Graph summarization methods and applications: A survey

Y Liu, T Safavi, A Dighe, D Koutra - ACM computing surveys (CSUR), 2018 - dl.acm.org
While advances in computing resources have made processing enormous amounts of data
possible, human ability to identify patterns in such data has not scaled accordingly. Efficient …

Sweg: Lossless and lossy summarization of web-scale graphs

K Shin, A Ghoting, M Kim, H Raghavan - The World Wide Web …, 2019 - dl.acm.org
Given a terabyte-scale graph distributed across multiple machines, how can we summarize
it, with much fewer nodes and edges, so that we can restore the original graph exactly or …

Efficient graph summarization using weighted lsh at billion-scale

Q Yong, M Hajiabadi, V Srinivasan… - Proceedings of the 2021 …, 2021 - dl.acm.org
Summarizing graphs is of paramount importance due to diverse applications of large-scale
graph analysis. A popular family of summarization methods is the group-based approach …

Graph summarization with controlled utility loss

M Hajiabadi, J Singh, V Srinivasan… - Proceedings of the 27th …, 2021 - dl.acm.org
We present new algorithms for graph summarization where the loss in utility is fully
controllable by the user. Specifically, we make three key contributions. First, we present a …

Big Data in Healthcare–Defining the Digital Persona through User Contexts from the Micro to the Macro

CE Kuziemsky, H Monkman, C Petersen… - Yearbook of medical …, 2014 - thieme-connect.com
Objectives: While big data offers enormous potential for improving healthcare delivery, many
of the existing claims concerning big data in healthcare are based on anecdotal reports and …

Zero-knowledge-private counting of group triangles in social networks

M Shoaran, A Thomo - The Computer Journal, 2017 - academic.oup.com
We introduce a general notion of maturity in social networks that is based on the number of
triangles between groups/communities. In order to protect individual privacy upon possible …

Are edge weights in summary graphs useful?-a comparative study

S Kang, K Lee, K Shin - Pacific-Asia Conference on Knowledge Discovery …, 2022 - Springer
Which one is better between two representative graph summarization models with and
without edge weights? From web graphs to online social networks, large graphs are …

Survivable consensus objects

D Malkhi, MK Reiter - … on Reliable Distributed Systems (Cat. No …, 1998 - ieeexplore.ieee.org
Reaching consensus among multiple processes in a distributed system is fundamental to
coordinating distributed actions. We present a new approach to building survivable …

Lipisc: a lightweight and flexible method for privacy-aware intersection set computation

W Ren, S Huang, Y Ren, KKR Choo - PloS one, 2016 - journals.plos.org
Privacy-aware intersection set computation (PISC) can be modeled as secure multi-party
computation. The basic idea is to compute the intersection of input sets without leaking …

Mr-triage: Scalable multi-criteria clustering for big data security intelligence applications

Y Shen, O Thonnard - … Conference on Big Data (Big Data), 2014 - ieeexplore.ieee.org
Security companies have recently realised that mining massive amounts of security data can
help generate actionable intelligence and improve their understanding of Internet attacks. In …