Authoritative sources in a hyperlinked environment
Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms
Hancock: a language for extracting signatures from data streams
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining
Using relational knowledge discovery to prevent securities fraud
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Data streams: algorithms and applications
Foundations and Trends® in Theoretical Computer Science
Relational Dependency Networks
The Journal of Machine Learning Research
Classification in Networked Data: A Toolkit and a Univariate Case Study
The Journal of Machine Learning Research
Relational data pre-processing techniques for improved securities fraud detection
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Exploiting time-varying relationships in statistical relational models
Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis
Mobile call graphs: beyond power-law and lognormal distributions
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Users in Volatile Communities: Studying Active Participation and Community Evolution
UM '07 Proceedings of the 11th international conference on User Modeling
Fast mining of complex time-stamped events
Proceedings of the 17th ACM conference on Information and knowledge management
Improving learning in networked data by combining explicit and mined links
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 1
Scalable proximity estimation and link prediction in online social networks
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
Relevance feedback using weight propagation compared with information-theoretic query expansion
ECIR'07 Proceedings of the 29th European conference on IR research
Autocorrelation and linkage cause bias in evaluation of relational learners
ILP'02 Proceedings of the 12th international conference on Inductive logic programming
Tracking hidden groups using communications
ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
Computationally efficient scoring of activity using demographics and connectivity of entities
Information Technology and Management
Strange bedfellows: community identification in bittorrent
IPTPS'10 Proceedings of the 9th international conference on Peer-to-peer systems
Surprising patterns for the call duration distribution of mobile phone users
ECML PKDD'10 Proceedings of the 2010 European conference on Machine learning and knowledge discovery in databases: Part III
A hybrid fraud scoring and spike detection technique in streaming data
Intelligent Data Analysis
Social Network Analysis and Mining for Business Applications
ACM Transactions on Intelligent Systems and Technology (TIST)
Cellular telephony and the question of privacy
Communications of the ACM
Mining large distributed log data in near real time
SLAML '11 Managing Large-scale Systems via the Analysis of System Logs and the Application of Machine Learning Techniques
"Mix-in-Place" anonymous networking using secure function evaluation
Proceedings of the 27th Annual Computer Security Applications Conference
Deconvolutive clustering of markov states
ECML'06 Proceedings of the 17th European conference on Machine Learning
EigenSpokes: surprising patterns and scalable community chipping in large graphs
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part II
User modeling for telecommunication applications: experiences and practical implications
UMAP'10 Proceedings of the 18th international conference on User Modeling, Adaptation, and Personalization
On clustering techniques for change diagnosis in data streams
WebKDD'05 Proceedings of the 7th international conference on Knowledge Discovery on the Web: advances in Web Mining and Web Usage Analysis
Relevance feedback using weight propagation
ECIR'06 Proceedings of the 28th European conference on Advances in Information Retrieval
ARDEN: Anonymous networking in delay tolerant networks
Ad Hoc Networks
Community-based analysis of netflow for early detection of security incidents
LISA'11 Proceedings of the 25th international conference on Large Installation System Administration
Isolating and analyzing fraud activities in a large cellular network via voice call graph analysis
Proceedings of the 10th international conference on Mobile systems, applications, and services
Time-Evolving relational classification and ensemble methods
PAKDD'12 Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Mining dense structures to uncover anomalous behaviour in financial network data
MSM'11 Proceedings of the 2011 international conference on Modeling and Mining Ubiquitous Social Media
FastLane: improving performance of software transactional memory for low thread counts
Proceedings of the 18th ACM SIGPLAN symposium on Principles and practice of parallel programming
Competence region modelling in relational classification
ACIIDS'13 Proceedings of the 5th Asian conference on Intelligent Information and Database Systems - Volume Part II
AusDM '11 Proceedings of the Ninth Australasian Data Mining Conference - Volume 121
Early security classification of skype users via machine learning
Proceedings of the 2013 ACM workshop on Artificial intelligence and security
Discovery of emergent malicious campaigns in cellular networks
Proceedings of the 29th Annual Computer Security Applications Conference
AusDM '12 Proceedings of the Tenth Australasian Data Mining Conference - Volume 134
Expert Systems with Applications: An International Journal
Hi-index | 0.02 |
We consider problems that can be characterized by large dynamic graphs. Communication networks provide the prototypical example of such problems where nodes in the graph are network IDs and the edges represent communication between pairs of network IDs. In such graphs, nodes and edges appear and disappear through time so that methods that apply to static graphs are not sufficient. We introduce a data structure that captures, in an approximate sense, the graph and its evolution through time. The data structure arises from a bottom-up representation of the large graph as the union of small subgraphs, called Communities of Interest (COI), centered on every node. These subgraphs are interesting in their own right and we discuss two applications in the area of telecommunications fraud detection to help motivate the ideas.