首页 > 最新文献

2013 International Conference on Social Computing最新文献

英文 中文
Gang Networks, Neighborhoods and Holidays: Spatiotemporal Patterns in Social Media 帮派网络、邻里与假日:社交媒体的时空模式
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.21
Nibir Bora, V. Zaytsev, Yu-Han Chang, R. Maheswaran
Social media generated by location-services-enabled cellular devices produce enormous amounts of location-based content. Spatiotemporal analysis of such data facilitate new ways of modeling human behavior and mobility patterns. In this paper, we use over 10 millions geo-tagged tweets from the city of Los Angeles as observations of human movement and apply them to understand the relationships of geographical regions, neighborhoods and gang territories. Using a graph based-representation of street gang territories as vertices and interactions between them as edges, we train a machine learning classifier to tell apart rival and non-rival links. We correctly identify 89% of the true rivalry network, which beats a standard baseline by about 30%. Looking at larger neighborhoods, we were able to show that distance traveled from home follows a power-law distribution, and the direction of displacement, i.e., the distribution of movement direction, can be used as a profile to identify physical (or geographic) barriers when it is not uniform. Finally, considering the temporal dimension of tweets, we detect events taking place around the city by identifying irregularities in tweeting patterns.
由支持位置服务的移动设备产生的社交媒体产生了大量基于位置的内容。对这些数据的时空分析有助于为人类行为和流动模式建模提供新的方法。在本文中,我们使用超过1000万条来自洛杉矶市的地理标记推文作为对人类运动的观察,并应用它们来理解地理区域、社区和帮派领地之间的关系。使用基于图的街头帮派区域表示作为顶点,它们之间的相互作用作为边,我们训练机器学习分类器来区分竞争和非竞争链接。我们正确识别了89%的真正竞争网络,比标准基线高出约30%。观察更大的社区,我们能够证明离家的距离遵循幂律分布,位移方向,即运动方向的分布,可以用作识别物理(或地理)障碍的轮廓,当它不均匀时。最后,考虑到tweet的时间维度,我们通过识别tweet模式中的不规则性来检测城市周围发生的事件。
{"title":"Gang Networks, Neighborhoods and Holidays: Spatiotemporal Patterns in Social Media","authors":"Nibir Bora, V. Zaytsev, Yu-Han Chang, R. Maheswaran","doi":"10.1109/SocialCom.2013.21","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.21","url":null,"abstract":"Social media generated by location-services-enabled cellular devices produce enormous amounts of location-based content. Spatiotemporal analysis of such data facilitate new ways of modeling human behavior and mobility patterns. In this paper, we use over 10 millions geo-tagged tweets from the city of Los Angeles as observations of human movement and apply them to understand the relationships of geographical regions, neighborhoods and gang territories. Using a graph based-representation of street gang territories as vertices and interactions between them as edges, we train a machine learning classifier to tell apart rival and non-rival links. We correctly identify 89% of the true rivalry network, which beats a standard baseline by about 30%. Looking at larger neighborhoods, we were able to show that distance traveled from home follows a power-law distribution, and the direction of displacement, i.e., the distribution of movement direction, can be used as a profile to identify physical (or geographic) barriers when it is not uniform. Finally, considering the temporal dimension of tweets, we detect events taking place around the city by identifying irregularities in tweeting patterns.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125928517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Inkling: An Executable Paper System for Reviewing Scientific Applications Inkling:一个可执行的论文系统,用于审查科学应用
Pub Date : 2013-09-08 DOI: 10.1109/SOCIALCOM.2013.142
Dennis G. Castleberry, Steven R. Brandt, F. Löffler
This paper details Inkling, a generalized executable paper system for generating hypermedia. Whereas a traditional paper has static content derived from the data, i.e. tables, charts, graphs, and animations, the executable paper dynamically generates these using an underlying code and editable input parameters specified in the paper itself. By use of a language which may be seamlessly incorporated into the paper text and made transparent to the reader or reviewer, the system allows for ease of both use and validation. Novel in our system is (1)generality, in that it provides a generic coupling between the paper-generating infrastructure and the backend science code, (2) a minimalist text-based human-readable input format which abstracts algorithms from the reader and reviewer, (3) out-of-order dependency-based execution, which allows the author to chain outputs to inputs, and (4) a scheme for building a database of author-contributed codes which may be easily shared, reused and referenced.
本文详细介绍了Inkling,一个用于生成超媒体的通用可执行纸张系统。传统论文的静态内容来源于数据,如表格、图表、图形和动画,而可执行论文使用底层代码和在论文中指定的可编辑输入参数动态生成这些内容。通过使用一种可以无缝地融入论文文本并对读者或审稿人透明的语言,该系统可以方便地使用和验证。我们系统的新颖之处在于:(1)通用性,因为它提供了论文生成基础设施和后端科学代码之间的通用耦合;(2)基于文本的极简人类可读输入格式,从读者和审稿人那里抽象出算法;(3)基于无序依赖的执行,允许作者将输出链接到输入;(4)建立作者贡献代码数据库的方案,可以很容易地共享、重用和引用。
{"title":"Inkling: An Executable Paper System for Reviewing Scientific Applications","authors":"Dennis G. Castleberry, Steven R. Brandt, F. Löffler","doi":"10.1109/SOCIALCOM.2013.142","DOIUrl":"https://doi.org/10.1109/SOCIALCOM.2013.142","url":null,"abstract":"This paper details Inkling, a generalized executable paper system for generating hypermedia. Whereas a traditional paper has static content derived from the data, i.e. tables, charts, graphs, and animations, the executable paper dynamically generates these using an underlying code and editable input parameters specified in the paper itself. By use of a language which may be seamlessly incorporated into the paper text and made transparent to the reader or reviewer, the system allows for ease of both use and validation. Novel in our system is (1)generality, in that it provides a generic coupling between the paper-generating infrastructure and the backend science code, (2) a minimalist text-based human-readable input format which abstracts algorithms from the reader and reviewer, (3) out-of-order dependency-based execution, which allows the author to chain outputs to inputs, and (4) a scheme for building a database of author-contributed codes which may be easily shared, reused and referenced.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130465737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Efficient Processing of Multilevel Secure Continuous Queries 多层安全连续查询的高效处理
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.65
Xing Xie, I. Ray, R. Adaikkalavan
Data Stream Management Systems (DSMSs) address the data processing needs of situational monitoring applications, where data must be collected on-the-fly and processed in real-time. Sensitive data in situational monitoring applications must be processed such that there is no leakage of confidential information. Towards this end, we design a DSMS that allows continuous queries to be executed on multilevel secure (MLS) data in an efficient and secure manner. We provide a prototype to demonstrate the feasibility of our ideas and present some experimental results that discuss the overhead and performance gain of our approach.
数据流管理系统(DSMSs)解决了态势监控应用的数据处理需求,其中必须实时收集和处理数据。必须对态势监控应用程序中的敏感数据进行处理,以免泄露机密信息。为此,我们设计了一个DSMS,允许以高效和安全的方式在多层安全(MLS)数据上执行连续查询。我们提供了一个原型来证明我们的想法的可行性,并给出了一些实验结果,讨论了我们的方法的开销和性能增益。
{"title":"On the Efficient Processing of Multilevel Secure Continuous Queries","authors":"Xing Xie, I. Ray, R. Adaikkalavan","doi":"10.1109/SocialCom.2013.65","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.65","url":null,"abstract":"Data Stream Management Systems (DSMSs) address the data processing needs of situational monitoring applications, where data must be collected on-the-fly and processed in real-time. Sensitive data in situational monitoring applications must be processed such that there is no leakage of confidential information. Towards this end, we design a DSMS that allows continuous queries to be executed on multilevel secure (MLS) data in an efficient and secure manner. We provide a prototype to demonstrate the feasibility of our ideas and present some experimental results that discuss the overhead and performance gain of our approach.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115252888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Personalized Microblogs Corpus Recommendation Based on Dynamic Users Interests 基于动态用户兴趣的个性化微博语料库推荐
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.156
Shaymaa Khater, Hicham G. Elmongui, D. Gračanin
Microblogs are specialized virtual social network web-based applications. Nowadays, following the microblogs is becoming more challenging as users can receive thousands of corpus updates every day. Going through all the corpuses updates is a time consuming process and affects the user's productivity in real life, especially for the users who have a lot of followees and thousands of tweets arriving at their timelines everyday. In this paper, we propose a personalized recommendation system that aims at giving the user a summary of all received corpuses. Considering the fact that the user interests changes over time, this summary should be based on the user's level of interest in the topic of the corpus at the time of reception. Our method considers three major elements: users's dynamic level of interest in a topic, user's social relationship such as the number of followers, their real geographical neighborhood, and other explicit features related to the publishers authority and the tweet's content.
微博是一种专门的基于网络的虚拟社交网络应用。如今,关注微博变得越来越有挑战性,因为用户每天都能收到成千上万的语料库更新。浏览所有的语料库更新是一个耗时的过程,并影响用户在现实生活中的工作效率,特别是对于那些每天都有很多追随者和成千上万条推文到达他们的时间线的用户。在本文中,我们提出了一个个性化的推荐系统,旨在为用户提供所有收到的语料库的摘要。考虑到用户的兴趣随着时间的推移而变化,这个摘要应该基于用户在接收时对语料库主题的兴趣水平。我们的方法考虑了三个主要元素:用户对主题的动态兴趣水平、用户的社会关系(如关注者数量)、他们的真实地理邻居,以及与发布者权威和tweet内容相关的其他明确特征。
{"title":"Personalized Microblogs Corpus Recommendation Based on Dynamic Users Interests","authors":"Shaymaa Khater, Hicham G. Elmongui, D. Gračanin","doi":"10.1109/SocialCom.2013.156","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.156","url":null,"abstract":"Microblogs are specialized virtual social network web-based applications. Nowadays, following the microblogs is becoming more challenging as users can receive thousands of corpus updates every day. Going through all the corpuses updates is a time consuming process and affects the user's productivity in real life, especially for the users who have a lot of followees and thousands of tweets arriving at their timelines everyday. In this paper, we propose a personalized recommendation system that aims at giving the user a summary of all received corpuses. Considering the fact that the user interests changes over time, this summary should be based on the user's level of interest in the topic of the corpus at the time of reception. Our method considers three major elements: users's dynamic level of interest in a topic, user's social relationship such as the number of followers, their real geographical neighborhood, and other explicit features related to the publishers authority and the tweet's content.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116515345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Big Data and Policy Design for Data Sovereignty: A Case Study on Copyright and CCL in South Korea 大数据与数据主权的政策设计:以韩国版权和CCL为例
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.165
Hyejung Moon, H. Cho
The purpose of this paper is as follows. First, I am trying to conceptualize big data as a social problem. Second, I would like to explain the difference between big data and conventional mega information. Third, I would like to recommend the role of the government for utilization of big data as a policy tools. Fourth, while referring to copyright and CCL(Creative Commons License) cases, I would like to explain the regulation for big data on data sovereignty. Finally, I would like to suggest a direction of policy design for big data. As for the result of this study, policy design for big data should be distinguished from policy design for mega information to solve data sovereignty issues. From a law system perspective, big data is generated autonomously. It has been accessed openly and shared without any intention. In market perspective, big data is created without any intention. Big data can be changed automatically in case of openness with reference feature such as Linked of Data. Some policy issues such as responsibility and authenticity should be raised. Big data is generated in a distributed and diverse way without any concrete form in technology perspective. So, we need a different approach.
本文的研究目的如下。首先,我试图将大数据概念化为一个社会问题。第二,我想解释一下大数据和传统海量信息的区别。第三,我想推荐政府在利用大数据作为政策工具方面的作用。第四,在参考版权和知识共享许可(CCL)案例的同时,我想从数据主权的角度来解释大数据的监管。最后,我想提出一个大数据政策设计的方向。从本研究的结果来看,应该将大数据政策设计与大信息政策设计区分开来,以解决数据主权问题。从法律体系的角度看,大数据是自主生成的。它在没有任何意图的情况下被公开访问和分享。从市场的角度来看,大数据是无意中产生的。大数据可以在开放的情况下自动更改,具有数据关联等参考功能。应该提出责任和真实性等政策问题。从技术角度看,大数据的产生方式是分布式的、多样化的,没有具体的形式。所以,我们需要一种不同的方法。
{"title":"Big Data and Policy Design for Data Sovereignty: A Case Study on Copyright and CCL in South Korea","authors":"Hyejung Moon, H. Cho","doi":"10.1109/SocialCom.2013.165","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.165","url":null,"abstract":"The purpose of this paper is as follows. First, I am trying to conceptualize big data as a social problem. Second, I would like to explain the difference between big data and conventional mega information. Third, I would like to recommend the role of the government for utilization of big data as a policy tools. Fourth, while referring to copyright and CCL(Creative Commons License) cases, I would like to explain the regulation for big data on data sovereignty. Finally, I would like to suggest a direction of policy design for big data. As for the result of this study, policy design for big data should be distinguished from policy design for mega information to solve data sovereignty issues. From a law system perspective, big data is generated autonomously. It has been accessed openly and shared without any intention. In market perspective, big data is created without any intention. Big data can be changed automatically in case of openness with reference feature such as Linked of Data. Some policy issues such as responsibility and authenticity should be raised. Big data is generated in a distributed and diverse way without any concrete form in technology perspective. So, we need a different approach.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128755362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Entity Matching in Online Social Networks 在线社交网络中的实体匹配
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.53
Olga Peled, Michael Fire, L. Rokach, Y. Elovici
In recent years, Online Social Networks (OSNs) have essentially become an integral part of our daily lives. There are hundreds of OSNs, each with its own focus and offers for particular services and functionalities. To take advantage of the full range of services and functionalities that OSNs offer, users often create several accounts on various OSNs using the same or different personal information. Retrieving all available data about an individual from several OSNs and merging it into one profile can be useful for many purposes. In this paper, we present a method for solving the Entity Resolution (ER), problem for matching user profiles across multiple OSNs. Our algorithm is able to match two user profiles from two different OSNs based on machine learning techniques, which uses features extracted from each one of the user profiles. Using supervised learning techniques and extracted features, we constructed different classifiers, which were then trained and used to rank the probability that two user profiles from two different OSNs belong to the same individual. These classifiers utilized 27 features of mainly three types: name based features (i.e., the Soundex value of two names), general user info based features (i.e., the cosine similarity between two user profiles), and social network topological based features (i.e., the number of mutual friends between two users' friends list). This experimental study uses real-life data collected from two popular OSNs, Facebook and Xing. The proposed algorithm was evaluated and its classification performance measured by AUC was 0.982 in identifying user profiles across two OSNs.
近年来,在线社交网络(OSNs)已经成为我们日常生活中不可或缺的一部分。有数百个osn,每个都有自己的重点,并提供特定的服务和功能。为了充分利用osn提供的各种服务和功能,用户通常使用相同或不同的个人信息在不同的osn上创建多个帐户。从几个osn中检索关于个人的所有可用数据,并将其合并到一个概要文件中,这对于许多用途都很有用。在本文中,我们提出了一种解决跨多个osn匹配用户配置文件的实体解析(ER)问题的方法。我们的算法能够基于机器学习技术匹配来自两个不同osn的两个用户配置文件,该技术使用从每个用户配置文件中提取的特征。使用监督学习技术和提取的特征,我们构建了不同的分类器,然后对这些分类器进行训练并用于对来自两个不同osn的两个用户配置文件属于同一个体的概率进行排序。这些分类器利用了27个特征,主要有三种类型:基于姓名的特征(即两个姓名的Soundex值)、基于一般用户信息的特征(即两个用户档案之间的余弦相似度)和基于社交网络拓扑的特征(即两个用户的好友列表之间的共同好友数量)。这项实验研究使用了从两个流行的osn, Facebook和Xing收集的真实数据。对该算法进行了评价,AUC值为0.982。
{"title":"Entity Matching in Online Social Networks","authors":"Olga Peled, Michael Fire, L. Rokach, Y. Elovici","doi":"10.1109/SocialCom.2013.53","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.53","url":null,"abstract":"In recent years, Online Social Networks (OSNs) have essentially become an integral part of our daily lives. There are hundreds of OSNs, each with its own focus and offers for particular services and functionalities. To take advantage of the full range of services and functionalities that OSNs offer, users often create several accounts on various OSNs using the same or different personal information. Retrieving all available data about an individual from several OSNs and merging it into one profile can be useful for many purposes. In this paper, we present a method for solving the Entity Resolution (ER), problem for matching user profiles across multiple OSNs. Our algorithm is able to match two user profiles from two different OSNs based on machine learning techniques, which uses features extracted from each one of the user profiles. Using supervised learning techniques and extracted features, we constructed different classifiers, which were then trained and used to rank the probability that two user profiles from two different OSNs belong to the same individual. These classifiers utilized 27 features of mainly three types: name based features (i.e., the Soundex value of two names), general user info based features (i.e., the cosine similarity between two user profiles), and social network topological based features (i.e., the number of mutual friends between two users' friends list). This experimental study uses real-life data collected from two popular OSNs, Facebook and Xing. The proposed algorithm was evaluated and its classification performance measured by AUC was 0.982 in identifying user profiles across two OSNs.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128784623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Bandit Algorithms for Social Network Queries 社交网络查询的强盗算法
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.29
Zahy Bnaya, Rami Puzis, Roni Stern, Ariel Felner
In many cases the best way to find a profile or a set of profiles matching some criteria in a social network is via targeted crawling. An important challenge in targeted crawling is to choose the next profile to explore. Existing heuristics for targeted crawling are usually tailored for specific search criterion and could lead to short-sighted crawling decisions. In this paper we propose and evaluate a generic approach for guiding a social network crawler that aims to provide a proper balance between exploration and exploitation based on the recently introduced variant of the Multi-Armed Bandit problem with volatile arms (VMAB). Our approach is general-purpose. In addition, it provides provable performance guarantees. Experimental results indicate that our approach compares favorably with the best existing heuristics on two different domains.
在许多情况下,在社交网络中找到符合某些标准的个人资料或一组个人资料的最佳方法是通过目标抓取。目标爬行的一个重要挑战是选择下一个要探索的配置文件。现有的针对目标爬行的启发式算法通常是针对特定的搜索条件量身定制的,可能导致目光短浅的爬行决策。在本文中,我们提出并评估了一种用于指导社交网络爬虫的通用方法,该方法旨在基于最近引入的具有挥发性手臂(VMAB)的多臂强盗问题的变体,在探索和利用之间提供适当的平衡。我们的方法是通用的。此外,它还提供了可证明的性能保证。实验结果表明,我们的方法在两个不同的领域上优于现有的最佳启发式方法。
{"title":"Bandit Algorithms for Social Network Queries","authors":"Zahy Bnaya, Rami Puzis, Roni Stern, Ariel Felner","doi":"10.1109/SocialCom.2013.29","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.29","url":null,"abstract":"In many cases the best way to find a profile or a set of profiles matching some criteria in a social network is via targeted crawling. An important challenge in targeted crawling is to choose the next profile to explore. Existing heuristics for targeted crawling are usually tailored for specific search criterion and could lead to short-sighted crawling decisions. In this paper we propose and evaluate a generic approach for guiding a social network crawler that aims to provide a proper balance between exploration and exploitation based on the recently introduced variant of the Multi-Armed Bandit problem with volatile arms (VMAB). Our approach is general-purpose. In addition, it provides provable performance guarantees. Experimental results indicate that our approach compares favorably with the best existing heuristics on two different domains.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126238535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Cumulative Probability Distribution Model for Evaluating User Behavior Prediction Algorithms 评价用户行为预测算法的累积概率分布模型
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.60
Haifeng Liu, Zheng Hu, Dian Zhou, Hui Tian
User behavior analysis and prediction has been widely applied in personalized search, advertising precise delivery and other personalized services. It is a core problem how to evaluate the performance of prediction models or algorithms. The most used off-line experiment is a simple and convenient evaluation strategy. However, the existing assessment measures are most based on arithmetic average value theory, such as precision, recall, F measure, mean absolute error (MAE), root mean squared error (RMSE) etc. These approaches have two drawbacks. First, they cannot depict the prediction performance within a more fine-grained view and they only provide one average value to compare different algorithms' performances. Second, they are not reasonable if the evaluation results are not follow normal distribution. In this paper, according to analyze a mass of prediction evaluation results, we find that some performance evaluation results follow approximate power low distribution but not normal distribution. Therefore, the paper proposes a cumulative probability distribution model to evaluate the performance of prediction algorithms. The model first calculates the probability of each evaluation results. And then, it depicts the cumulative probability distribution function. Moreover, we further present an evaluation expectation value (EEV) to represent the overall performance of the prediction algorithms. Experiments on two real data sets show that the proposed model can provide deeper and more accurate assessment results.
用户行为分析与预测已广泛应用于个性化搜索、广告精准投放等个性化服务中。如何评价预测模型或算法的性能是一个核心问题。最常用的离线实验是一种简单方便的评价策略。然而,现有的评价指标大多基于算术平均值理论,如精密度、召回率、F测度、平均绝对误差(MAE)、均方根误差(RMSE)等。这些方法有两个缺点。首先,它们不能在更细粒度的视图中描述预测性能,它们只提供一个平均值来比较不同算法的性能。其次,评价结果不服从正态分布是不合理的。本文通过对大量预测评价结果的分析,发现一些性能评价结果服从近似的低功率分布而非正态分布。因此,本文提出了一个累积概率分布模型来评价预测算法的性能。该模型首先计算每个评价结果的概率。然后,它描述了累积概率分布函数。此外,我们进一步提出了评估期望值(EEV)来表示预测算法的整体性能。在两个真实数据集上的实验表明,该模型能够提供更深入、更准确的评估结果。
{"title":"Cumulative Probability Distribution Model for Evaluating User Behavior Prediction Algorithms","authors":"Haifeng Liu, Zheng Hu, Dian Zhou, Hui Tian","doi":"10.1109/SocialCom.2013.60","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.60","url":null,"abstract":"User behavior analysis and prediction has been widely applied in personalized search, advertising precise delivery and other personalized services. It is a core problem how to evaluate the performance of prediction models or algorithms. The most used off-line experiment is a simple and convenient evaluation strategy. However, the existing assessment measures are most based on arithmetic average value theory, such as precision, recall, F measure, mean absolute error (MAE), root mean squared error (RMSE) etc. These approaches have two drawbacks. First, they cannot depict the prediction performance within a more fine-grained view and they only provide one average value to compare different algorithms' performances. Second, they are not reasonable if the evaluation results are not follow normal distribution. In this paper, according to analyze a mass of prediction evaluation results, we find that some performance evaluation results follow approximate power low distribution but not normal distribution. Therefore, the paper proposes a cumulative probability distribution model to evaluate the performance of prediction algorithms. The model first calculates the probability of each evaluation results. And then, it depicts the cumulative probability distribution function. Moreover, we further present an evaluation expectation value (EEV) to represent the overall performance of the prediction algorithms. Experiments on two real data sets show that the proposed model can provide deeper and more accurate assessment results.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122022543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Empirical Comparison of Graph Databases 图形数据库的实证比较
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.106
Salim Jouili, Valentin Vansteenberghe
In recent years, more and more companies provide services that can not be anymore achieved efficiently using relational databases. As such, these companies are forced to use alternative database models such as XML databases, object-oriented databases, document-oriented databases and, more recently graph databases. Graph databases only exist for a few years. Although there have been some comparison attempts, they are mostly focused on certain aspects only. In this paper, we present a distributed graph database comparison framework and the results we obtained by comparing four important players in the graph databases market: Neo4j, Orient DB, Titan and DEX.
近年来,越来越多的企业所提供的服务已经无法通过关系数据库高效地实现。因此,这些公司被迫使用其他数据库模型,如XML数据库、面向对象的数据库、面向文档的数据库以及最近的图形数据库。图形数据库只存在了几年。虽然有一些比较的尝试,但它们大多只集中在某些方面。在本文中,我们提出了一个分布式图数据库比较框架,并通过比较图数据库市场上的四个重要参与者:Neo4j, Orient DB, Titan和DEX得出了我们的结果。
{"title":"An Empirical Comparison of Graph Databases","authors":"Salim Jouili, Valentin Vansteenberghe","doi":"10.1109/SocialCom.2013.106","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.106","url":null,"abstract":"In recent years, more and more companies provide services that can not be anymore achieved efficiently using relational databases. As such, these companies are forced to use alternative database models such as XML databases, object-oriented databases, document-oriented databases and, more recently graph databases. Graph databases only exist for a few years. Although there have been some comparison attempts, they are mostly focused on certain aspects only. In this paper, we present a distributed graph database comparison framework and the results we obtained by comparing four important players in the graph databases market: Neo4j, Orient DB, Titan and DEX.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114356947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 142
Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit 基于仿真逻辑电路的实时访问控制规则故障检测
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.76
Vincent C. Hu, K. Scarfone
Access control (AC) policies can be implemented based on different AC models, which are fundamentally composed by semantically independent AC rules in expressions of privilege assignments described by attributes of subjects/attributes, actions, objects/attributes, and environment variables of the protected systems. Incorrect implementations of AC policies result in faults that not only leak but also disable access of information, and faults in AC policies are difficult to detect without support of verification or automatic fault detection mechanisms. This research proposes an automatic method through the construction of a simulated logic circuit that simulates AC rules in AC policies or models. The simulated logic circuit allows real-time detection of policy faults including conflicts of privilege assignments, leaks of information, and conflicts of interest assignments. Such detection is traditionally done by tools that perform verification or testing after all the rules of the policy/model are completed, and it provides no information about the source of verification errors. The real-time fault detecting capability proposed by this research allows a rule fault to be detected and fixed immediately before the next rule is added to the policy/model, thus requiring no later verification and saving a significant amount of fault fixing time.
访问控制(Access control, AC)策略可以基于不同的AC模型来实现,这些AC模型从根本上是由语义独立的AC规则组成的,这些规则通过被保护系统的主体/属性、动作、对象/属性和环境变量的属性来描述权限分配的表达式。如果AC策略执行错误,不仅会导致信息泄漏,还会导致信息无法访问。如果不支持验证或故障自动检测机制,AC策略中的故障很难被发现。本研究提出一种自动化方法,透过建构模拟逻辑电路来模拟交流策略或模型中的交流规则。仿真逻辑电路允许实时检测策略错误,包括特权分配冲突、信息泄漏和利益分配冲突。这种检测传统上是由在策略/模型的所有规则完成后执行验证或测试的工具完成的,并且它不提供关于验证错误来源的信息。本研究提出的实时故障检测能力允许在将下一个规则添加到策略/模型之前立即检测和修复规则故障,从而不需要后续验证,节省了大量的故障修复时间。
{"title":"Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit","authors":"Vincent C. Hu, K. Scarfone","doi":"10.1109/SocialCom.2013.76","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.76","url":null,"abstract":"Access control (AC) policies can be implemented based on different AC models, which are fundamentally composed by semantically independent AC rules in expressions of privilege assignments described by attributes of subjects/attributes, actions, objects/attributes, and environment variables of the protected systems. Incorrect implementations of AC policies result in faults that not only leak but also disable access of information, and faults in AC policies are difficult to detect without support of verification or automatic fault detection mechanisms. This research proposes an automatic method through the construction of a simulated logic circuit that simulates AC rules in AC policies or models. The simulated logic circuit allows real-time detection of policy faults including conflicts of privilege assignments, leaks of information, and conflicts of interest assignments. Such detection is traditionally done by tools that perform verification or testing after all the rules of the policy/model are completed, and it provides no information about the source of verification errors. The real-time fault detecting capability proposed by this research allows a rule fault to be detected and fixed immediately before the next rule is added to the policy/model, thus requiring no later verification and saving a significant amount of fault fixing time.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129069529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2013 International Conference on Social Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1