA. Memory Management for Museum Exhibitions. Independent Study Report 2970 Fall 2011
MEMA Memory Management for Museum Exhibitions Independent Study Report 2970 Fall 2011 Author: Xiaoning Bai Yuanyuan Ye Supervisors: Dr. Peter Brusilovsky, Yiling Lin Part I. Introduction to MEMA MEMA is
More informationMining Web Data. Lijun Zhang
Mining Web Data Lijun Zhang zlj@nju.edu.cn http://cs.nju.edu.cn/zlj Outline Introduction Web Crawling and Resource Discovery Search Engine Indexing and Query Processing Ranking Algorithms Recommender Systems
More informationCSCI 5417 Information Retrieval Systems! What is Information Retrieval?
CSCI 5417 Information Retrieval Systems! Lecture 1 8/23/2011 Introduction 1 What is Information Retrieval? Information retrieval is the science of searching for information in documents, searching for
More informationAppendix A Additional Information
Appendix A Additional Information In this appendix, we provide more information on building practical applications using the techniques discussed in the chapters of this book. In Sect. A.1, we discuss
More informationManaging your online reputation
Managing your online reputation In this internet age where every thought, feeling and opinion is tweeted, posted or blogged about for the world to see, reputation management has never been so important
More informationBased on Big Data: Hype or Hallelujah? by Elena Baralis
Based on Big Data: Hype or Hallelujah? by Elena Baralis http://dbdmg.polito.it/wordpress/wp-content/uploads/2010/12/bigdata_2015_2x.pdf 1 3 February 2010 Google detected flu outbreak two weeks ahead of
More informationVisAssist Web Navigator
VisAssist Web Navigator Software Requirements Specification Trevor Adams Nate Bomberger Tom Burdak Shawn Busolits Andrew Scott Matt Staniewicz Nate Vecchiarelli Contents Introduction... 4 Purpose... 4
More informationCreate an Account... 2 Setting up your account... 2 Send a Tweet... 4 Add Link... 4 Add Photo... 5 Delete a Tweet...
Twitter is a social networking site allowing users to post thoughts and ideas in 140 characters or less. http://www.twitter.com Create an Account... 2 Setting up your account... 2 Send a Tweet... 4 Add
More informationSampling Large Graphs for Anticipatory Analysis
Sampling Large Graphs for Anticipatory Analysis Lauren Edwards*, Luke Johnson, Maja Milosavljevic, Vijay Gadepally, Benjamin A. Miller IEEE High Performance Extreme Computing Conference September 16, 2015
More informationSocial Media. The infinite abilities of a smart phone
Social Media The infinite abilities of a smart phone It s all about the Likes, Shares and Stats Social Media is driven by users desire for Likes - Shares - Retweets - Followers to the point that users
More informationFinding Similar Items:Nearest Neighbor Search
Finding Similar Items:Nearest Neighbor Search Barna Saha February 23, 2016 Finding Similar Items A fundamental data mining task Finding Similar Items A fundamental data mining task May want to find whether
More informationAn Efficient Methodology for Image Rich Information Retrieval
An Efficient Methodology for Image Rich Information Retrieval 56 Ashwini Jaid, 2 Komal Savant, 3 Sonali Varma, 4 Pushpa Jat, 5 Prof. Sushama Shinde,2,3,4 Computer Department, Siddhant College of Engineering,
More informationVulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits
Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits Carl Sabottke Octavian Suciu Tudor Dumitraș University of Maryland 2 Problem Increasing number
More informationBig Data - Some Words BIG DATA 8/31/2017. Introduction
BIG DATA Introduction Big Data - Some Words Connectivity Social Medias Share information Interactivity People Business Data Data mining Text mining Business Intelligence 1 What is Big Data Big Data means
More informationSystem and Software Architecture Description (SSAD)
System and Software Architecture Description (SSAD) LiveRiot Video Editing System and social networking enhancement Team 04 Yang Li Haoyu Huang Ye Tian Zichuan Wang Haishan Ye Kaiqi Zhang Mitra, Alok Project
More informationChapter 1, Introduction
CSI 4352, Introduction to Data Mining Chapter 1, Introduction Young-Rae Cho Associate Professor Department of Computer Science Baylor University What is Data Mining? Definition Knowledge Discovery from
More informationRecord Linkage using Probabilistic Methods and Data Mining Techniques
Doi:10.5901/mjss.2017.v8n3p203 Abstract Record Linkage using Probabilistic Methods and Data Mining Techniques Ogerta Elezaj Faculty of Economy, University of Tirana Gloria Tuxhari Faculty of Economy, University
More informationECS289: Scalable Machine Learning
ECS289: Scalable Machine Learning Cho-Jui Hsieh UC Davis Sept 24, 2015 Course Information Website: www.stat.ucdavis.edu/~chohsieh/ecs289g_scalableml.html My office: Mathematical Sciences Building (MSB)
More informationJianyong Wang Department of Computer Science and Technology Tsinghua University
Jianyong Wang Department of Computer Science and Technology Tsinghua University jianyong@tsinghua.edu.cn Joint work with Wei Shen (Tsinghua), Ping Luo (HP), and Min Wang (HP) Outline Introduction to entity
More informationEntity Matching in Online Social Networks
Entity Matching in Online Social Networks Olga Peled 1, Michael Fire 1,2, Lior Rokach 1 and Yuval Elovici 1,2 1 Department of Information Systems Engineering, Ben Gurion University, Be er Sheva, 84105,
More informationA distributed framework for early trending topics detection on big social networks data threads
A distributed framework for early trending topics detection on big social networks data threads Athena Vakali, Kitmeridis Nikolaos, Panourgia Maria Informatics Department, Aristotle University, Thessaloniki,
More informationMultimedia Social Event Detection in Microblog
Multimedia Social Event Detection in Microblog Yue Gao 1, Sicheng Zhao 2, Yang Yang 1, and Tat-Seng Chua 1 1 School of Computing, National University of Singapore, Singapore 2 School of Computer Science
More informationIntegration of Mathematical Models and Simulations
Integration of Mathematical Models and Simulations Systems Net Presentation 10 th February 2016 Robert Luff Scope of Presentation The Problem Space Existing models have different assumptions The need to
More informationA BFS-BASED SIMILAR CONFERENCE RETRIEVAL FRAMEWORK
A BFS-BASED SIMILAR CONFERENCE RETRIEVAL FRAMEWORK Qing Guo 1, 2 1 Nanyang Technological University, Singapore 2 SAP Innovation Center Network,Singapore ABSTRACT Literature review is part of scientific
More informationLearning the Structures of Online Asynchronous Conversations
Learning the Structures of Online Asynchronous Conversations Jun Chen, Chaokun Wang, Heran Lin, Weiping Wang, Zhipeng Cai, Jianmin Wang. Tsinghua University Chinese Academy of Science Georgia State University
More informationUSER GUIDE DASHBOARD OVERVIEW A STEP BY STEP GUIDE
USER GUIDE DASHBOARD OVERVIEW A STEP BY STEP GUIDE DASHBOARD LAYOUT Understanding the layout of your dashboard. This user guide discusses the layout and navigation of the dashboard after the setup process
More informationInternet Applications. Q. What is Internet Explorer? Explain features of Internet Explorer.
Internet Applications Q. What is Internet Explorer? Explain features of Internet Explorer. Internet explorer: Microsoft Internet Explorer is a computer program called a browser that helps you interact
More informationCommunity-Based Recommendations: a Solution to the Cold Start Problem
Community-Based Recommendations: a Solution to the Cold Start Problem Shaghayegh Sahebi Intelligent Systems Program University of Pittsburgh sahebi@cs.pitt.edu William W. Cohen Machine Learning Department
More informationMethod to Study and Analyze Fraud Ranking In Mobile Apps
Method to Study and Analyze Fraud Ranking In Mobile Apps Ms. Priyanka R. Patil M.Tech student Marri Laxman Reddy Institute of Technology & Management Hyderabad. Abstract: Ranking fraud in the mobile App
More informationA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Glossary A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A App See Application Application An application (sometimes known as an app ) is a computer program which allows the user to perform a specific
More informationSampling Large Graphs: Algorithms and Applications
Sampling Large Graphs: Algorithms and Applications Don Towsley Umass - Amherst Joint work with P.H. Wang, J.Z. Zhou, J.C.S. Lui, X. Guan Measuring, Analyzing Large Networks - large networks can be represented
More informationDeep Face Recognition. Nathan Sun
Deep Face Recognition Nathan Sun Why Facial Recognition? Picture ID or video tracking Higher Security for Facial Recognition Software Immensely useful to police in tracking suspects Your face will be an
More informationGetting started with social media and comping
Getting started with social media and comping Promotors are taking a leap further into the digital age, and we are finding that more and more competitions are migrating to Facebook and Twitter. If you
More informationWhen representing Girl Scouts on social media channels make safety a priority.
Communicating through Social Media Communications Liaisons are encouraged to share information with their volunteers via a local area website or other social media platform. The purpose is to enhance the
More informationLG Case Study for HYPR 2
CASE STUDY LG Make life good. LG electronics, appliances and mobile devices feature innovative technology and sleek designs to suit your life and your style. LG Case Study for HYPR 2 The Challenge The
More informationCSE 701: LARGE-SCALE GRAPH MINING. A. Erdem Sariyuce
CSE 701: LARGE-SCALE GRAPH MINING A. Erdem Sariyuce WHO AM I? My name is Erdem Office: 323 Davis Hall Office hours: Wednesday 2-4 pm Research on graph (network) mining & management Practical algorithms
More informationKarami, A., Zhou, B. (2015). Online Review Spam Detection by New Linguistic Features. In iconference 2015 Proceedings.
Online Review Spam Detection by New Linguistic Features Amir Karam, University of Maryland Baltimore County Bin Zhou, University of Maryland Baltimore County Karami, A., Zhou, B. (2015). Online Review
More informationSEO Manager. Highlighted Features. Module Configuration
SEO Manager webkul.com/blog/magento2-seo-extension/ September 7, 2017 SEO Manager extension provides various tools and options for improving the SEO of your online store. Using this extension, you can
More informationSOCIAL MEDIA 101. Learn the basics of social media to effectively communicate with the public you serve.
SOCIAL MEDIA 101 Learn the basics of social media to effectively communicate with the public you serve. FACEBOOK and TWITTER Which social media platforms, if any, does your County currently utilize to
More informationWonder of Mobile Social Multimedia. Shih-Fu Chang June 2013, New York
Wonder of Mobile Social Multimedia Shih-Fu Chang June 2013, New York First Digital Camera in 1975 - film-less photography New York Times Bits, 8/26/2010 by Steve Sassan of Kodak CCD array, A/D converter,
More informationA Distributed Multi-facet Search Engine of Microblogs Based on SolrCloud
American Journal of Software Engineering, 2017, Vol. 5, No. 1, 20-26 Available online at http://pubs.sciepub.com/ajse/5/1/3 Science and Education Publishing DOI:10.12691/ajse-5-1-3 A Distributed Multi-facet
More informationWhat s new for A+ Suite v (Win / Mac)
What s new for A+ Suite v.2.5.2039.47 (Win / Mac) Released: Apr 15 th 2015 Sphere2 This standalone AVer software for PC and Mac gives users access to many handy features, like video recording, picture-in-picture,
More informationBig Data Analytics: What is Big Data? Stony Brook University CSE545, Fall 2016 the inaugural edition
Big Data Analytics: What is Big Data? Stony Brook University CSE545, Fall 2016 the inaugural edition What s the BIG deal?! 2011 2011 2008 2010 2012 What s the BIG deal?! (Gartner Hype Cycle) What s the
More information