Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Link mining applications: progress and challenges

Published: 01 December 2005 Publication History

Abstract

This article reviews a decade of progress in the area of link mining, focusing on application requirements and how they have and have not yet been addressed, especially in the area of complex event detection. It discusses some ongoing challenges and suggests ideas that could be opportunities for solutions. The most important conclusion of this article is that while there are many link mining techniques that work well for individual link mining tasks, there is not yet a comprehensive framework that can support a combination of link mining tasks as needed for many real applications.

References

[1]
AI Approaches to Fraud Detection and Risk Management, Technical Report WS-97-07, AAAI Press, 1997.
[2]
Cook, D. and Holder, L., "Graph-Based Data Mining," IEEE Intelligence Systems, 15(2):32--41, 2000.
[3]
DARPA, BAA 01-27 Evidence Extraction and Link Discovery. Available at http://www.darpa.mil/baa/BAA01-27.htm
[4]
Djoko, S., Cook, D. J., and Holder, L. B., "Analyzing the Benefits of Domain Knowledge in Substructure Discovery," in Proceedings of the First International Conference on Knowledge Discovery and Data Mining (KDD-95), pp. 75--80, AAAI Press, 1995.
[5]
Dzeroski, S., "Inductive Logic Programming for Knowledge Discovery in Databases," in Advances in Knowledge Discovery and Data Mining, AAAI/MIT Press, 1996.
[6]
Fawcett, T., Haimovitz, I., Provost, F., and Stolfo. S. "AI Approaches to Fraud Detection and Risk Management," AI Magazine 19(2): Summer 1998, 1998, 107--108
[7]
Fawcett, T. and Provost, F., "Combining Data Mining and Machine Learning for Effective User Profiling", in Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96). AAAI Press, 1996, pp. 8--13
[8]
Fawcett, T. and Provost, F., "Activity Monitoring: Noticing Interesting Changes in Behavior," in Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-99), pp. 53--62, ACM, 1999.
[9]
Fayyad, Usama et. al., "Knowledge Discovery and Data Mining: Towards a Unifying Framework," in Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96), pp. 82--88, AAAI Press, 1996.
[10]
Getoor, L. "Link Mining: A New Data Mining Challenge" SIGKDD Explorations 4(2), 2003.
[11]
Getoor, L., Friedman, N., Koller, D., and Pfeffer, A., "Learning Probabilistic Relational Models," in Relational Data Mining, Dzeroski, S., and Lavrac, N., (Eds.), pp. 307--335, Kluwer, 2001.
[12]
Getoor, L. and Jensen, D. (Eds.). Learning Statistical Models from Relational Data: Papers from the AAAI Workshop. AAAI Press, Menlo Park, CA, 2000.
[13]
Goldberg, H. and Senator, T. "Restructuring Databases for Consolidation and Link Analysis" in Proceedings of the First International Conference on Knowledge Discovery and Data Mining (KDD-95), pp. 136--141, AAAI Press, 1995.
[14]
Goldberg, H. and Senator, T., "Break Detection Systems" in AI Approaches to Fraud Detection and Risk Management, Technical Report WS-97-07, AAAI Press, 1997.
[15]
Goldszmidt, M. and Jensen, D. (Eds.). DARPA Workshop on Knowledge Discovery, Data Mining, and Machine Learning (KDD-ML): Recommendations Report, June 13--14, 1998, Carnegie Mellon University.
[16]
Jensen, D. "Statistical challenges to inductive inference in linked data," in Seventh International Workshop on Artificial Intelligence and Statistics, 1999.
[17]
Jensen, D., and Goldberg, H. (eds.), Artificial Intelligence and Link Analysis: Papers from the 1998 AAAI Fall Symposium, AAAI Press, Menlo Park, CA 1998.
[18]
KDD Cup 2003 homepage, Results and Sldes links: http://www.cs.cornell.edu/projects/kddcup/
[19]
Kirkland, James D., Senator, Ted E., et. al., "The NASD Regulation Advanced Detection System (ADS)," AI Magazine 20(1):55--67, 1999.
[20]
Kloesgen, W. and Zytkow, J. (eds.). Handbook of Knowledge Discovery and Data Mining. Oxford University Press, 2002.
[21]
Manago, M. and Kodratoff, Y. "Induction of Decistion Trees from Complex Structured Data" in Knowledge Discovery in Databases, G. Piatesky-Shapiro and W. J. Frawley (Eds.). AAAI Press, 289--308.
[22]
McKearney, Stephen and Roberts, Huw., "Reverse Engineering Databases for Knowledge Discovery," in Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96), pp. 375--378, AAAI Press, 1996.
[23]
Piatesky-Shapiro, Gregory, et. al., "An Overview of Issues in Developing Data Mining and Knowledge Discovery Applications," in Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96), pp. 89--95, AAAI Press, 1996.
[24]
Ribeiro, J. S., Kaufman, K. A., and Kerschberg, L., "Knoweldge Discovery from Multiple Databases," in Proceedings of the First International Conference on Knowledge Discovery and Data Mining (KDD-95), pp. 240--245, AAAI Press, 1995.
[25]
Senator, T., Goldberg, H., et. al., "The Financial Crimes Enforcement Network AI System (FAIS)." AI Magazine 16(4):21--39, 1995.
[26]
Senator, T. and Goldberg, H., "Break Detection Systems," in Handbook of Knowledge Discovery and Data Mining, W. Kloesgen and J. Zytkow (eds.), pp. 863--873. Oxford University Press, 2002.
[27]
Sparrow, M. The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects. Social Networks 13, 251--274, 1991
[28]
Winston, P. H., "Learning Structural Descriptions from Examples," The Psychology of Computer Vision, Winston, P. H. (Ed.), McGraw Hill, New York, ch. 5., 1975.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGKDD Explorations Newsletter
ACM SIGKDD Explorations Newsletter  Volume 7, Issue 2
December 2005
152 pages
ISSN:1931-0145
EISSN:1931-0153
DOI:10.1145/1117454
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 2005
Published in SIGKDD Volume 7, Issue 2

Check for updates

Author Tags

  1. complex event detection
  2. data mining applications
  3. link analysis
  4. link discovery
  5. link mining
  6. pattern analysis
  7. pattern discovery
  8. pattern matching
  9. structured data

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Friend Recommender System for Social Networks Based on Stacking Technique and Evolutionary AlgorithmComplexity10.1155/2022/58645452022Online publication date: 1-Jan-2022
  • (2020)Link prediction model based on dynamic network representationActa Physica Sinica10.7498/aps.69.2019116269:16(168901)Online publication date: 2020
  • (2018)BibliographieLes réseaux criminels10.4000/books.pum.11733(301-326)Online publication date: 17-May-2018
  • (2016)Classification of Social Networks Incorporating Link TypesAnalyzing and Securing Social Networks10.1201/b19566-20(167-176)Online publication date: 31-Mar-2016
  • (2015)Anomalies in link mining based on mutual information2015 SAI Intelligent Systems Conference (IntelliSys)10.1109/IntelliSys.2015.7361276(1057-1059)Online publication date: Nov-2015
  • (2015)Can a corporate network and news sentiment improve portfolio optimization using the Black–Litterman model?Quantitative Finance10.1080/14697688.2015.103986515:8(1405-1416)Online publication date: 2-Jun-2015
  • (2014)Ordered ranked weighted aggregation based book recommendation technique: A link mining approach2014 14th International Conference on Hybrid Intelligent Systems10.1109/HIS.2014.7086167(309-314)Online publication date: Dec-2014
  • (2013)Applications of Data Mining in Dynamic Social Network AnalysisData Mining in Dynamic Social Networks and Fuzzy Systems10.4018/978-1-4666-4213-3.ch006(110-121)Online publication date: 2013
  • (2013)RNRankInternational Workshop on Behavior and Social Informatics on Behavior and Social Computing - Volume 817810.1007/978-3-319-04048-6_13(139-150)Online publication date: 3-Aug-2013
  • (2013)Portfolio Optimization and Corporate Networks: Extending the Black Litterman ModelComplex Sciences10.1007/978-3-319-03473-7_8(83-94)Online publication date: 2013
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media