[HTML][HTML] Multiple texts as a limiting factor in online learning: quantifying (dis-) similarities of knowledge networks

A Mehler, W Hemati, P Welke, M Konca… - Frontiers in education, 2020 - frontiersin.org
We test the hypothesis that the extent to which one obtains information on a given topic
through Wikipedia depends on the language in which it is consulted. Controlling the size …

Eigenpulse: Detecting surges in large streaming graphs with row augmentation

J Zhang, S Liu, W Yu, W Feng, X Cheng - … 2019, Macau, China, April 14-17 …, 2019 - Springer
How can we spot dense blocks in a large streaming graph efficiently? Anomalies such as
fraudulent attacks, spamming, and DDoS attacks, can create dense blocks in a short time …

The Reaction of the University Ecosystem to the Pandemics in a Mid-East Country: The Case of IRAQ—A Compared Analysis of Students' and Teachers' Perceptions

A Alkhafaji, H Mshali, M Passarelli… - Conference on Smart …, 2022 - Springer
This paper presents an exploratory study on the reaction of the Iraqi university ecosystem to
the Covid-19 pandemic, a learning ecosystem with no consolidated tradition in distance …

A framework for characterizing the evolution of cyber attacker-victim relation graphs

RB Garcia-Lebron, KM Schweitzer… - MILCOM 2018-2018 …, 2018 - ieeexplore.ieee.org
Understanding and characterizing the reconnaissance behaviors of cyber attackers is an
important problem that has yet to be tackled. As a first step towards tackling this problem, in …

Balancing Summarization and Change Detection in Graph Streams

S Fukushima, K Yamanishi - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
This study addresses the issue of balancing graph summarization and graph change
detection. Graph summarization compresses large-scale graphs into a smaller scale …

Anomaly detection in edge streams using term frequency-inverse graph frequency (tf-igf) concept

PB Lamichhane, W Eberle - … Conference on Big Data (Big Data …, 2021 - ieeexplore.ieee.org
The ability to detect fraudulent activities such as denial-of-service attacks (DoS), social
media impersonations, or fake recommendations in e-commerce networks is a difficult task …

A hyper-distance-based method for hypernetwork comparison

T Xu, X Xie, ZK Zhang, C Liu, XX Zhan - arXiv preprint arXiv:2308.04659, 2023 - arxiv.org
Hypernetwork is a useful way to depict multiple connections between nodes, making it an
ideal tool for representing complex relationships in network science. In recent years, there …

Network change detection based on random walk in latent space

CH Lin, L Xu, K Yamanishi - IEEE Transactions on Knowledge …, 2022 - ieeexplore.ieee.org
The detection of network changes over time is based on identifying deviations of the network
structure. The challenge mainly lies in designing a good summary or descriptor of the …

Context-aware distance measures for dynamic networks

Y Zhao, Y Lin, Z Wu, Y Wang, H Wen - ACM Transactions on the Web …, 2021 - dl.acm.org
Dynamic networks are widely used in the social, physical, and biological sciences as a
concise mathematical representation of the evolving interactions in dynamic complex …

Pnp: Fast path ensemble method for movie design

D Koutra, A Dighe, S Bhagat, U Weinsberg… - Proceedings of the 23rd …, 2017 - dl.acm.org
How can we design a product or movie that will attract, for example, the interest of
Pennsylvania adolescents or liberal newspaper critics? What should be the genre of that …