نتایج جستجو برای: graph mining

تعداد نتایج: 281089  

Journal: :IEICE Transactions on Information and Systems 2010

Journal: :Risks 2021

Cyber insurance ratemaking (CIRM) is a procedure used to set rates (or prices) for cyber products provided by companies. Rate estimation critical issue products. This problem arises because of the unavailability actuarial data and uncertainty normative standards risk. Most risk analyses do not consider connection between Information Communication Technology (ICT) sources. Recently, model was de...

2015
Dario Garcia-Gasulla Ulises Cortés Eduard Ayguadé Jesús Labarta

Exploiting network data (i.e., graphs) is a rather particular case of data mining. The size and relevance of network domains justifies research on graph mining, but also brings forth severe complications. Computational aspects like scalability and parallelism have to be reevaluated, and well as certain aspects of the data mining process. One of those are the methodologies used to evaluate graph...

Journal: :Theoretical Computer Science 2016

Journal: :CoRR 2015
Carlos H. C. Teixeira Alexandre J. Fonseca Marco Serafini Georgos Siganos Mohammed J. Zaki Ashraf Aboulnaga

Distributed data processing platforms such as MapReduce and Pregel have substantially simplified the design and deployment of certain classes of distributed graph analytics algorithms. However, these platforms do not represent a good match for distributed graph mining problems, as for example finding frequent subgraphs in a graph. Given an input graph, these problems require exploring a very la...

Journal: :CoRR 2017
Chiwan Park Ha-Myung Park Minji Yoon U. Kang

How can we analyze enormous networks including the Web and social networks which have hundreds of billions of nodes and edges? Network analyses have been conducted by various graph mining methods including shortest path computation, PageRank, connected component computation, random walk with restart, etc. Œese graph mining methods can be expressed as generalized matrix-vector multiplication whi...

2009
Andrew McGregor

Multi-Pass Models: It is common in graph mining to consider algorithms that may take more than one pass over the stream. There has also been work in the W-Stream model in which the algorithm is allowed to write to the stream during each pass [9]. These annotations can then be utilized by the algorithm during successive passes and it can be shown that this gives sufficient power to the model for...

2008
Sofus A. Macskassy Claude Nanjo

This paper presents our investigation into graph mining methods to help users understand large graphs. Our approach is a two-step process: First calculate subgraph labels and then calculate distribution statistics on these labels. Our approach is flexible in that it can identify a range of patterns from very abstract to very specific (e.g., isomorphisms). The statistics that we calculate can be...

Journal: :CoRR 2016
Jeevan Joishi Ashish Sureka

Process-Aware Information System (PAIS) are IT systems that manages, supports business processes and generate large event logs from execution of business processes. An event log is represented as a tuple of the form CaseID, TimeStamp, Activity and Actor. Process Mining is an emerging area of research that deals with the study and analysis of business processes based on event logs. Process Minin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید