Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Faloutsos, Christos Add to Alert Profile  
Date Reviewed  
  1 - 5 of 7 reviews    
   Catching synchronized behaviors in large networks: a graph mining approach
Jiang M., Cui P., Beutel A., Faloutsos C., Yang S.  ACM Transactions on Knowledge Discovery from Data 10(4): 1-27, 2016. Type: Article

The automatic detection and accurate interpretation of suspicious graph patterns is one of the key issues in spotting malicious activities inside real-world systems, such as fake followers in Twitter, social network manipulation, and distributed d...
Nov 10 2016  
   CopyCatch: stopping group attacks by spotting lockstep behavior in social networks
Beutel A., Xu W., Guruswami V., Palow C., Faloutsos C.  WWW 2013 (Proceedings of the 22nd International World Wide Web Conference, Rio de Janeiro, Brazil,  May 13-17, 2013) 119-130, 2013. Type: Proceedings

In Web 2.0, the content is no longer static, but rather dynamically user generated. In this universe, the more interaction a product page or user profile gets, the greater the potential profits an individual or company may achieve with advertiseme...
May 15 2014  
  Data mining in large sets of complex data
Cordeiro R., Faloutsos C., Júnior C.,  Springer Publishing Company, Incorporated, New York, NY, 2013. 127 pp. Type: Book (978-1-447148-89-0)

In this information age, the volume and complexity of data generated and collected is increasing exponentially. In order to significantly use these huge volumes of complex data, we must have fast and automated techniques to discover useful knowled...
Jul 30 2013  
  Gelling, and melting, large graphs by edge manipulation
Tong H., Prakash B., Eliassi-Rad T., Faloutsos M., Faloutsos C.  CIKM 2012 (Proc. of the 21st ACM International Conference on Information and Knowledge Management, Maui, HI,  Oct 29-Nov 2, 2012) 245-254, 2012. Type: Proceedings

The authors of this paper start their text with a challenging problem in the area of graph mining with applications in various disciplines: Given a large graph, which edges should be deleted or added so as to affect the propagation of a network?...
May 1 2013  
  Power laws and the AS-level internet topology
Siganos G., Faloutsos M., Faloutsos P., Faloutsos C.  IEEE/ACM Transactions on Networking 11(4): 514-524, 2003. Type: Article

Power laws is a relatively new paradigm used to model networks. Instead of the traditional concept of a graph and the degree of a node (number of nodes, number of edges, and diameter), power laws defines the characteristics of the network componen...
Dec 11 2003  

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy