Given a terabyte-scale graph distributed across multiple machines, how can we summarize it, with much fewer nodes and edges, so that we can restore the original graph exactly or …
Q Yong, M Hajiabadi, V Srinivasan… - Proceedings of the 2021 …, 2021 - dl.acm.org
Summarizing graphs is of paramount importance due to diverse applications of large-scale graph analysis. A popular family of summarization methods is the group-based approach …
M Hajiabadi, J Singh, V Srinivasan… - Proceedings of the 27th …, 2021 - dl.acm.org
We present new algorithms for graph summarization where the loss in utility is fully controllable by the user. Specifically, we make three key contributions. First, we present a …
Objectives: While big data offers enormous potential for improving healthcare delivery, many of the existing claims concerning big data in healthcare are based on anecdotal reports and …
M Shoaran, A Thomo - The Computer Journal, 2017 - academic.oup.com
We introduce a general notion of maturity in social networks that is based on the number of triangles between groups/communities. In order to protect individual privacy upon possible …
S Kang, K Lee, K Shin - Pacific-Asia Conference on Knowledge Discovery …, 2022 - Springer
Which one is better between two representative graph summarization models with and without edge weights? From web graphs to online social networks, large graphs are …
D Malkhi, MK Reiter - … on Reliable Distributed Systems (Cat. No …, 1998 - ieeexplore.ieee.org
Reaching consensus among multiple processes in a distributed system is fundamental to coordinating distributed actions. We present a new approach to building survivable …
W Ren, S Huang, Y Ren, KKR Choo - PloS one, 2016 - journals.plos.org
Privacy-aware intersection set computation (PISC) can be modeled as secure multi-party computation. The basic idea is to compute the intersection of input sets without leaking …
Y Shen, O Thonnard - … Conference on Big Data (Big Data), 2014 - ieeexplore.ieee.org
Security companies have recently realised that mining massive amounts of security data can help generate actionable intelligence and improve their understanding of Internet attacks. In …