3,182 research outputs found
Transforming Graph Representations for Statistical Relational Learning
Relational data representations have become an increasingly important topic
due to the recent proliferation of network datasets (e.g., social, biological,
information networks) and a corresponding increase in the application of
statistical relational learning (SRL) algorithms to these domains. In this
article, we examine a range of representation issues for graph-based relational
data. Since the choice of relational data representation for the nodes, links,
and features can dramatically affect the capabilities of SRL algorithms, we
survey approaches and opportunities for relational representation
transformation designed to improve the performance of these algorithms. This
leads us to introduce an intuitive taxonomy for data representation
transformations in relational domains that incorporates link transformation and
node transformation as symmetric representation tasks. In particular, the
transformation tasks for both nodes and links include (i) predicting their
existence, (ii) predicting their label or type, (iii) estimating their weight
or importance, and (iv) systematically constructing their relevant features. We
motivate our taxonomy through detailed examples and use it to survey and
compare competing approaches for each of these tasks. We also discuss general
conditions for transforming links, nodes, and features. Finally, we highlight
challenges that remain to be addressed
Cooperation and Contagion in Web-Based, Networked Public Goods Experiments
A longstanding idea in the literature on human cooperation is that
cooperation should be reinforced when conditional cooperators are more likely
to interact. In the context of social networks, this idea implies that
cooperation should fare better in highly clustered networks such as cliques
than in networks with low clustering such as random networks. To test this
hypothesis, we conducted a series of web-based experiments, in which 24
individuals played a local public goods game arranged on one of five network
topologies that varied between disconnected cliques and a random regular graph.
In contrast with previous theoretical work, we found that network topology had
no significant effect on average contributions. This result implies either that
individuals are not conditional cooperators, or else that cooperation does not
benefit from positive reinforcement between connected neighbors. We then tested
both of these possibilities in two subsequent series of experiments in which
artificial seed players were introduced, making either full or zero
contributions. First, we found that although players did generally behave like
conditional cooperators, they were as likely to decrease their contributions in
response to low contributing neighbors as they were to increase their
contributions in response to high contributing neighbors. Second, we found that
positive effects of cooperation were contagious only to direct neighbors in the
network. In total we report on 113 human subjects experiments, highlighting the
speed, flexibility, and cost-effectiveness of web-based experiments over those
conducted in physical labs
Cache Serializability: Reducing Inconsistency in Edge Transactions
Read-only caches are widely used in cloud infrastructures to reduce access
latency and load on backend databases. Operators view coherent caches as
impractical at genuinely large scale and many client-facing caches are updated
in an asynchronous manner with best-effort pipelines. Existing solutions that
support cache consistency are inapplicable to this scenario since they require
a round trip to the database on every cache transaction.
Existing incoherent cache technologies are oblivious to transactional data
access, even if the backend database supports transactions. We propose T-Cache,
a novel caching policy for read-only transactions in which inconsistency is
tolerable (won't cause safety violations) but undesirable (has a cost). T-Cache
improves cache consistency despite asynchronous and unreliable communication
between the cache and the database. We define cache-serializability, a variant
of serializability that is suitable for incoherent caches, and prove that with
unbounded resources T-Cache implements this new specification. With limited
resources, T-Cache allows the system manager to choose a trade-off between
performance and consistency.
Our evaluation shows that T-Cache detects many inconsistencies with only
nominal overhead. We use synthetic workloads to demonstrate the efficacy of
T-Cache when data accesses are clustered and its adaptive reaction to workload
changes. With workloads based on the real-world topologies, T-Cache detects
43-70% of the inconsistencies and increases the rate of consistent transactions
by 33-58%.Comment: Ittay Eyal, Ken Birman, Robbert van Renesse, "Cache Serializability:
Reducing Inconsistency in Edge Transactions," Distributed Computing Systems
(ICDCS), IEEE 35th International Conference on, June~29 2015--July~2 201
AI Solutions for MDS: Artificial Intelligence Techniques for Misuse Detection and Localisation in Telecommunication Environments
This report considers the application of Articial Intelligence (AI) techniques to
the problem of misuse detection and misuse localisation within telecommunications
environments. A broad survey of techniques is provided, that covers inter alia
rule based systems, model-based systems, case based reasoning, pattern matching,
clustering and feature extraction, articial neural networks, genetic algorithms, arti
cial immune systems, agent based systems, data mining and a variety of hybrid
approaches. The report then considers the central issue of event correlation, that
is at the heart of many misuse detection and localisation systems. The notion of
being able to infer misuse by the correlation of individual temporally distributed
events within a multiple data stream environment is explored, and a range of techniques,
covering model based approaches, `programmed' AI and machine learning
paradigms. It is found that, in general, correlation is best achieved via rule based approaches,
but that these suffer from a number of drawbacks, such as the difculty of
developing and maintaining an appropriate knowledge base, and the lack of ability
to generalise from known misuses to new unseen misuses. Two distinct approaches
are evident. One attempts to encode knowledge of known misuses, typically within
rules, and use this to screen events. This approach cannot generally detect misuses
for which it has not been programmed, i.e. it is prone to issuing false negatives.
The other attempts to `learn' the features of event patterns that constitute normal
behaviour, and, by observing patterns that do not match expected behaviour, detect
when a misuse has occurred. This approach is prone to issuing false positives,
i.e. inferring misuse from innocent patterns of behaviour that the system was not
trained to recognise. Contemporary approaches are seen to favour hybridisation,
often combining detection or localisation mechanisms for both abnormal and normal
behaviour, the former to capture known cases of misuse, the latter to capture
unknown cases. In some systems, these mechanisms even work together to update
each other to increase detection rates and lower false positive rates. It is concluded
that hybridisation offers the most promising future direction, but that a rule or state
based component is likely to remain, being the most natural approach to the correlation
of complex events. The challenge, then, is to mitigate the weaknesses of
canonical programmed systems such that learning, generalisation and adaptation
are more readily facilitated
Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications
Wireless sensor networks monitor dynamic environments that change rapidly
over time. This dynamic behavior is either caused by external factors or
initiated by the system designers themselves. To adapt to such conditions,
sensor networks often adopt machine learning techniques to eliminate the need
for unnecessary redesign. Machine learning also inspires many practical
solutions that maximize resource utilization and prolong the lifespan of the
network. In this paper, we present an extensive literature review over the
period 2002-2013 of machine learning methods that were used to address common
issues in wireless sensor networks (WSNs). The advantages and disadvantages of
each proposed algorithm are evaluated against the corresponding problem. We
also provide a comparative guide to aid WSN designers in developing suitable
machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial
Reduced-order modeling of large-scale network systems
Large-scale network systems describe a wide class of complex dynamical
systems composed of many interacting subsystems. A large number of subsystems
and their high-dimensional dynamics often result in highly complex topology and
dynamics, which pose challenges to network management and operation. This
chapter provides an overview of reduced-order modeling techniques that are
developed recently for simplifying complex dynamical networks. In the first
part, clustering-based approaches are reviewed, which aim to reduce the network
scale, i.e., find a simplified network with a fewer number of nodes. The second
part presents structure-preserving methods based on generalized balanced
truncation, which can reduce the dynamics of each subsystem.Comment: Chapter 11 in the book Model Order Reduction: Volume 3 Application
How to Find Opinion Leader on the Online Social Network?
Online social networks (OSNs) provide a platform for individuals to share
information, exchange ideas and build social connections beyond in-person
interactions. For a specific topic or community, opinion leaders are
individuals who have a significant influence on others' opinions. Detecting and
modeling opinion leaders is crucial as they play a vital role in shaping public
opinion and driving online conversations. Existing research have extensively
explored various methods for detecting opinion leaders, but there is a lack of
consensus between definitions and methods. It is important to note that the
term "important node" in graph theory does not necessarily align with the
concept of "opinion leader" in social psychology. This paper aims to address
this issue by introducing the methodologies for identifying influential nodes
in OSNs and providing a corresponding definition of opinion leaders in relation
to social psychology. The key novelty is to review connections and
cross-compare different approaches that have origins in: graph theory, natural
language processing, social psychology, control theory, and graph sampling. We
discuss how they tell a different technical tale of influence and also propose
how some of the approaches can be combined via networked dynamical systems
modeling. A case study is performed on Twitter data to compare the performance
of different methodologies discussed. The primary objective of this work is to
elucidate the progression of opinion leader detection on OSNs and inspire
further research in understanding the dynamics of opinion evolution within the
field
- …