Along with the development of Information Technology, Online Social Networks (OSN) are constantly developing and have become popular media in the world. Besides …
The study of network robustness is a critical tool in the characterization and sense making of complex interconnected systems such as infrastructure, communication and social networks …
The recent explosion in the adoption of search engines and new media such as blogs and Twitter have facilitated faster propagation of news and rumors. How quickly does a piece of …
Controlling the dissemination of an entity (eg, meme, virus, etc) on a large graph is an interesting problem in many disciplines. Examples include epidemiology, computer security …
Given a snapshot of a large graph, in which an infection has been spreading for some time, can we identify those nodes from which the infection started to spread? In other words, can …
Given a graph, how can we extract good features for the nodes? For example, given two large graphs from the same domain, how can we use information in one to do classification …
H Nguyen, R Zheng - IEEE Journal on Selected Areas in …, 2013 - ieeexplore.ieee.org
Given a fixed budget and an arbitrary cost for selecting each node, the budgeted influence maximization (BIM) problem concerns selecting a set of seed nodes to disseminate some …
H Hamer, K Schindler, E Koller-Meier… - 2009 IEEE 12th …, 2009 - ieeexplore.ieee.org
We present a method for tracking a hand while it is interacting with an object. This setting is arguably the one where hand-tracking has most practical relevance, but poses significant …
E Müller, PI Sánchez, Y Mülle… - 2013 IEEE 29th …, 2013 - ieeexplore.ieee.org
Outlier analysis is an important data mining task that aims to detect unexpected, rare, and suspicious objects. Outlier ranking enables enhanced outlier exploration, which assists the …