Using web standards, such as uniform resource identifiers (URIs), XML and HTTP, for naming and describing resources which are not information objects is the key difference between the Web as we know it today and the S...
详细信息
Quality measures are important to evaluate graph clustering algorithms by providing a means to assess the quality of a derived cluster structure. In this paper, we focus on overlapping graph structures, as many real-w...
详细信息
ISBN:
(纸本)9789898425980
Quality measures are important to evaluate graph clustering algorithms by providing a means to assess the quality of a derived cluster structure. In this paper, we focus on overlapping graph structures, as many real-world networks have a structure of highly overlapping cohesive groups. We propose three methods to adapt existing crisp quality measures such that they can handle graph overlaps correctly, but also ensure that their properties for the evaluation of crisp graph clusterings are preserved when assessing a crisp cluster structure. We demonstrate our methods on such measures as Density, Newman's modularity and Conductance. We also propose an enhancement of an existing modularity measure for networks with overlapping structure. The newly proposed measures are analysed using experiments on artificial graphs that possess overlapping structure. For this evaluation, we apply a graph generation model that creates clustered graphs with overlaps that are similar to real-world networks i.e. their node degree and cluster size distribution follow a power law.
As information technology interweaves with our daily environment, new modes of interaction will be required. In this paper, we suggest a gesture-based approach and present a prototypical case study for a gesture contr...
Location privacy preserving is attracting more and more attentions with the wide use of accurate positioning devices. Two kinds of methods based on k-anonymity have been proposed for location privacy preserving. One i...
详细信息
Many studies show that named entities are closely related to users' search behaviors, which brings increasing interest in studying named entities in search logs recently. This paper addresses the problem of formin...
详细信息
Many studies show that named entities are closely related to users' search behaviors, which brings increasing interest in studying named entities in search logs recently. This paper addresses the problem of forming fine grained semantic clusters of named entities within a broad domain such as "company", and generating keywords for each cluster, which help users to interpret the embedded semantic information in the cluster. By exploring contexts, URLs and session IDs as features of named entities, a three-phase approach proposed in this paper first disambiguates named entities according to the features. Then it properly weights the features with a novel measurement, calculates the semantic similarity between named entities with the weighted feature space, and clusters named entities accordingly. After that, keywords for the clusters are generated using a text-oriented graph ranking algorithm. Each phase of the proposed approach solves problems that are not addressed in existing works, and experimental results obtained from a real click through data demonstrate the effectiveness of the proposed approach.
This paper presents an approach for explorative pattern mining in social media based on tagging information and collaborative geo-reference annotations. We utilize pattern mining techniques for obtaining sets of tags ...
详细信息
The Linking Open data (LOD) project is an ongoing effort to construct a global data space, i.e. the Web of data. One important part of this project is to establish owl:sameAs links among structured data sources. Such ...
详细信息
Exceptional model mining has been proposed as a variant of subgroup discovery especially focusing on complex target concepts. Currently, efficient mining algorithms are limited to heuristic (non exhaustive) methods. I...
详细信息
In this chapter we explain the definition of the term (data) exploration. We refine this definition in the context of browsing, navigating and searching. We provide a definition of bisociative exploration and derive r...
详细信息
In the previous chapters of this book quite different approaches to create networks based on existing data collections (Part II) have been discussed and diverse methods for network analysis have been proposed (Part II...
详细信息
暂无评论