44 research outputs found

    Learning Concept Interestingness for Identifying Key Structures from Social Networks

    Get PDF
    This is the author accepted manuscript. The final version is available from IEEE via the DOI in this recordIdentifying key structures from social networks that aims to discover hidden patterns and extract valuable information is an essential task in the network analysis realm. These different structure detection tasks can be integrated naturally owing to the topological nature of key structures. However, identifying key network structures in most studies has been performed independently, leading to huge computational overheads. To address this challenge, this paper proposes a novel approach for handling key structures identification tasks simultaneously under the unified Formal Concept Analysis (FCA) framework. Specifically, we first implement the FCA-based representation of a social network and then generate the fine-grained knowledge representation, namely concept. Then, an efficient concept interestingness calculation algorithm suitable for social network scenarios is proposed. Next, we then leverage concept interestingness to quantify the hidden relations between concepts and network structures. Finally, an efficient algorithm for jointly key structures detection is developed based on constructed mapping relations. Extensive experiments conducted on real-world networks demonstrate that the efficiency and effectiveness of our proposed approach.Fundamental Research Funds for the Central Universitie

    Enhancing Network Resilience through Machine Learning-powered Graph Combinatorial Optimization: Applications in Cyber Defense and Information Diffusion

    Get PDF
    With the burgeoning advancements of computing and network communication technologies, network infrastructures and their application environments have become increasingly complex. Due to the increased complexity, networks are more prone to hardware faults and highly susceptible to cyber-attacks. Therefore, for rapidly growing network-centric applications, network resilience is essential to minimize the impact of attacks and to ensure that the network provides an acceptable level of services during attacks, faults or disruptions. In this regard, this thesis focuses on developing effective approaches for enhancing network resilience. Existing approaches for enhancing network resilience emphasize on determining bottleneck nodes and edges in the network and designing proactive responses to safeguard the network against attacks. However, existing solutions generally consider broader application domains and possess limited applicability when applied to specific application areas such as cyber defense and information diffusion, which are highly popular application domains among cyber attackers. These solutions often prioritize general security measures and may not be able to address the complex targeted cyberattacks [147, 149]. Cyber defense and information diffusion application domains usually consist of sensitive networks that attackers target to gain unauthorized access, potentially causing significant financial and reputational loss. This thesis aims to design effective, efficient and scalable techniques for discovering bottleneck nodes and edges in the network to enhance network resilience in cyber defense and information diffusion application domains. We first investigate a cyber defense graph optimization problem, i.e., hardening active directory systems by discovering bottleneck edges in the network. We then study the problem of identifying bottleneck structural hole spanner nodes, which are crucial for information diffusion in the network. We transform both problems into graph-combinatorial optimization problems and design machine learning based approaches for discovering bottleneck points vital for enhancing network resilience. This thesis makes the following four contributions. We first study defending active directories by discovering bottleneck edges in the network and make the following two contributions. (1) To defend active directories by discovering and blocking bottleneck edges in the graphs, we first prove that deriving an optimal defensive policy is #P-hard. We design a kernelization technique that reduces the active directory graph to a much smaller condensed graph. We propose an effective edge-blocking defensive policy by combining neural network-based dynamic program and evolutionary diversity optimization to defend active directory graphs. The key idea is to accurately train the attacking policy to obtain an effective defensive policy. The experimental evaluations on synthetic AD attack graphs demonstrate that our defensive policy generates effective defense. (2) To harden large-scale active directory graphs, we propose reinforcement learning based policy that uses evolutionary diversity optimization to generate edge-blocking defensive plans. The main idea is to train the attacker’s policy on multiple independent defensive plan environments simultaneously so as to obtain effective defensive policy. The experimental results on synthetic AD graphs show that the proposed defensive policy is highly effective, scales better and generates better defensive plans than our previously proposed neural network-based dynamic program and evolutionary diversity optimization approach. We then investigate discovering bottleneck structural hole spanner nodes in the network and make the following two contributions. (3) To discover bottleneck structural hole spanner nodes in large-scale and diverse networks, we propose two graph neural network models, GraphSHS and Meta-GraphSHS. The main idea is to transform the SHS identification problem into a learning problem and use the graph neural network models to learn the bottleneck nodes. Besides, the Meta-GraphSHS model learns generalizable knowledge from diverse training graphs to create a customized model that can be fine-tuned to discover SHSs in new unseen diverse graphs. Our experimental results show that the proposed models are highly effective and efficient. (4) To identify bottleneck structural hole spanner nodes in dynamic networks, we propose a decremental algorithm and graph neural network model. The key idea of our proposed algorithm is to reduce the re-computations by identifying affected nodes due to updates in the network and performing re-computations for affected nodes only. Our graph neural network model considers the dynamic network as a series of snapshots and learns to discover SHS nodes in these snapshots. Our experiments demonstrate that the proposed approaches achieve significant speedup over re-computations for dynamic graphs.Thesis (Ph.D.) -- University of Adelaide, School of Computer and Mathematical Sciences, 202

    LIPIcs, Volume 244, ESA 2022, Complete Volume

    Get PDF
    LIPIcs, Volume 244, ESA 2022, Complete Volum

    LIPIcs, Volume 274, ESA 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 274, ESA 2023, Complete Volum

    Responding to Environmental Issues through Adaptive Collaborative Management

    Get PDF
    Focused on forest management and governance, this book examines two decades of experience with Adaptive Collaborative Management (ACM), assessing both its uses and improvements needed to address global environmental issues. The volume argues that the activation and the empowerment of local peoples are critical to addressing current environmental challenges and that this must be enhanced by linking and extending such stewardship to global and national policymakers and actors on a broader scale. This can be achieved by employing ACM’s participatory approach, characterized by conscious efforts among stakeholders to communicate, collaborate, negotiate and seek out opportunities to learn collectively about the impacts of their action. The case studies presented here reflect decades of experience working with forest communities in three Indonesian Islands and four African countries. Researchers and practitioners who participated in CIFOR’s early ACM work had the rare opportunity to return to their research sites decades later to see what has happened. These authors reflect critically on their own experience and local site conditions to glean insights that guide us in more effectively addressing climate change and other forest-related challenges. They showcase how global and regional actors will have to work more closely with smallholders, Indigenous Peoples and local communities, recognizing the key local roles in forest stewardship. This book will be of great interest to students, scholars and practitioners working in the fields of conservation, forest management, community development, natural resource management and development studies more broadly

    27th Annual European Symposium on Algorithms: ESA 2019, September 9-11, 2019, Munich/Garching, Germany

    Get PDF

    Social enterprise-led local development of the circular economy : socio-spatial networks and value-impact scaling pathways

    Get PDF
    The circular economy (CE) paradigm has emerged to challenge a predominantly linear economic development model by extracting and retaining the highest possible value from existing resources through their recirculation. While CE-related literature and policy discourse continue to grow, there is limited research on socio-spatial mechanisms shaping alternative circular economic development trajectories in the local development context. This thesis considers how the ecological and extra economic premises of CE thinking can be harnessed through mission-driven social enterprises (SEs) aimed at locally tackling poverty, inequality and/or waste. It investigates the extent to which 50 case study SEs operating in three different socio-spatial and institutional contexts (Hull, UK; Santiago, Chile; and Graz, Austria), and across diverse sectors (food, wood, textiles, housing, among others), stimulate and potentially could stimulate the development of a local and socially inclusive CE. In so doing, firstly, it untangles complex socio-material circuits of value and corresponding feedback loops associated with flows of (in)tangible resources across co-existing mainstream and alternative economic spaces of exchange, production and consumption. Secondly, this research adopts a Social Network Analysis approach to map and examine the broader social circular enterprise ecosystem in the City of Hull. It explores how the broader network constellations not only embody, but also could embody symbiotic relationships between environmentally-/CE-, socially- and/or commercially oriented enterprises to foster inclusive CE development. It then offers a heuristic framework illustrating the interplay of factors shaping collaborative ties in the development of inclusive CE. Finally, it explores diverse social-circular impact scaling strategies and develops an Integrated Social-Circular Value-Impact Scaling(ISCIRVIS) framework for academia and context-adaptable toolkit for entrepreneurs. The toolkit is designed to help entrepreneurs to create, deepen and/or broaden the scale and scope of environmental-circular, social and/or economic value outcomes/impacts associated with existing or implementable (circular) activities, yet in the light of potential costs/risks

    The Pinkaiti Partnership: A Case Study of Transnational Research and Education in the Brazilian Amazon

    Get PDF
    In 1991, Barbara Zimmerman visited the Mẽbêngôkre-Kayapó community of A’Ukre. A’Ukre and Zimmerman came up with an idea to create the Pinkaiti Ecological Research Station (Pinkaiti) within the federally demarcated Kayapó Indigenous Territories in Brazil’s Pará state. Pinkaiti was conceptualized to: (1) preserve Kayapó forests; (2) strengthen Kayapó culture; (3) create an economic alternative to regional mahogany logging; (4) initiate a tropical ecology research program; and (5) strengthen Kayapó transnational networks. After leaving A’Ukre, Zimmerman recruited Conservation International, an international environmental nongovernmental organization (NGO) as an institutional partner. The “Pinkaiti Partnership” has since evolved into a research and education-based multi-stakeholder partnership that includes a transnational network of community, NGO, university, and government actors. Over time, the partnership moved through four eras of activity: initiation (1991-1995); early research (1995-2000); international research (2000-2004); and the field course (2004 – present). Using an embedded comparative case study methodology, this dissertation unpacks the trajectory of stakeholder groups (A’Ukre community, NGOs, universities) as units of analysis to discuss the structure, process, and outcomes of partnership activities across partnership eras. To analyze partnership dynamics, I use Pinkaiti as a boundary object to trace Pinkaiti partner interactions across horizontal, vertical, and transversal axes. As a boundary object, Pinkaiti takes on multiple meanings and forms, depending on its use and context, as it is activated simultaneously or independently by one or more partnership actors. Partnership actors engage one another by navigating cultural, geographic, institution, or knowledge passage points. By tracing each actor group’s trajectory through the lens of Pinkaiti, the study illustrates how boundary objects both permit and restrict transnational collaboration. At the same time, the study reveals both the opportunities and limits of boundary objects as a conceptual tool. Boundary objects can be useful for tracking histories, clarifying the big picture, highlighting feedback loops, and illuminating invisible work. On the other hand, the Pinkaiti study shows that boundary objects can be limited in scope, reflect designer biases, and reinforce unequal power dynamics. Still, the Pinkaiti Partnership suggests important takeaways for actors interested in the design, implementation, or evaluation of education or research-based transnational partnership work

    Long-term urban resilience – a policy framework

    Full text link
    Urbanisation, technical development and climate change have brought the resilience of cities into the sphere of public debate. This and the continued trend of seeing cities as drivers of a country’s fate in the face of uncertainty has in turn made understanding factors that influence outcomes of urban policy even more relevant for academic research and policy-making. However, urban resilience policy is a complex and quickly evolving field characterised by significant challenges associated with urban governance systems, political pressures, uncertain and emergent nature of threats, speed of change and the level of complexity of long-lived networks that form cities. Additionally, resilience literature often lacks a focus on practical implications for urban resilience policy planning, development and implementation that can help policy-makers prioritise action and inform their decisions. This thesis presents a multi-method qualitative research design and aims to help develop a better understanding of practical approaches to long-term resilience-building policy development and implementation at the metropolitan scale across city networks that share a common understanding of urban resilience-building and strive towards it. The research provides a practical framework that can be used to analyse urban resilience policy development and implementation across city networks. The Long-term Urban Resilience Policy Action (LURPA) framework allows to study the state of multiple dimensions and areas of interventions that may influence the long-term implementation of urban resilience policies for metropolitan areas at different levels of governance. Other tools included in the framework allow to visualise complex interrelations that illustrate how policies are implemented. This type of research is needed to help policy-makers identify gaps and opportunities to improve the urban resilience policy over the long-term and to facilitate comprehensive and systematic research for policy learning. The framework was applied to two case studies (Melbourne and Glasgow) which provided specific insight into how some contextual elements that form intrinsic and extrinsic context of cities can hinder or enable the long-term implementation of urban resilience policy in metropolitan areas. Finally, this research also offers a discussion of potential implications of different governance, political, financial, information and reflexivity models for the Australian context

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
    corecore