Derr et al., 2018 - Google Patents
Signed network modeling based on structural balance theoryDerr et al., 2018
View PDF- Document ID
- 18080124063146717929
- Author
- Derr T
- Aggarwal C
- Tang J
- Publication year
- Publication venue
- Proceedings of the 27th ACM international conference on information and knowledge management
External Links
Snippet
The modeling of networks, specifically generative models, has been shown to provide a plethora of information about the underlying network structures, as well as many other benefits behind their construction. There has been a considerable increase in interest for the …
- 238000002474 experimental method 0 abstract description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/12—Computer systems based on biological models using genetic models
- G06N3/126—Genetic algorithms, i.e. information processing using digital simulations of the genetic system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/10—Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Derr et al. | Signed network modeling based on structural balance theory | |
Salavati et al. | Ranking nodes in complex networks based on local structure and improving closeness centrality | |
Liu et al. | Link prediction in complex networks: A local naïve Bayes model | |
Liu et al. | A multiobjective evolutionary algorithm based on similarity for community detection from signed social networks | |
Xu et al. | Stacked autoencoder-based community detection method via an ensemble clustering framework | |
Ciarella et al. | Machine-learning-assisted Monte Carlo fails at sampling computationally hard problems | |
Wang et al. | Robust grey wolf optimizer for multimodal optimizations: a cross-dimensional coordination approach | |
Zhao et al. | A self-adaptive evolutionary deception framework for community structure | |
Lin et al. | An integer programming approach and visual analysis for detecting hierarchical community structures in social networks | |
Li et al. | Rethinking the link prediction problem in signed social networks | |
Zhang et al. | BL-ECD: broad learning based enterprise community detection via hierarchical structure fusion | |
Hairol Anuar et al. | Identifying Communities with Modularity Metric Using Louvain and Leiden Algorithms. | |
Liu et al. | Link prediction algorithm for signed social networks based on local and global tightness | |
Wang et al. | Identifying and evaluating anomalous structural change-based nodes in generalized dynamic social networks | |
Qiu et al. | A new method for identifying influential spreaders in complex networks | |
Rong et al. | Efficient gnn explanation via learning removal-based attribution | |
Zhuang et al. | Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited through {Data-Free} Model Extraction Attacks? | |
Rani et al. | Community detection in social networks: literature review | |
Jesenko et al. | Two-level evolutionary algorithm for discovering relations between nodes’ features in a complex network | |
Wang et al. | Influence maximization by leveraging the crowdsensing data in information diffusion network | |
Khanday et al. | A comparative analysis of identifying influential users in online social networks | |
Sikarwar et al. | A review on social network analysis methods and algorithms | |
Tian et al. | [Retracted] Intrusion Detection Method Based on Deep Learning | |
Dabaghi-Zarandi et al. | Community detection method based on random walk and multi objective evolutionary algorithm in complex networks | |
Jia et al. | Multilayer social network overlapping community detection algorithm based on trust relationship |