Graph summarization methods and applications: A survey

Y Liu, T Safavi, A Dighe, D Koutra - ACM computing surveys (CSUR), 2018 - dl.acm.org
While advances in computing resources have made processing enormous amounts of data
possible, human ability to identify patterns in such data has not scaled accordingly. Efficient …

Evolutionary network analysis: A survey

C Aggarwal, K Subbian - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Evolutionary network analysis has found an increasing interest in the literature because of
the importance of different kinds of dynamic social networks, email networks, biological …

[SÁCH][B] An introduction to outlier analysis

CC Aggarwal, CC Aggarwal - 2017 - Springer
Outliers are also referred to as abnormalities, discordants, deviants, or anomalies in the data
mining and statistics literature. In most applications, the data is created by one or more …

Back to the app: the costs of mobile application interruptions

L Leiva, M Böhmer, S Gehring, A Krüger - Proceedings of the 14th …, 2012 - dl.acm.org
Smartphone users might be interrupted while interacting with an application, either by
intended or unintended circumstances. In this paper, we report on a large-scale …

[PDF][PDF] Algorithms for graph similarity and subgraph matching

D Koutra, A Parikh, A Ramdas, J **ang - Proc. Ecol. inference conf, 2011 - Citeseer
We deal with two independent but related problems, those of graph similarity and subgraph
matching, which are both important practical problems useful in several fields of science …

Mining mobility user profiles for car pooling

R Trasarti, F Pinelli, M Nanni, F Giannotti - Proceedings of the 17th ACM …, 2011 - dl.acm.org
In this paper we introduce a methodology for extracting mobility profiles of individuals from
raw digital traces (in particular, GPS traces), and study criteria to match individuals based on …

Com2: fast automatic discovery of temporal ('comet') communities

M Araujo, S Papadimitriou, S Günnemann… - Advances in Knowledge …, 2014 - Springer
Given a large network, changing over time, how can we find patterns and anomalies? We
propose Com2, a novel and fast, incremental tensor analysis approach, which can discover …

Edgecentric: Anomaly detection in edge-attributed networks

N Shah, A Beutel, B Hooi, L Akoglu… - 2016 IEEE 16Th …, 2016 - ieeexplore.ieee.org
Given a network with attributed edges, how can we identify anomalous behavior? Networks
with edge attributes are ubiquitous, and capture rich information about interactions between …

From metaphor to method: Cartographic perspectives on information visualization

A Skupin - IEEE Symposium on Information Visualization 2000 …, 2000 - ieeexplore.ieee.org
By virtue of their spatio-cognitive abilities, humans are able to navigate through geographic
space as well as meaningfully communicate geographic information represented in …

An AI-empowered framework for cross-layer softwarized infrastructure state assessment

A Diamanti, JMS Vílchez, S Secci - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Network softwarization technologies challenge legacy fault management systems.
Coordination and dependency among different novel software components for orchestration …