Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2022
Accelerating SSSP for Power-Law Graphs
FPGA '22: Proceedings of the 2022 ACM/SIGDA International Symposium on Field-Programmable Gate ArraysPages 190–200https://doi.org/10.1145/3490422.3502358The single-source shortest path (SSSP) problem is one of the most important and well-studied graph problems widely used in many application domains, such as road navigation, neural image reconstruction, and social network analysis. Although we have ...
- research-articleJune 2019
Combining Data Duplication and Graph Reordering to Accelerate Parallel Graph Processing
HPDC '19: Proceedings of the 28th International Symposium on High-Performance Parallel and Distributed ComputingPages 133–144https://doi.org/10.1145/3307681.3326609Performance of single-machine, shared memory graph processing is affected by expensive atomic updates and poor cache locality. Data duplication, a popular approach to eliminate atomic updates by creating thread-local copies of shared data, incurs ...
- research-articleMarch 2019
The Generalized Johnson Quantile-Parameterized Distribution System
Johnson quantile-parameterized distributions (J-QPDs) are parameterized by any symmetric percentile triplet (SPT) (e.g., the 10th–50th–90th) and support bounds. J-QPDs are smooth, highly flexible, and amenable to Monte Carlo simulation via inverse ...
- research-articleAugust 2016
Scalable Pattern Matching over Compressed Graphs via Dedensification
KDD '16: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data MiningPages 1755–1764https://doi.org/10.1145/2939672.2939856One of the most common operations on graph databases is graph pattern matching (e.g., graph isomorphism and more general types of "subgraph pattern matching"). In fact, in some graph query languages every single query is expressed as a graph matching ...
ROLL: Fast In-Memory Generation of Gigantic Scale-free Networks
SIGMOD '16: Proceedings of the 2016 International Conference on Management of DataPages 1829–1842https://doi.org/10.1145/2882903.2882964Real-world graphs are not always publicly available or sometimes do not meet specific research requirements. These challenges call for generating synthetic networks that follow properties of the real-world networks. Barabási-Albert (BA) is a well-known ...
-
- ArticleMay 2016
Analysis on the exploratory behavior of the Physarum plasmodium in an open space
BICT'15: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS)Pages 613–614https://doi.org/10.4108/eai.3-12-2015.2262478We observed long term exploratory behavior of Physarum plasmodium in an open space.
- articleMarch 2014
Scale-free power-laws as interaction between progress and diffusion
While scale-free power-laws are frequently found in social and technological systems, their authenticity, origin, and gained insights are often questioned, and rightfully so. The article presents a newly found rank-frequency power-law that aligns the ...
- ArticleMay 2013
Tagging Service System Design Using Voting Promotion Strategy
ICSSI '13: Proceedings of the 2013 Fifth International Conference on Service Science and InnovationPages 241–242https://doi.org/10.1109/ICSSI.2013.58Tagging is the one of Web 2.0 applications that can generate the web resources from the internet users. Tagging, provides meaningful descriptions of resources for more efficient searching and recommendation. However, Tagging still exists some issues ...
- research-articleJune 2012
Video sharing in online social networks: measurement and analysis
NOSSDAV '12: Proceedings of the 22nd international workshop on Network and Operating System Support for Digital Audio and VideoPages 83–88https://doi.org/10.1145/2229087.2229110Online social networks (OSNs) have become popular destinations for connecting friends and sharing information. Recent statistics suggest that OSN users regularly share contents from video sites, and a significant amount of requests of the video sites ...
- tutorialApril 2012
Power-law distribution in encoded MFCC frames of speech, music, and environmental sound signals
WWW '12 Companion: Proceedings of the 21st International Conference on World Wide WebPages 895–902https://doi.org/10.1145/2187980.2188220Many sound-related applications use Mel-Frequency Cepstral Coefficients (MFCC) to describe audio timbral content. Most of the research efforts dealing with MFCCs have been focused on the study of different classification and clustering algorithms, the ...
- ArticleMarch 2012
Inducing Scale-Free Characteristics of Dynamic Unstructured P2P Networks
AINA '12: Proceedings of the 2012 IEEE 26th International Conference on Advanced Information Networking and ApplicationsPages 771–778https://doi.org/10.1109/AINA.2012.97In a peer-to-peer (P2P) network, where nodes can freely join and leave at any time, the number of participating nodes tends to vary over time. Furthermore, in an unstructured P2P network, where any node can freely select direct linkages with any other ...
- ArticleDecember 2011
On the Power Law Property of Latency-Reducing Relays
ICPADS '11: Proceedings of the 2011 IEEE 17th International Conference on Parallel and Distributed SystemsPages 788–792https://doi.org/10.1109/ICPADS.2011.88Application relays can be used to reduce latency for real-time media communication. In this paper, we utilize the triangle inequality violations (TIV) in delay space to model the relays and analyze their properties in several data sets. We find that ...
- ArticleOctober 2011
Measurement of the Weibo Hall of Fame Network
IMCCC '11: Proceedings of the 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and ControlPages 192–195https://doi.org/10.1109/IMCCC.2011.57Weibo, a micro-blogging service provided by Sina at Sep. 2009, attracts over a hundred million users and is growing fast. Though Weibo user publishes any topic within the 140-character limit and follows others to receive their statuses as Twitter user ...
- articleAugust 2011
Self-similar characteristics of network intrusion attempts and the implications for predictability
Concurrency and Computation: Practice & Experience (CCOMP), Volume 23, Issue 12Pages 1367–1385https://doi.org/10.1002/cpe.1617One way of proactively detecting multistage attacks such as Distributed Denial of Service (DDoS), worms and coordinated spamming is to profile hosts that engage in scanning activity and predict their future actions, which is a difficult challenge. We ...
- research-articleMay 2011
Multifractal aspects of software development (NIER track)
ICSE '11: Proceedings of the 33rd International Conference on Software EngineeringPages 968–971https://doi.org/10.1145/1985793.1985962Software development is difficult to model, particularly the noisy, non-stationary signals of changes per time unit, extracted from version control systems (VCSs). Currently researchers are utilizing timeseries analysis tools such as ARIMA to model ...
- articleMarch 2011
Simulation of two generalised Newtonian fluids flow in micropore with dead end
International Journal of Computational Fluid Dynamics (IJCFD), Volume 25, Issue 3Pages 163–173https://doi.org/10.1080/10618562.2011.575370This research deals with the numerical simulation of Carreau and power-law fluids flow in an open capillary of a reservoir. The capillary is connected to a dead end. The finite volume method (FVM) on a structured and co-located grid has been used. The ...
- ArticleNovember 2010
The small-world network model of mixed production line
Mixed production line is a complicate system, so the small-world network model is introduced to describe and analyze the planning and design of mixed production line to raise its stability. Manufacturing units undertaking various production duties are ...
- ArticleOctober 2010
Popular or Personal: Access Patterns of User Generated Content
ICNDC '10: Proceedings of the 2010 First International Conference on Networking and Distributed ComputingPages 367–371https://doi.org/10.1109/ICNDC.2010.76It is generally believed that Zipf’s law is well applied for Web objects. However, as OSNs prevail and Internet begins to concentrate more and more on individuals, many researchers report that request frequency of Web objects deviates from Zipf’s law ...
- short-paperJuly 2010
Brief announcement: revisiting the power-law degree distribution for social graph analysis
PODC '10: Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computingPages 400–401https://doi.org/10.1145/1835698.1835791The study of complex networks led to the belief that the connectivity of network nodes generally follows a Power-law distribution. In this work, we show that modeling large-scale online social networks using a Power-law distribution produces significant ...
- research-articleJuly 2010
Topic models with power-law using Pitman-Yor process
KDD '10: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data miningPages 673–682https://doi.org/10.1145/1835804.1835890One important approach for knowledge discovery and data mining is to estimate unobserved variables because latent variables can indicate hidden specific properties of observed data. The latent factor model assumes that each item in a record has a latent ...