what-when-how
In Depth Tutorials and Information
References
1. L. Backstrom, C. Dwork, and Jon Kleinberg. Wherefore art thou r3579x?: Anonymized
social networks, hidden patterns, and structural steganography. In Proceedings of the
16th International Conference onWorldWideWeb (WWW '07) , New York, pp. 181-
190, 2007, ACM Press.
2. Lars Backstrom, Dan Huttenlocher, Jon Kleinberg, and Xiangyang Lan. Group forma-
tion in large social networks: membership, growth, and evolution. In Proceedingsofthe
12thACMSIGKDDInternationalConferenceonKnowledgeDiscoveryandDataMining
(KDD'06) , New York, pp. 44-54, 2006, ACM Press.
3. Jeffrey Baumes, Mark K. Goldberg, Malik Magdon-Ismail, and William A. Wallace.
Discovering hidden groups in communication networks. In ISI , pp. 378-389, 2004.
4. Tanya Y. Berger-Wolf and Jared Saia. A framework for analysis of dynamic social net-
works. In KDD'06 , pp. 523-528, 2006.
5. Alina Campan and Traian Marius Truta. A clustering approach for data and structural
anonymity in social networks. In PinKDD'08 , 2008.
6. Deepayan Chakrabarti and Christos Faloutsos. Graph mining: laws, generators, and
algorithms. ACMComput.Surv. , 38(1):2, 2006.
7. Fan Chung and Ronald Graham. Sparse quasi-random graphs. Combinatorica ,
22(2):217-244, 2002.
8. D. Cvetkovic, P. Rowlinson, and S. Simic. EigenspacesofGraphs . Cambridge University
Press, Cambridge, England, 1997.
9. Luciano da F. Costa, Francisco A. Rodrigues, Gonzalo Travieso, and P. R. Villas
Boas. Characterization of complex networks: A survey of measurements. Adv.Phys. ,
56:167, 2007.
10. Chris H. Q. Ding, Xiaofeng He, Hongyuan Zha, Ming Gu, and Horst D. Simon. A min-
max cut algorithm for graph partitioning and data clustering. In Proceedings of the 2001
IEEE International conference on Data Mining. pp. 107-114, 2001.
11. P. Erdos and A. Renyi. On random graphs i. Publicationes Mathematicae , 6:290-
297, 1959.
12. Ernesto Estrada and Juan A. Rodríguez-Velázquez. Subgraph centrality in complex
networks. Phys.Rev.E , 71(056103), 2005.
13. Andrew Fast, David Jensen, and Brian Neil Levine. Creating social networks to improve
peer-to-peer networking. In KDD'05 , pp. 568-573, 2005.
14. Z. Furedi and J. Komlos. he eigenvalues of random symmetric matrices. Combinatorica ,
1 (3):233-241, 1981.
15. M. Girvan and M. E. Newman. Community structure in social and biological net-
works. Proc.Natl.Acad.Sci.USA , 99(12):7821-7826, June 2002.
16. M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social net-
works. UniversityofMassachusettsTechnicalReport , 07-19, 2007.
17. Michael Hay, Gerome Miklau, David Jensen, Don Towsely, and Philipp Weis. Resisting
structural re-identification in anonymized social networks. In VLDB , 2008.
18. R. Horn and C. R. Johnson. MatrixAnalysis . Cambridge University Press, Cambridge,
England, 1985.
19. David Kempe, Jon M. Kleinberg, and Éva Tardos. Maximizing the spread of influence
through a social network. In KDD'03 , pp. 137-146, 2003.
Search WWH ::




Custom Search