首页 > 最新文献

2013 International Conference on Social Computing最新文献

英文 中文
Gang Networks, Neighborhoods and Holidays: Spatiotemporal Patterns in Social Media 帮派网络、邻里与假日:社交媒体的时空模式
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.21
Nibir Bora, V. Zaytsev, Yu-Han Chang, R. Maheswaran
Social media generated by location-services-enabled cellular devices produce enormous amounts of location-based content. Spatiotemporal analysis of such data facilitate new ways of modeling human behavior and mobility patterns. In this paper, we use over 10 millions geo-tagged tweets from the city of Los Angeles as observations of human movement and apply them to understand the relationships of geographical regions, neighborhoods and gang territories. Using a graph based-representation of street gang territories as vertices and interactions between them as edges, we train a machine learning classifier to tell apart rival and non-rival links. We correctly identify 89% of the true rivalry network, which beats a standard baseline by about 30%. Looking at larger neighborhoods, we were able to show that distance traveled from home follows a power-law distribution, and the direction of displacement, i.e., the distribution of movement direction, can be used as a profile to identify physical (or geographic) barriers when it is not uniform. Finally, considering the temporal dimension of tweets, we detect events taking place around the city by identifying irregularities in tweeting patterns.
由支持位置服务的移动设备产生的社交媒体产生了大量基于位置的内容。对这些数据的时空分析有助于为人类行为和流动模式建模提供新的方法。在本文中,我们使用超过1000万条来自洛杉矶市的地理标记推文作为对人类运动的观察,并应用它们来理解地理区域、社区和帮派领地之间的关系。使用基于图的街头帮派区域表示作为顶点,它们之间的相互作用作为边,我们训练机器学习分类器来区分竞争和非竞争链接。我们正确识别了89%的真正竞争网络,比标准基线高出约30%。观察更大的社区,我们能够证明离家的距离遵循幂律分布,位移方向,即运动方向的分布,可以用作识别物理(或地理)障碍的轮廓,当它不均匀时。最后,考虑到tweet的时间维度,我们通过识别tweet模式中的不规则性来检测城市周围发生的事件。
{"title":"Gang Networks, Neighborhoods and Holidays: Spatiotemporal Patterns in Social Media","authors":"Nibir Bora, V. Zaytsev, Yu-Han Chang, R. Maheswaran","doi":"10.1109/SocialCom.2013.21","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.21","url":null,"abstract":"Social media generated by location-services-enabled cellular devices produce enormous amounts of location-based content. Spatiotemporal analysis of such data facilitate new ways of modeling human behavior and mobility patterns. In this paper, we use over 10 millions geo-tagged tweets from the city of Los Angeles as observations of human movement and apply them to understand the relationships of geographical regions, neighborhoods and gang territories. Using a graph based-representation of street gang territories as vertices and interactions between them as edges, we train a machine learning classifier to tell apart rival and non-rival links. We correctly identify 89% of the true rivalry network, which beats a standard baseline by about 30%. Looking at larger neighborhoods, we were able to show that distance traveled from home follows a power-law distribution, and the direction of displacement, i.e., the distribution of movement direction, can be used as a profile to identify physical (or geographic) barriers when it is not uniform. Finally, considering the temporal dimension of tweets, we detect events taking place around the city by identifying irregularities in tweeting patterns.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125928517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Inkling: An Executable Paper System for Reviewing Scientific Applications Inkling:一个可执行的论文系统,用于审查科学应用
Pub Date : 2013-09-08 DOI: 10.1109/SOCIALCOM.2013.142
Dennis G. Castleberry, Steven R. Brandt, F. Löffler
This paper details Inkling, a generalized executable paper system for generating hypermedia. Whereas a traditional paper has static content derived from the data, i.e. tables, charts, graphs, and animations, the executable paper dynamically generates these using an underlying code and editable input parameters specified in the paper itself. By use of a language which may be seamlessly incorporated into the paper text and made transparent to the reader or reviewer, the system allows for ease of both use and validation. Novel in our system is (1)generality, in that it provides a generic coupling between the paper-generating infrastructure and the backend science code, (2) a minimalist text-based human-readable input format which abstracts algorithms from the reader and reviewer, (3) out-of-order dependency-based execution, which allows the author to chain outputs to inputs, and (4) a scheme for building a database of author-contributed codes which may be easily shared, reused and referenced.
本文详细介绍了Inkling,一个用于生成超媒体的通用可执行纸张系统。传统论文的静态内容来源于数据,如表格、图表、图形和动画,而可执行论文使用底层代码和在论文中指定的可编辑输入参数动态生成这些内容。通过使用一种可以无缝地融入论文文本并对读者或审稿人透明的语言,该系统可以方便地使用和验证。我们系统的新颖之处在于:(1)通用性,因为它提供了论文生成基础设施和后端科学代码之间的通用耦合;(2)基于文本的极简人类可读输入格式,从读者和审稿人那里抽象出算法;(3)基于无序依赖的执行,允许作者将输出链接到输入;(4)建立作者贡献代码数据库的方案,可以很容易地共享、重用和引用。
{"title":"Inkling: An Executable Paper System for Reviewing Scientific Applications","authors":"Dennis G. Castleberry, Steven R. Brandt, F. Löffler","doi":"10.1109/SOCIALCOM.2013.142","DOIUrl":"https://doi.org/10.1109/SOCIALCOM.2013.142","url":null,"abstract":"This paper details Inkling, a generalized executable paper system for generating hypermedia. Whereas a traditional paper has static content derived from the data, i.e. tables, charts, graphs, and animations, the executable paper dynamically generates these using an underlying code and editable input parameters specified in the paper itself. By use of a language which may be seamlessly incorporated into the paper text and made transparent to the reader or reviewer, the system allows for ease of both use and validation. Novel in our system is (1)generality, in that it provides a generic coupling between the paper-generating infrastructure and the backend science code, (2) a minimalist text-based human-readable input format which abstracts algorithms from the reader and reviewer, (3) out-of-order dependency-based execution, which allows the author to chain outputs to inputs, and (4) a scheme for building a database of author-contributed codes which may be easily shared, reused and referenced.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130465737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Efficient Processing of Multilevel Secure Continuous Queries 多层安全连续查询的高效处理
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.65
Xing Xie, I. Ray, R. Adaikkalavan
Data Stream Management Systems (DSMSs) address the data processing needs of situational monitoring applications, where data must be collected on-the-fly and processed in real-time. Sensitive data in situational monitoring applications must be processed such that there is no leakage of confidential information. Towards this end, we design a DSMS that allows continuous queries to be executed on multilevel secure (MLS) data in an efficient and secure manner. We provide a prototype to demonstrate the feasibility of our ideas and present some experimental results that discuss the overhead and performance gain of our approach.
数据流管理系统(DSMSs)解决了态势监控应用的数据处理需求,其中必须实时收集和处理数据。必须对态势监控应用程序中的敏感数据进行处理,以免泄露机密信息。为此,我们设计了一个DSMS,允许以高效和安全的方式在多层安全(MLS)数据上执行连续查询。我们提供了一个原型来证明我们的想法的可行性,并给出了一些实验结果,讨论了我们的方法的开销和性能增益。
{"title":"On the Efficient Processing of Multilevel Secure Continuous Queries","authors":"Xing Xie, I. Ray, R. Adaikkalavan","doi":"10.1109/SocialCom.2013.65","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.65","url":null,"abstract":"Data Stream Management Systems (DSMSs) address the data processing needs of situational monitoring applications, where data must be collected on-the-fly and processed in real-time. Sensitive data in situational monitoring applications must be processed such that there is no leakage of confidential information. Towards this end, we design a DSMS that allows continuous queries to be executed on multilevel secure (MLS) data in an efficient and secure manner. We provide a prototype to demonstrate the feasibility of our ideas and present some experimental results that discuss the overhead and performance gain of our approach.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115252888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cumulative Probability Distribution Model for Evaluating User Behavior Prediction Algorithms 评价用户行为预测算法的累积概率分布模型
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.60
Haifeng Liu, Zheng Hu, Dian Zhou, Hui Tian
User behavior analysis and prediction has been widely applied in personalized search, advertising precise delivery and other personalized services. It is a core problem how to evaluate the performance of prediction models or algorithms. The most used off-line experiment is a simple and convenient evaluation strategy. However, the existing assessment measures are most based on arithmetic average value theory, such as precision, recall, F measure, mean absolute error (MAE), root mean squared error (RMSE) etc. These approaches have two drawbacks. First, they cannot depict the prediction performance within a more fine-grained view and they only provide one average value to compare different algorithms' performances. Second, they are not reasonable if the evaluation results are not follow normal distribution. In this paper, according to analyze a mass of prediction evaluation results, we find that some performance evaluation results follow approximate power low distribution but not normal distribution. Therefore, the paper proposes a cumulative probability distribution model to evaluate the performance of prediction algorithms. The model first calculates the probability of each evaluation results. And then, it depicts the cumulative probability distribution function. Moreover, we further present an evaluation expectation value (EEV) to represent the overall performance of the prediction algorithms. Experiments on two real data sets show that the proposed model can provide deeper and more accurate assessment results.
用户行为分析与预测已广泛应用于个性化搜索、广告精准投放等个性化服务中。如何评价预测模型或算法的性能是一个核心问题。最常用的离线实验是一种简单方便的评价策略。然而,现有的评价指标大多基于算术平均值理论,如精密度、召回率、F测度、平均绝对误差(MAE)、均方根误差(RMSE)等。这些方法有两个缺点。首先,它们不能在更细粒度的视图中描述预测性能,它们只提供一个平均值来比较不同算法的性能。其次,评价结果不服从正态分布是不合理的。本文通过对大量预测评价结果的分析,发现一些性能评价结果服从近似的低功率分布而非正态分布。因此,本文提出了一个累积概率分布模型来评价预测算法的性能。该模型首先计算每个评价结果的概率。然后,它描述了累积概率分布函数。此外,我们进一步提出了评估期望值(EEV)来表示预测算法的整体性能。在两个真实数据集上的实验表明,该模型能够提供更深入、更准确的评估结果。
{"title":"Cumulative Probability Distribution Model for Evaluating User Behavior Prediction Algorithms","authors":"Haifeng Liu, Zheng Hu, Dian Zhou, Hui Tian","doi":"10.1109/SocialCom.2013.60","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.60","url":null,"abstract":"User behavior analysis and prediction has been widely applied in personalized search, advertising precise delivery and other personalized services. It is a core problem how to evaluate the performance of prediction models or algorithms. The most used off-line experiment is a simple and convenient evaluation strategy. However, the existing assessment measures are most based on arithmetic average value theory, such as precision, recall, F measure, mean absolute error (MAE), root mean squared error (RMSE) etc. These approaches have two drawbacks. First, they cannot depict the prediction performance within a more fine-grained view and they only provide one average value to compare different algorithms' performances. Second, they are not reasonable if the evaluation results are not follow normal distribution. In this paper, according to analyze a mass of prediction evaluation results, we find that some performance evaluation results follow approximate power low distribution but not normal distribution. Therefore, the paper proposes a cumulative probability distribution model to evaluate the performance of prediction algorithms. The model first calculates the probability of each evaluation results. And then, it depicts the cumulative probability distribution function. Moreover, we further present an evaluation expectation value (EEV) to represent the overall performance of the prediction algorithms. Experiments on two real data sets show that the proposed model can provide deeper and more accurate assessment results.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122022543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Integrative Approach for Measuring Privacy Impact of Identifiers in the Automotive Domain 汽车领域标识符隐私影响的综合测量方法
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.159
Naim Asaj, A. Held, M. Weber
Information technology is commonly used in automotive applications, and has introduced associated opportunities and threats. At the same time, the dissemination and use of certain privacy-sensitive data (i.e., identifying data) continues to increase, raising serious questions about privacy and anonymity. However, the effect of identifying data on privacy depends on various aspects, such as their basic structure. We propose that the preemptive assessment of privacy levels is a key factor for reliable privacy processes in vehicular development, extending the existing assessment during runtime. Thus, we identify a comprehensive and classified set of privacy indicators for identifiers, and explore the possible application of a single indicator by proposing privacy impact metrics that are based on entropy. We demonstrate the feasibility of our approach using a real dataset of vehicle identification numbers (VINs).
信息技术通常用于汽车应用程序,并引入了相关的机会和威胁。与此同时,某些隐私敏感数据(即识别数据)的传播和使用继续增加,引发了关于隐私和匿名的严重问题。然而,识别数据对隐私的影响取决于各个方面,比如数据的基本结构。我们提出,先发制人的隐私级别评估是车辆开发中可靠的隐私过程的关键因素,可以在运行时扩展现有的评估。因此,我们为标识符确定了一套全面和分类的隐私指标,并通过提出基于熵的隐私影响指标来探索单一指标的可能应用。我们使用车辆识别号码(vin)的真实数据集证明了我们方法的可行性。
{"title":"An Integrative Approach for Measuring Privacy Impact of Identifiers in the Automotive Domain","authors":"Naim Asaj, A. Held, M. Weber","doi":"10.1109/SocialCom.2013.159","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.159","url":null,"abstract":"Information technology is commonly used in automotive applications, and has introduced associated opportunities and threats. At the same time, the dissemination and use of certain privacy-sensitive data (i.e., identifying data) continues to increase, raising serious questions about privacy and anonymity. However, the effect of identifying data on privacy depends on various aspects, such as their basic structure. We propose that the preemptive assessment of privacy levels is a key factor for reliable privacy processes in vehicular development, extending the existing assessment during runtime. Thus, we identify a comprehensive and classified set of privacy indicators for identifiers, and explore the possible application of a single indicator by proposing privacy impact metrics that are based on entropy. We demonstrate the feasibility of our approach using a real dataset of vehicle identification numbers (VINs).","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128022227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized Microblogs Corpus Recommendation Based on Dynamic Users Interests 基于动态用户兴趣的个性化微博语料库推荐
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.156
Shaymaa Khater, Hicham G. Elmongui, D. Gračanin
Microblogs are specialized virtual social network web-based applications. Nowadays, following the microblogs is becoming more challenging as users can receive thousands of corpus updates every day. Going through all the corpuses updates is a time consuming process and affects the user's productivity in real life, especially for the users who have a lot of followees and thousands of tweets arriving at their timelines everyday. In this paper, we propose a personalized recommendation system that aims at giving the user a summary of all received corpuses. Considering the fact that the user interests changes over time, this summary should be based on the user's level of interest in the topic of the corpus at the time of reception. Our method considers three major elements: users's dynamic level of interest in a topic, user's social relationship such as the number of followers, their real geographical neighborhood, and other explicit features related to the publishers authority and the tweet's content.
微博是一种专门的基于网络的虚拟社交网络应用。如今,关注微博变得越来越有挑战性,因为用户每天都能收到成千上万的语料库更新。浏览所有的语料库更新是一个耗时的过程,并影响用户在现实生活中的工作效率,特别是对于那些每天都有很多追随者和成千上万条推文到达他们的时间线的用户。在本文中,我们提出了一个个性化的推荐系统,旨在为用户提供所有收到的语料库的摘要。考虑到用户的兴趣随着时间的推移而变化,这个摘要应该基于用户在接收时对语料库主题的兴趣水平。我们的方法考虑了三个主要元素:用户对主题的动态兴趣水平、用户的社会关系(如关注者数量)、他们的真实地理邻居,以及与发布者权威和tweet内容相关的其他明确特征。
{"title":"Personalized Microblogs Corpus Recommendation Based on Dynamic Users Interests","authors":"Shaymaa Khater, Hicham G. Elmongui, D. Gračanin","doi":"10.1109/SocialCom.2013.156","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.156","url":null,"abstract":"Microblogs are specialized virtual social network web-based applications. Nowadays, following the microblogs is becoming more challenging as users can receive thousands of corpus updates every day. Going through all the corpuses updates is a time consuming process and affects the user's productivity in real life, especially for the users who have a lot of followees and thousands of tweets arriving at their timelines everyday. In this paper, we propose a personalized recommendation system that aims at giving the user a summary of all received corpuses. Considering the fact that the user interests changes over time, this summary should be based on the user's level of interest in the topic of the corpus at the time of reception. Our method considers three major elements: users's dynamic level of interest in a topic, user's social relationship such as the number of followers, their real geographical neighborhood, and other explicit features related to the publishers authority and the tweet's content.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116515345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bandit Algorithms for Social Network Queries 社交网络查询的强盗算法
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.29
Zahy Bnaya, Rami Puzis, Roni Stern, Ariel Felner
In many cases the best way to find a profile or a set of profiles matching some criteria in a social network is via targeted crawling. An important challenge in targeted crawling is to choose the next profile to explore. Existing heuristics for targeted crawling are usually tailored for specific search criterion and could lead to short-sighted crawling decisions. In this paper we propose and evaluate a generic approach for guiding a social network crawler that aims to provide a proper balance between exploration and exploitation based on the recently introduced variant of the Multi-Armed Bandit problem with volatile arms (VMAB). Our approach is general-purpose. In addition, it provides provable performance guarantees. Experimental results indicate that our approach compares favorably with the best existing heuristics on two different domains.
在许多情况下,在社交网络中找到符合某些标准的个人资料或一组个人资料的最佳方法是通过目标抓取。目标爬行的一个重要挑战是选择下一个要探索的配置文件。现有的针对目标爬行的启发式算法通常是针对特定的搜索条件量身定制的,可能导致目光短浅的爬行决策。在本文中,我们提出并评估了一种用于指导社交网络爬虫的通用方法,该方法旨在基于最近引入的具有挥发性手臂(VMAB)的多臂强盗问题的变体,在探索和利用之间提供适当的平衡。我们的方法是通用的。此外,它还提供了可证明的性能保证。实验结果表明,我们的方法在两个不同的领域上优于现有的最佳启发式方法。
{"title":"Bandit Algorithms for Social Network Queries","authors":"Zahy Bnaya, Rami Puzis, Roni Stern, Ariel Felner","doi":"10.1109/SocialCom.2013.29","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.29","url":null,"abstract":"In many cases the best way to find a profile or a set of profiles matching some criteria in a social network is via targeted crawling. An important challenge in targeted crawling is to choose the next profile to explore. Existing heuristics for targeted crawling are usually tailored for specific search criterion and could lead to short-sighted crawling decisions. In this paper we propose and evaluate a generic approach for guiding a social network crawler that aims to provide a proper balance between exploration and exploitation based on the recently introduced variant of the Multi-Armed Bandit problem with volatile arms (VMAB). Our approach is general-purpose. In addition, it provides provable performance guarantees. Experimental results indicate that our approach compares favorably with the best existing heuristics on two different domains.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126238535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
An Empirical Comparison of Graph Databases 图形数据库的实证比较
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.106
Salim Jouili, Valentin Vansteenberghe
In recent years, more and more companies provide services that can not be anymore achieved efficiently using relational databases. As such, these companies are forced to use alternative database models such as XML databases, object-oriented databases, document-oriented databases and, more recently graph databases. Graph databases only exist for a few years. Although there have been some comparison attempts, they are mostly focused on certain aspects only. In this paper, we present a distributed graph database comparison framework and the results we obtained by comparing four important players in the graph databases market: Neo4j, Orient DB, Titan and DEX.
近年来,越来越多的企业所提供的服务已经无法通过关系数据库高效地实现。因此,这些公司被迫使用其他数据库模型,如XML数据库、面向对象的数据库、面向文档的数据库以及最近的图形数据库。图形数据库只存在了几年。虽然有一些比较的尝试,但它们大多只集中在某些方面。在本文中,我们提出了一个分布式图数据库比较框架,并通过比较图数据库市场上的四个重要参与者:Neo4j, Orient DB, Titan和DEX得出了我们的结果。
{"title":"An Empirical Comparison of Graph Databases","authors":"Salim Jouili, Valentin Vansteenberghe","doi":"10.1109/SocialCom.2013.106","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.106","url":null,"abstract":"In recent years, more and more companies provide services that can not be anymore achieved efficiently using relational databases. As such, these companies are forced to use alternative database models such as XML databases, object-oriented databases, document-oriented databases and, more recently graph databases. Graph databases only exist for a few years. Although there have been some comparison attempts, they are mostly focused on certain aspects only. In this paper, we present a distributed graph database comparison framework and the results we obtained by comparing four important players in the graph databases market: Neo4j, Orient DB, Titan and DEX.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114356947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 142
Towards Network Reduction on Big Data 面向大数据的网络精简
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.103
Xing Fang, J. Zhan, Nicholas Koceja
The increasing ease of data collection experience and the increasing availability of large data storage space lead to the existence of very large datasets that are commonly referred as "Big Data". Such data not only take over large amount of database storage, but also increase the difficulties for data analysis due to data diversity, which, also makes the datasets seemingly isolated with each other. In this paper, we present a solution to the problem that is to build up connections among the diverse datasets, based upon their similarities. Particularly, a concept of similarity graph along with a similarity graph generation algorithm were introduced. We then proposed a similarity graph reduction algorithm that reduces vertices of the graph for the purpose of graph simplification.
数据收集体验的日益便利和大数据存储空间的日益可用性导致了通常被称为“大数据”的超大型数据集的存在。这些数据不仅占用了大量的数据库存储空间,而且由于数据的多样性增加了数据分析的难度,也使得数据集看起来彼此孤立。在本文中,我们提出了一种解决方案,即根据不同数据集的相似性在不同数据集之间建立联系。特别介绍了相似图的概念和相似图生成算法。然后,我们提出了一种相似图约简算法,该算法通过减少图的顶点来简化图。
{"title":"Towards Network Reduction on Big Data","authors":"Xing Fang, J. Zhan, Nicholas Koceja","doi":"10.1109/SocialCom.2013.103","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.103","url":null,"abstract":"The increasing ease of data collection experience and the increasing availability of large data storage space lead to the existence of very large datasets that are commonly referred as \"Big Data\". Such data not only take over large amount of database storage, but also increase the difficulties for data analysis due to data diversity, which, also makes the datasets seemingly isolated with each other. In this paper, we present a solution to the problem that is to build up connections among the diverse datasets, based upon their similarities. Particularly, a concept of similarity graph along with a similarity graph generation algorithm were introduced. We then proposed a similarity graph reduction algorithm that reduces vertices of the graph for the purpose of graph simplification.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125577761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Controlling Break-the-Glass through Alignment 通过对齐控制玻璃破碎
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.91
A. Adriansyah, B. V. Dongen, Nicola Zannone
Modern IT systems have to deal with unpredictable situations and exceptions more and more often. In contrast, security mechanisms are usually very rigid. Functionality like break-the-glass is thus employed to allow users to bypass security mechanisms in case of emergencies. However, break-the-glass introduces a weak point in the system. In this paper, we present a flexible framework for controlling the use of break-the-glass using the notion of alignments. The framework measures to what extent a process execution diverges from the specification (i.e., using optimal alignments) and revokes the exceptional permissions granted to cope with the emergency when the severity of deviations cannot be tolerated. For the quantification of the severity of deviations, we extend alignment-based deviation analysis techniques by supporting the detection of high-level deviations such as activity replacements and swaps, hence providing a more accurate diagnosis of deviations than classical optimal alignments.
现代IT系统必须越来越频繁地处理不可预测的情况和异常。相反,安全机制通常非常严格。因此,像“打破玻璃”这样的功能允许用户在紧急情况下绕过安全机制。然而,打破玻璃会给系统带来一个弱点。在本文中,我们提出了一个灵活的框架来控制使用使用的玻璃破碎使用对齐的概念。框架度量流程执行偏离规范的程度(即,使用最优对齐),并在无法容忍偏离的严重程度时撤销为处理紧急情况而授予的异常权限。为了量化偏差的严重程度,我们扩展了基于校准的偏差分析技术,通过支持检测高水平偏差,如活动替换和交换,从而提供比经典最佳校准更准确的偏差诊断。
{"title":"Controlling Break-the-Glass through Alignment","authors":"A. Adriansyah, B. V. Dongen, Nicola Zannone","doi":"10.1109/SocialCom.2013.91","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.91","url":null,"abstract":"Modern IT systems have to deal with unpredictable situations and exceptions more and more often. In contrast, security mechanisms are usually very rigid. Functionality like break-the-glass is thus employed to allow users to bypass security mechanisms in case of emergencies. However, break-the-glass introduces a weak point in the system. In this paper, we present a flexible framework for controlling the use of break-the-glass using the notion of alignments. The framework measures to what extent a process execution diverges from the specification (i.e., using optimal alignments) and revokes the exceptional permissions granted to cope with the emergency when the severity of deviations cannot be tolerated. For the quantification of the severity of deviations, we extend alignment-based deviation analysis techniques by supporting the detection of high-level deviations such as activity replacements and swaps, hence providing a more accurate diagnosis of deviations than classical optimal alignments.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128056428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
期刊
2013 International Conference on Social Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1