2,073 results on '"Network data"'
Search Results
2. REMOTE INTELLIGENT MEDICAL MONITORING DATA TRANSMISSION NETWORK OPTIMIZATION BASED ON DEEP LEARNING.
- Author
-
RUN WANG
- Subjects
PATIENT monitoring ,DEEP learning ,DATA transmission systems ,GIBBS sampling ,ECONOMIC indicators ,INTELLIGENT transportation systems ,LOGISTIC regression analysis ,INTELLIGENT tutoring systems - Abstract
A hospital operating status evaluation data analysis system was established based on the autoencoder's network. The Gibbs sampling method is used to obtain the approximate distribution of RBM. In addition, the Autoencoder neural network can also select feature dimensions that can better characterize the characteristics of financial operation data from a large amount of financial operation data. Deep learning methods are used to study the redundant information elimination method and the generation mechanism of multi-source heterogeneity in multi-source heterogeneous networks. The principle of intrinsic compression is used to reduce the dimensionality of the redundancy in the network and obtain the compression redundancy objective function. This article sets thresholds for information classification on the Internet. The approach was tested using financial data from a medical institution. Use smart encoders to extract 17 financial indicators from financial data that can be used for modeling. The evaluation results are used as the output vector of the model. Comparative experiments show that the AUC value and accuracy of the method proposed in this article can be improved by 0.84 and 83.33% compared with the AUC value of shallow logistic regression and BP neural network. This algorithm has apparent improvements. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. 基于网络数据和 TOPSIS 模型的哺乳文胸款式 感性评价.
- Author
-
刘妍 and 刘驰
- Abstract
Copyright of Wool Textile Journal is the property of National Wool Textile Science & Technology Information Center and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
4. Finite Mixtures of Latent Trait Analyzers With Concomitant Variables for Bipartite Networks: An Analysis of COVID-19 Data.
- Author
-
Failli, Dalila, Marino, Maria Francesca, and Martella, Francesca
- Abstract
AbstractNetworks consist of interconnected units, known as nodes, and allow to formally describe interactions within a system. Specifically, bipartite networks depict relationships between two distinct sets of nodes, designated as sending and receiving nodes. An integral aspect of bipartite network analysis often involves identifying clusters of nodes with similar behaviors. The computational complexity of models for large bipartite networks poses a challenge. To mitigate this challenge, we employ a Mixture of Latent Trait Analyzers (MLTA) for node clustering. Our approach extends the MLTA to include covariates and introduces a double EM algorithm for estimation. Applying our method to COVID-19 data, with sending nodes representing patients and receiving nodes representing preventive measures, enables dimensionality reduction and the identification of meaningful groups. We present simulation results demonstrating the accuracy of the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Populations of unlabelled networks: graph space geometry and generalized geodesic principal components.
- Author
-
Calissano, Anna, Feragen, Aasa, and Vantini, Simone
- Subjects
- *
GEODESICS , *FINITE groups , *GEOMETRY , *STATISTICS , *POPULATION statistics , *DIRECTED graphs - Abstract
Statistical analysis for populations of networks is widely applicable, but challenging, as networks have strongly non-Euclidean behaviour. Graph space is an exhaustive framework for studying populations of unlabelled networks that are weighted or unweighted, uni- or multilayered, directed or undirected. Viewing graph space as the quotient of a Euclidean space with respect to a finite group action, we show that it is not a manifold, and that its curvature is unbounded from above. Within this geometrical framework we define generalized geodesic principal components, and we introduce the align-all-and-compute algorithms, all of which allow for the computation of statistics on graph space. The statistics and algorithms are compared with existing methods and empirically validated on three real datasets, showcasing the potential utility of the framework. The whole framework is implemented within the geomstats Python package. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Research on the Simulation Method of HTTP Traffic Based on GAN.
- Author
-
Yang, Chenglin, Xu, Dongliang, and Ma, Xiao
- Subjects
COMPUTER network traffic ,GENERATIVE adversarial networks ,TRANSFORMER models ,GAUSSIAN mixture models ,HTTP (Computer network protocol) ,EVOLUTIONARY algorithms - Abstract
Due to the increasing severity of network security issues, training corresponding detection models requires large datasets. In this work, we propose a novel method based on generative adversarial networks to synthesize network data traffic. We introduced a network traffic data normalization method based on Gaussian mixture models (GMM), and for the first time, incorporated a generator based on the Swin Transformer structure into the field of network traffic generation. To further enhance the robustness of the model, we mapped real data through an AE (autoencoder) module and optimized the training results in the form of evolutionary algorithms. We validated the training results on four different datasets and introduced four additional models for comparative experiments in the experimental evaluation section. Our proposed SEGAN outperformed other state-of-the-art network traffic emulation methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. A Bayesian approach for de-duplication in the presence of relational data.
- Author
-
Sosa, Juan and Rodríguez, Abel
- Subjects
- *
MONTE Carlo method , *DATA recorders & recording - Abstract
In this paper, we study the impact of combining profile and network data in solving record de-duplication problems. We also assess the influence of a range of prior distributions on the linkage structure, and explore the use of stochastic gradient Hamiltonian Monte Carlo methods as a faster alternative to obtain samples from the posterior distribution for network parameters. Our methodology is evaluated using the RLdata500 data, which is a popular dataset in the record linkage literature. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Artificial Immune Detection for Network Intrusion Data Based on Quantitative Matching Method.
- Author
-
Cai Ming Liu, Yan Zhang, Zhihui Hu, and Chunming Xie
- Subjects
IMMUNOCOMPUTERS ,QUANTITATIVE research ,IMMUNE recognition ,FALSE alarms ,MATHEMATICAL models - Abstract
Artificial immune detection can be used to detect network intrusions in an adaptive approach and proper matching methods can improve the accuracy of immune detection methods. This paper proposes an artificial immune detection model for network intrusion data based on a quantitative matching method. The proposed model defines the detection process by using network data and decimal values to express features and artificial immune mechanisms are simulated to define immune elements. Then, to improve the accuracy of similarity calculation, a quantitative matching method is proposed. The model uses mathematical methods to train and evolve immune elements, increasing the diversity of immune recognition and allowing for the successful detection of unknown intrusions. The proposed model's objective is to accurately identify known intrusions and expand the identification of unknown intrusions through signature detection and immune detection, overcoming the disadvantages of traditional methods. The experiment results show that the proposed model can detect intrusions effectively. It has a detection rate of more than 99.6% on average and a false alarm rate of 0.0264%. It outperforms existing immune intrusion detection methods in terms of comprehensive detection performance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Graphical Assistant Grouped Network Autoregression Model: A Bayesian Nonparametric Recourse.
- Author
-
Ren, Yimeng, Zhu, Xuening, Lu, Xiaoling, and Hu, Guanyu
- Subjects
MARKOV chain Monte Carlo ,VECTOR autoregression model ,TIME series analysis ,ONLINE social networks ,BAYESIAN analysis - Abstract
Vector autoregression model is ubiquitous in classical time series data analysis. With the rapid advance of social network sites, time series data over latent graph is becoming increasingly popular. In this article, we develop a novel Bayesian grouped network autoregression model, which can simultaneously estimate group information (number of groups and group configurations) and group-wise parameters. Specifically, a graphically assisted Chinese restaurant process is incorporated under the framework of the network autoregression model to improve the statistical inference performance. An efficient Markov chain Monte Carlo sampling algorithm is used to sample from the posterior distribution. Extensive studies are conducted to evaluate the finite sample performance of our proposed methodology. Additionally, we analyze two real datasets as illustrations of the effectiveness of our approach. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Network analytics for insurance fraud detection: a critical case study
- Author
-
Deprez, Bruno, Vandervorst, Félix, Verbeke, Wouter, Verdonck, Tim, and Baesens, Bart
- Published
- 2024
- Full Text
- View/download PDF
11. Bias-Adjusted Spectral Clustering in Multi-Layer Stochastic Block Models.
- Author
-
Lei, Jing and Lin, Kevin Z.
- Subjects
- *
STOCHASTIC models , *QUADRATIC forms , *GENE regulatory networks , *MATRIX inequalities , *DATA analysis - Abstract
We consider the problem of estimating common community structures in multi-layer stochastic block models, where each single layer may not have sufficient signal strength to recover the full community structure. In order to efficiently aggregate signal across different layers, we argue that the sum-of-squared adjacency matrices contain sufficient signal even when individual layers are very sparse. Our method uses a bias-removal step that is necessary when the squared noise matrices may overwhelm the signal in the very sparse regime. The analysis of our method relies on several novel tail probability bounds for matrix linear combinations with matrix-valued coefficients and matrix-valued quadratic forms, which may be of independent interest. The performance of our method and the necessity of bias removal is demonstrated in synthetic data and in microarray analysis about gene co-expression networks. for this article are available online. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
12. CNS: Research on Data Security Technology and Network Data Security Regulations Driven by Digital Economy.
- Author
-
Wang, Yue
- Subjects
DATA security ,COMPUTER network security ,DATA protection ,HIGH technology industries ,SECURITIES industry laws ,MULTICASTING (Computer networks) ,DATA encryption ,EMAIL security - Abstract
In order to improve data security and network data security in the digital economy-driven environment, this paper combines data security technology and network security technology to build a digital economy security management and control system. Moreover, this paper describes the data encryption of the data owners before the framework index and the composition and construction method of the corresponding EncIR tree, and analyzes the spatial keyword group query algorithm on the EncIR tree. In addition, this paper analyzes the experimental performance of index building and spatial query, and builds an intelligent digital economy security system on the basis of these algorithms. The experimental research results verify that the data security technology and network data system driven by the digital economy have good security performance, and on this basis, follow-up security regulations can be formulated. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
13. Dependence matters: Statistical models to identify the drivers of tie formation in economic networks.
- Author
-
De Nicola, Giacomo, Fritz, Cornelius, Mehrl, Marius, and Kauermann, Göran
- Subjects
- *
STATISTICAL models , *ECONOMIC research , *RANDOM graphs , *LATENT variables , *INTERNATIONAL trade - Abstract
Networks are ubiquitous in economic research on organizations, trade, and many other areas. However, while economic theory extensively considers networks, no general framework for their empirical modeling has yet emerged. We thus introduce two different statistical models for this purpose – the Exponential Random Graph Model (ERGM) and the Additive and Multiplicative Effects network model (AME). Both model classes can account for network interdependencies between observations, but differ in how they do so. The ERGM allows one to explicitly specify and test the influence of particular network structures, making it a natural choice if one is substantively interested in estimating endogenous network effects. In contrast, AME captures these effects by introducing actor-specific latent variables affecting their propensity to form ties. This makes the latter a good choice if the researcher is interested in capturing the effect of exogenous covariates on tie formation without having a specific theory on the endogenous dependence structures at play. After introducing the two model classes, we showcase them through real-world applications to networks stemming from international arms trade and foreign exchange activity. We further provide full replication materials to facilitate the adoption of these methods in empirical economic research. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
14. A Bayesian record linkage model incorporating relational data.
- Author
-
Sosa, Juan and Rodríguez, Abel
- Subjects
SOCIAL networks ,MACHINE learning ,SOCIAL network analysis - Abstract
In this article, we introduce a novel Bayesian approach for linking multiple social networks in order to discover the same real world person having different accounts across networks. In particular, we develop a latent model that allows us to jointly characterize the network and linkage structures relying on both relational and profile data. In contrast to other existing approaches in the machine learning literature, our Bayesian implementation naturally provides uncertainty quantification via posterior probabilities for the linkage structure itself or any function of it. Our findings clearly suggest that our methodology can produce accurate point estimates of the linkage structure even in the absence of profile information, and also, in an identity resolution setting, our results confirm that including relational data into the matching process improves the linkage accuracy. We illustrate our methodology using real data from popular social networks such as Twitter, Facebook, and YouTube. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
15. Data
- Author
-
Emmert-Streib, Frank, Moutari, Salissou, Dehmer, Matthias, Emmert-Streib, Frank, Moutari, Salissou, and Dehmer, Matthias
- Published
- 2023
- Full Text
- View/download PDF
16. Machine Learning Based Security Situation Awareness Method for Network Data Transmission Process
- Author
-
Du, Hui, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Xu, Yuan, editor, Yan, Hongyang, editor, Teng, Huang, editor, Cai, Jun, editor, and Li, Jin, editor
- Published
- 2023
- Full Text
- View/download PDF
17. Construction of Network Data Security Detection System Based on Data Mining Algorithm
- Author
-
Zhan, Wei, Zha, Zhiyong, Jin, Bo, Liao, Rongtao, Guo, Feng, Deng, Guoru, Yu, Zheng, Dong, Liang, Zhao, Jinhui, Dong, Chenxi, He, Xin, Xhafa, Fatos, Series Editor, Ahmad, Ishfaq, editor, Ye, Jun, editor, and Liu, Weidong, editor
- Published
- 2023
- Full Text
- View/download PDF
18. Inference for High-Dimensional Exchangeable Arrays.
- Author
-
Chiang, Harold D., Kato, Kengo, and Sasaki, Yuya
- Subjects
- *
CENTRAL limit theorem , *HIGH-dimensional model representation , *INTERNATIONAL trade - Abstract
We consider inference for high-dimensional separately and jointly exchangeable arrays where the dimensions may be much larger than the sample sizes. For both exchangeable arrays, we first derive high-dimensional central limit theorems over the rectangles and subsequently develop novel multiplier bootstraps with theoretical guarantees. These theoretical results rely on new technical tools such as Hoeffding-type decomposition and maximal inequalities for the degenerate components in the Hoeffiding-type decomposition for the exchangeable arrays. We exhibit applications of our methods to uniform confidence bands for density estimation under joint exchangeability and penalty choice for l 1 -penalized regression under separate exchangeability. Extensive simulations demonstrate precise uniform coverage rates. We illustrate by constructing uniform confidence bands for international trade network densities. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
19. A note on asymptotic distributions in a directed network model with degree heterogeneity and homophily.
- Author
-
Jing Luo, Xiaohui Ma, and Lewei Zhou
- Subjects
- *
ASYMPTOTIC distribution , *MAXIMUM likelihood statistics , *ASYMPTOTIC normality , *HETEROGENEITY , *CENTRAL limit theorem - Abstract
The asymptotic normality of a fixed number of the maximum likelihood estimators in a directed network model with degree heterogeneity and homophily has been established recently. In this article, we further derive a central limit theorem for a linear combination of all the maximum likelihood estimators of degree parameter when the number of nodes goes to infinity. Simulation studies are provided to illustrate the asymptotic results. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
20. A Novel Network Data Encryption Method Based on TrustZone.
- Author
-
Hongyan Xu and Yaodong Yuan
- Subjects
- *
DATA encryption , *IMAGE encryption , *WIRELESS sensor networks , *COMPUTER network security , *TRUST , *DATA transmission systems , *SOCIAL networks , *LINEAR network coding - Abstract
To ensure the security of network data transmission, a network data encryption method based on TrustZone was analyzed. The hardware layer was used to provide hardware support for network data encryption. The framework layer was provided with a trusted operating kernel and a common kernel with a rich execution environment through the kernel layer. The framework layer used the key security management unit on the client-application-side to create, write, read, and delete the security key file. The network data encryption and decryption unit on the client-application-side constructed a session connection between the client application side and the trusted application side under the kernel provided by the kernel layer by calling the hardware of the hardware layer. Moreover, the network data encryption and decryption instructions were transmitted to the trusted-application-side network data encryption and decryption unit. The encryption of the memristor neural network and the cubic chaotic map were employed. The network data encryption and decryption results were presented to the user through the application layer. Experiments results prove that, the interval of the optimal key chaotic sequence must be controlled between [-1,1]. The ASCII code value of the network data character sequence before encryption has an obvious distribution pattern to encrypt the network data to be transmitted under the wireless sensor network scenario. The value of the 0-1 balance index of the encrypted network data of this study's method is the closest to 0, and the highest values are approximately 0.0088, 0.0079, and 0.0067. The method in this study can effectively encrypt and decrypt network data. Under different attack types, this method has high integrity of encrypted network data and a high value of avalanche effect. Thus, it has effective anti-attack performance. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. Research on the Simulation Method of HTTP Traffic Based on GAN
- Author
-
Chenglin Yang, Dongliang Xu, and Xiao Ma
- Subjects
GAN ,HTTP stream ,traffic feature mimicry ,data synthesis ,network data ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
Due to the increasing severity of network security issues, training corresponding detection models requires large datasets. In this work, we propose a novel method based on generative adversarial networks to synthesize network data traffic. We introduced a network traffic data normalization method based on Gaussian mixture models (GMM), and for the first time, incorporated a generator based on the Swin Transformer structure into the field of network traffic generation. To further enhance the robustness of the model, we mapped real data through an AE (autoencoder) module and optimized the training results in the form of evolutionary algorithms. We validated the training results on four different datasets and introduced four additional models for comparative experiments in the experimental evaluation section. Our proposed SEGAN outperformed other state-of-the-art network traffic emulation methods.
- Published
- 2024
- Full Text
- View/download PDF
22. Continuing Education Network Data Center Model Based on Fractional Differential Mathematical Equations
- Author
-
Wu Lei
- Subjects
continuing education ,network data ,fractional differential mathematical equation ,data encryption ,34a08 ,Mathematics ,QA1-939 - Abstract
Continuing education platforms are faced with problems such as the aging of online learning platforms and backward technology. The data center network is an essential infrastructure supporting the big data and cloud computing platform continuing education network. It is widely used for data-intensive and massively parallel computing tasks. The paper proposes a continuing education network data center management model based on this research background. At the same time, this paper proposes a real-time encryption method for distributed data in a multi-layer differential continuing education network based on fractional differential mathematical equations. The experimental study found that the fractional differential mathematical equations method can effectively control the stability of data transmission of continuing education receipt networks. This algorithm improves the efficiency of network data operation and controls the cost of encryption. The research results of this paper provide technical support for network education.
- Published
- 2023
- Full Text
- View/download PDF
23. Archaeological Network Science
- Author
-
Brandes, Ulrik, Brughmans, Tom, book editor, Mills, Barbara J., book editor, Munson, Jessica, book editor, and Peeples, Matthew A., book editor
- Published
- 2023
- Full Text
- View/download PDF
24. Hypothesis testing for populations of networks.
- Author
-
Chen, Li, Zhou, Jie, and Lin, Lizhen
- Subjects
- *
CHANGE-point problems , *ASYMPTOTIC distribution , *MODEL theory , *HYPOTHESIS , *DATA analysis - Abstract
It has become an increasingly common practice in modern science and engineering to collect samples of multiple network data in which a network serves as a basic data object. The increasing prevalence of multiple network data calls for developments of models and theories that can deal with inference problems for populations of networks. In this work, we propose a general procedure for hypothesis testing of networks and in particular, for differentiating distributions of two samples of networks. We consider a very general framework which allows us to perform test on large and sparse networks. Our contribution is two-fold: (1) We propose a test statistics based on the singular value of a generalized Wigner matrix. The asymptotic null distribution of the statistics is shown to follow the Tracy–Widom distribution as the number of nodes tends to infinity. The test also yields asymptotic power guarantee with the power tending to one under the alternative; (2) The test procedure is adapted for change-point detection in dynamic networks which is proven to be consistent in detecting the change-points. In addition to theoretical guarantees, another appealing feature of this adapted procedure is that it provides a principled and simple method for selecting the threshold that is also allowed to vary with time. Extensive simulation studies and real data analyses demonstrate the superior performance of our procedure with competitors. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
25. A Semi-Federated Active Learning Framework for Unlabeled Online Network Data.
- Author
-
Zhou, Yuwen, Hu, Yuhan, Sun, Jing, He, Rui, and Kang, Wenjie
- Subjects
- *
ACTIVE learning , *SUPERVISED learning , *DATA privacy , *SECURE Sockets Layer (Computer network protocol) , *MATHEMATICAL optimization - Abstract
Federated Learning (FL) is a newly emerged federated optimization technique for distributed data in a federated network. The participants in FL that train the model locally are classified into client nodes. The server node assumes the responsibility to aggregate local models from client nodes without data moving. In this regard, FL is an ideal solution to protect data privacy at each node of the network. However, the raw data generated on each node are unlabeled, making it impossible for FL to apply these data directly to train a model. The large volume of data annotating work prevents FL from being widely applied in the real world, especially for online scenarios, where the data are generated continuously. Meanwhile, the data generated on different nodes tend to be differently distributed. It has been proved theoretically and experimentally that non-independent and identically distributed (non-IID) data harm the performance of FL. In this article, we design a semi-federated active learning (semi-FAL) framework to tackle the annotation and non-IID problems jointly. More specifically, the server node can provide (i) a pre-trained model to help each client node annotate the local data uniformly and (ii) an estimation of the global gradient to help correct the local gradient. The evaluation results demonstrate our semi-FAL framework can efficiently handle unlabeled online network data and achieves high accuracy and fast convergence. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
26. Triangular Concordance Learning of Networks.
- Author
-
Gu, Jiaqi and Yin, Guosheng
- Subjects
- *
CONCAVE functions , *PARAMETER estimation , *ACCOUNTING methods , *LINEAR network coding , *INTIMACY (Psychology) - Abstract
Networks are widely used to describe relational data among objects in a complex system. As network data often exhibit clustering structures, research interest often focuses on discovering clusters of nodes. We develop a novel concordance-based method for node clustering in networks, where a linear model is imposed on the latent position of each node with respect to a node-specific center and its covariates via linear transformation. By maximizing a triangular concordance function with a concave pairwise penalty, the latent positions are estimated so that each node would be more likely to be close to its neighbors in contrast to non-neighbors and nodes are clustered by their node-specific centers. We develop an alternating direction method of multipliers algorithm for parameter estimation and an intimacy score between unlinked nodes for link prediction. Our method takes into account common characteristics of network data (i.e., assortativity, link pattern similarity, node heterogeneity and link transitivity), while it does not require the number of clusters to be known. The clustering effectiveness and link prediction accuracy of our method are demonstrated in simulated and real networks. for this article are available online. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
27. User behavior data analysis and product design optimization algorithm based on deep learning
- Author
-
Liang, Lijuan and Ke, Yun
- Published
- 2023
- Full Text
- View/download PDF
28. Bridging the offline and online: 20 years of offline meeting data of the German-language Wikipedia
- Author
-
Schwitter, Nicole
- Published
- 2023
- Full Text
- View/download PDF
29. Network cards: concise, readable summaries of network data
- Author
-
James Bagrow and Yong-Yeol Ahn
- Subjects
Network data ,Network summaries ,Reporting guidelines ,Tabular summary ,Standardized reporting ,Karate club ,Applied mathematics. Quantitative methods ,T57-57.97 - Abstract
Abstract The deluge of network datasets demands a standard way to effectively and succinctly summarize network datasets. Building on similar efforts to standardize the documentation of models and datasets in machine learning, here we propose network cards, short summaries of network datasets that can capture not only the basic statistics of the network but also information about the data construction process, provenance, ethical considerations, and other metadata. In this paper, we lay out (1) the rationales and objectives for network cards, (2) key elements that should be included in network cards, and (3) example network cards to underscore their benefits across a variety of research domains. We also provide a schema, templates, and a software package for generating network cards.
- Published
- 2022
- Full Text
- View/download PDF
30. Network Data
- Author
-
Li, Meng-Hao, Schintler, Laurie A., editor, and McNeely, Connie L., editor
- Published
- 2022
- Full Text
- View/download PDF
31. Analysis of the Architecture of the Collaborative Design Platform for the Radar Integrated Network
- Author
-
Liu, Zhangyi, Shen, Li, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Duan, Baoyan, editor, Umeda, Kazunori, editor, and Kim, Chang-wan, editor
- Published
- 2022
- Full Text
- View/download PDF
32. A network Lasso model for regression.
- Author
-
Su, Meihong and Wang, Wenjian
- Subjects
- *
REGRESSION analysis , *INFORMATION networks - Abstract
Samples often are collected by a network in many modern applications, and the network structure information is potentially helpful in making regression predictions. However, most regression models assume the samples are independent, such as Lasso. Motivated by this, taking the network information into account, we propose a Network Lasso model for regression prediction in this paper. Specially, we consider the effect of the neighborhoods to each response and model each yi as a linear combination of the covariates xi, the connected neighbors yj, and an error term ϵi. The corresponding coefficients are referred to effect of node and neighborhoods, respectively. The consistency of the estimators are also established under the regimes where the neighborhoods effect coefficients are known and unknown, respectively. Finally, we evaluate the performance of the proposed model through a series of simulations and a latitude data example. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
33. acreg: Arbitrary correlation regression.
- Author
-
Colella, Fabrizio, Lalive, Rafael, Sakalli, Seyhun Orcan, and Thoenig, Mathias
- Subjects
- *
DATABASES - Abstract
We present acreg, a new command that implements the arbitrary clustering correction of standard errors proposed in Colella et al. (2019, IZA discussion paper 12584). Arbitrary here refers to the way observational units are correlated with each other: we impose no restrictions so that our approach can be used with a wide range of data. The command accommodates both cross-sectional and panel databases and allows the estimation of ordinary least-squares and two-stage least-squares coefficients, correcting standard errors in three environments: in a spatial setting using units' coordinates or distance between units, in a network setting starting from the adjacency matrix, and in a multiway clustering framework taking multiple clustering variables as input. Distance and time cutoffs can be specified by the user, and linear decays in time and space are also optional. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
34. The use of documentary data for network analysis in emergency and crisis management.
- Author
-
Kapucu, Naim, Okhai, Ratna, Ge, Yue, and Zobel, Chris
- Subjects
CRISIS management ,EMERGENCY management ,DATA analysis ,IDENTIFICATION documents ,CONTENT analysis ,ACQUISITION of data - Abstract
The use of network analysis to understand relationships among actors and organizations in coordinated actions has grown in recent years. Examining the network structure and functions in disaster response has gained particular attention. Different methods of data collection and analysis are utilized in network research. The use of documents as a data source has also gained traction. Scholars utilize content analysis of documents to uncover network structure, i.e., core "nodes," and functions. This is especially critical in emergency and crisis management as the associated network involves complex set of actors from different sectors and jurisdictions, and first-hand recollections of representatives might not be inclusive of every interaction and specific actors they worked with. With augmented utilization, there is a need to understand the methodological process of document use as a primary means of data analysis in emergency management. This study fills that gap by providing a systematic literature review of empirical studies across a broad range of subjects that have discussed document collection and use for network analysis. Furthermore, this study provides a detailed example of the method of document identification and collection, data generation and organization process, and network visualization and analysis in an emergency and crisis management context. The study concludes with answering, for disaster response networks, what types of documentary data are utilized and how they are used, the types of disasters that have been prevalent in utilizing this method, and the process undertaken to analyze and visualize networks. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
35. Higher-Order Spectral Clustering Under Superimposed Stochastic Block Models.
- Author
-
Paul, Subhadeep, Milenkovic, Olgica, and Yuguo Chen
- Subjects
- *
RANDOM graphs , *STOCHASTIC models , *SUBGRAPHS - Abstract
Higher-order motif structures and multi-vertex interactions are becoming increasingly important in studies of functionalities and evolution patterns of complex networks. To elucidate the role of higher-order structures in community detection over networks, we introduce a Superimposed Stochastic Block Model (SupSBM). The model is based on a random graph framework in which certain higher-order structures or subgraphs are generated through an independent hyperedge generation process and then replaced with graphs superimposed with edges generated by an inhomogeneous random graph model. Consequently, the model introduces dependencies between edges which allow for capturing more realistic network phenomena, namely strong local clustering in a sparse network, short average path length, and community structure. We then proceed to rigorously analyze the performance of a recently proposed higher-order spectral clustering method on the SupSBM. In particular, we prove non-asymptotic upper bounds on the misclustering error of higher-order spectral community detection for a SupSBM setting in which triangles are superimposed with undirected edges. We assess the model fit of the proposed model and compare it with existing random graph models in terms of observed properties of real network data obtained from diverse domains by sampling networks from the fitted models and a nonparametric network cross-validation approach. [ABSTRACT FROM AUTHOR]
- Published
- 2023
36. On the Rényi index of random graphs
- Author
-
Yuan, Mingao
- Published
- 2023
- Full Text
- View/download PDF
37. Online change-point detection: a weighted sum approach with constraint and application to dynamic network observation.
- Author
-
Qiao, Lei and Han, Dong
- Abstract
Abstract This article considers the change detection problem for one-dimensional observation sequences and dynamic network observation sequences. Since for network data, especially for large-scale network data, it is unrealistic to obtain the underlying distribution or underlying probabilistic structure. In this view, we consider a weighted sum approach with constraint for change detection. The purpose of the constraint is to highlight the changes, thus the method proposed has better performance for small shift. Meanwhile, different metrics for network data are suitable for different types of changes, the detection ability of
L 1-norm is better for dense change, and the detection ability of max-norm is better for sparse change. A parallel multi-chart is proposed as a guidance for improving the performance of change detection for different types of changes. Furthermore, the theoretical results are illustrated numerically on one-dimensional observation sequences and dynamic network observation sequences. [ABSTRACT FROM AUTHOR]- Published
- 2022
- Full Text
- View/download PDF
38. Consistent estimation of the number of communities in stochastic block models using cross-validation.
- Author
-
Jining Qin and Jing Lei
- Subjects
- *
STOCHASTIC models - Abstract
The stochastic block model (SBM) and its variants constitute an important family of probabilistic tools for studying network data. There is a rich literature on methods for estimating block labels and model parameters of stochastic block models. Most of these studies require the number of communities K as an input, making the estimation of K an important problem. Cross-validation is a natural option for this problem since it is a widely used generic method for evaluating model fitting. However, crossvalidation is known to be inconsistent and prone to overfitting unless impractical split ratios are used. Cross-validation with confidence (CVC) is proposed with better theoretical guarantees in conventional settings. We study the properties of CVC for stochastic block models. Our theoretical studies show that CVC, unlike the standard cross-validation, can consistently pick the optimal K under suitable conditions. We implement this method and check its performance against other established methods on both synthetic and real datasets. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
39. Design of Advance Security Early Warning System for Network Data Based on Artificial Intelligence
- Author
-
Wang, Ya-fei, He, Wei- na, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin (Sherman), Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Fu, Weina, editor, Xu, Yuan, editor, Wang, Shui-Hua, editor, and Zhang, Yudong, editor
- Published
- 2021
- Full Text
- View/download PDF
40. Network Data Processing Methods Based on Edge Computing
- Author
-
Jian, Ying, Wu, Weiwei, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Xu, Zheng, editor, Parizi, Reza M., editor, Loyola-González, Octavio, editor, and Zhang, Xiaolu, editor
- Published
- 2021
- Full Text
- View/download PDF
41. Am I Rare? an Intelligent Summarization Approach for Identifying Hidden Anomalies
- Author
-
Ghodratnama, Samira, Zakershahrak, Mehrdad, Sobhanmanesh, Fariborz, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Hacid, Hakim, editor, Outay, Fatma, editor, Paik, Hye-young, editor, Alloum, Amira, editor, Petrocchi, Marinella, editor, Bouadjenek, Mohamed Reda, editor, Beheshti, Amin, editor, Liu, Xumin, editor, and Maaradji, Abderrahmane, editor
- Published
- 2021
- Full Text
- View/download PDF
42. Human migration as a complex network: appropriate abstraction, and the feasibility of Network Science tools
- Author
-
Pitoski, Dino, Lampoltshammer, Thomas J., Parycek, Peter, Haber, Peter, editor, Lampoltshammer, Thomas, editor, Mayr, Manfred, editor, and Plankensteiner, Kathrin, editor
- Published
- 2021
- Full Text
- View/download PDF
43. Test on Stochastic Block Model: Local Smoothing and Extreme Value Theory.
- Author
-
Wu, Fan, Kong, Xinbing, and Xu, Chao
- Abstract
In this paper, to obtain a consistent estimator of the number of communities, the authors present a new sequential testing procedure, based on the locally smoothed adjacency matrix and the extreme value theory. Under the null hypothesis, the test statistic converges to the type I extreme value distribution, and otherwise, it explodes fast and the divergence rate could even reach n in the strong signal case where n is the size of the network, guaranteeing high detection power. This method is simple to use and serves as an alternative approach to the novel one in Lei (2016) using random matrix theory. To detect the change of the community structure, the authors also propose a two-sample test for the stochastic block model with two observed adjacency matrices. Simulation studies justify the theory. The authors apply the proposed method to the political blog data set and find reasonable group structures. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
44. Review of data visualization research
- Author
-
Bin12 LIU, Zengjie12 LIU, Yu3 LIU, Ziwen4 LI, Li5 CHEN, Zhongxian12 SUN, Ying12 WANG, Yihui12 ZHANG, Jiasheng12 ZHAO, Hongbin6 ZHANG, and Qing12 LIU
- Subjects
computer graphics ,data visualization ,multidimensional data ,time series data ,network data ,hierarchical data ,Technology - Abstract
Data visualization plays an important role in discovering rules from massive data,enhancing data performance and improving interaction efficiency.At present,the concept of data visualization and related research fields are expanding.In terms of data types,the current visualization research gradually focuses on the fields of multidimensional data,time series data,network data and hierarchical data.Through the analysis of Chinese and foreign literature on CNKI,it can be seen that 2014 and 2015 are "milestone" years in which the research heat in the field of data visualization is upgraded and a large number of theoretical achievements are produced;Data visualization is an important supporting field of rapid development after the formation of the research upsurge in the field of big data in China;The research in the field of data visualization at home and abroad has basically achieved synchronization in time;Wuhan University,Zhejiang University,Beijing University of Posts and telecommunications,University of national defense science and technology and University of Electronic Science and technology research actively in this field in China.In order to obtain good visual effects,help users reduce the difficulty of understanding,efficiently analyze data and insight value,It is usually necessary to pay attention to technical points such as color and semantics,highlighting core data,preventing data overload and preventing excessive divergence of thinking.The existing data visualization technologies are mainly divided into geometry based technology,icon based technology,dimension reduction based technology,pixel oriented technology,time series based technology,network data based technology,hierarchical visualization technology and distribution technology.Visualization methods based on geometric technology,including parallel coordinates,scatter matrix,Andrews curve,etc;The coordinate based visualization method can clearly show the relationship between variables,but limited by the screen size,it is difficult to visually display all dimensions when the data dimensions exceed three.It needs to be displayed in combination with human-computer interaction technology,which is suitable for the correlation between different dimensions,such as the correlation between students' learning behaviors;Icon based visualization method mainly includes star drawing method and Chernoff surface method.Geometric graphics are used as icons to depict multi-dimensional data,which intuitively reflects the visual significance of each work surface.It is suitable for work completion and incentive work progress overview,etc;The visualization method based on dimension reduction technology determines the coordinates of points according to the dimension attributes and maps them to the low-dimensional visual space on the premise of keeping the data relationship unchanged.The dimension reduction technology mainly involves principal component analysis,self-organizing mapping,isometric mapping,etc;The visualization method based on time series is a visualization method to display the relationship and influence degree between data,mainly including linear graph,stacking graph,horizon graph,etc.the corresponding data is collected with the development of time and presented by the above three visualization methods,which is suitable for representing the flow and change state of information data,such as the trend distribution of grades in different time periods and the change of theme concepts,etc;The core of the visualization method based on network data is the automatic layout algorithm,which draws the graph of network structure through automatic layout and calculation.It mainly strongly guides the layout,circular layout and grid layout,etc.It is commonly used to represent the large-scale social network structure,which is suitable for activity analysis,citation relationship,etc;Hierarchical visualization technology mainly includes node connection,space filling and hybrid methods,etc.it represents the data of hierarchical structure by drawing nodes and bounding boxes with different shapes.It is suitable for the discovery and mining of interactive relationships among group members,such as the interaction between online collaborative employees.Based on the analysis of data visualization CNKI research,this paper puts forward some points for attention in the process of data visualization,and points out that data visualization technology needs to focus on color matching and establish a relationship between color and the importance of data content;The visualization scheme shall reasonably combine and apply relevant visualization technologies based on business logic on the basis of meeting business needs;The unified visualization style helps to improve the coherence,consistency and efficiency of people's understanding of data;At the same time,It also takes into account the aesthetic requirements of users and establishes a reasonable matching relationship between style and color;Data visualization should focus on the practical,reasonable and efficient performance of key processes,key objectives and key results.This paper also summarizes the visualization application example Echarts,including the application of Echarts interactive components (markPoint and markLine annotation point components,datazoom area components,legend interactive components) in visualization,dynamic data rendering and so on.Finally,the challenges and future research directions of visualization are analyzed and prospected,and it is pointed out that virtual reality,visualization system and data analysis are the research directions of visualization in the future.Its application also includes statistical visualization,news visualization,thinking visualization,social network visualization and search log visualization.
- Published
- 2021
- Full Text
- View/download PDF
45. A Semi-Federated Active Learning Framework for Unlabeled Online Network Data
- Author
-
Yuwen Zhou, Yuhan Hu, Jing Sun, Rui He, and Wenjie Kang
- Subjects
network data ,federated learning ,unlabeled data ,heterogeneous data ,Mathematics ,QA1-939 - Abstract
Federated Learning (FL) is a newly emerged federated optimization technique for distributed data in a federated network. The participants in FL that train the model locally are classified into client nodes. The server node assumes the responsibility to aggregate local models from client nodes without data moving. In this regard, FL is an ideal solution to protect data privacy at each node of the network. However, the raw data generated on each node are unlabeled, making it impossible for FL to apply these data directly to train a model. The large volume of data annotating work prevents FL from being widely applied in the real world, especially for online scenarios, where the data are generated continuously. Meanwhile, the data generated on different nodes tend to be differently distributed. It has been proved theoretically and experimentally that non-independent and identically distributed (non-IID) data harm the performance of FL. In this article, we design a semi-federated active learning (semi-FAL) framework to tackle the annotation and non-IID problems jointly. More specifically, the server node can provide (i) a pre-trained model to help each client node annotate the local data uniformly and (ii) an estimation of the global gradient to help correct the local gradient. The evaluation results demonstrate our semi-FAL framework can efficiently handle unlabeled online network data and achieves high accuracy and fast convergence.
- Published
- 2023
- Full Text
- View/download PDF
46. Predicting phenotypes from brain connection structure.
- Author
-
Guha, Subharup, Jung, Rex, and Dunson, David
- Subjects
BRAIN anatomy ,LARGE-scale brain networks ,PREDICTION models ,REGRESSION analysis ,PHENOTYPES - Abstract
This article focuses on the problem of predicting a response variable based on a network‐valued predictor. Our motivation is the development of interpretable and accurate predictive models for cognitive traits and neuro‐psychiatric disorders based on an individual's brain connection network (connectome). Current methods reduce the complex, high‐dimensional brain network into low‐dimensional pre‐specified features prior to applying standard predictive algorithms. These methods are sensitive to feature choice and inevitably discard important information. Instead, we propose a nonparametric Bayes class of models that utilize the entire adjacency matrix defining brain region connections to adaptively detect predictive algorithms, while maintaining interpretability. The Bayesian Connectomics (BaCon) model class utilizes Poisson–Dirichlet processes to find a lower dimensional, bidirectional (covariate, subject) pattern in the adjacency matrix. The small n, large p problem is transformed into a 'small n, small q' problem, facilitating an effective stochastic search of the predictors. A spike‐and‐slab prior for the cluster predictors strikes a balance between regression model parsimony and flexibility, resulting in improved inferences and test case predictions. We describe basic properties of the BaCon model and develop efficient algorithms for posterior computation. The resulting methods are found to outperform existing approaches and applied to a creative reasoning dataset. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
47. Establishment of a food fraud database and analysis of fraud information based on network data in China.
- Author
-
Li, Heli, Cheng, Yaqing, Luo, Jiyang, Li, Li, and Wu, Yongning
- Subjects
FRAUD ,DATABASES ,INFORMATION networks ,CHINESE cooking ,FARM produce - Abstract
We collected Chinese food fraud events from 2001 to 2019, and initially established a database of 454 data sets based on China's national conditions. This database supplements the gaps in the internationally established economically motivated adulteration (EMA) database. Statistical results showed that the data reported by the media accounted for 71.6% of the total amount of food fraud information. Most fraud incidents were recorded in eleven product categories, e.g. agricultural products, wines, dairy and meat products. Product fraud (72.2%) was the first type ranked food fraud information. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
48. Networks of context: Three-layer socio-cultural mapping for a Verstehende network analysis.
- Author
-
Basov, Nikita and Kholodova, Darya
- Subjects
SOCIAL network analysis ,SOCIAL networks ,EUROPEAN art ,SOCIAL perception ,ACQUISITION of data - Abstract
• social network ties are co-constituted by their cultural contexts. • Verstehende network analysis links social ties to their cultural contexts via individual subjective meanings and practices. • three-layer socio-cultural mapping enables interpretive explanation of social ties in their cultural contexts. What social ties are and how they operate depends on the cultural context constitutive of their meaning. Pursuing an explanatory account for the cultural embeddedness of social ties, we draw on Verstehende sociology and rely on in-depth insight into subjective perceptions developed by social network actors throughout their practice to represent symbolic and material contexts of social ties structurally. We put forward a new mixed data collection and processing approach that ethnographically maps interconnected three-layer socio-cultural networks of individuals, signs, and material objects. Opening cultural contexts to application of formal and statistical techniques, this approach allows for an 'interpretive explanation' of social ties. Illustrating the approach with our own longitudinal study of five European art groups, we discuss the peculiarities of three-layer socio-cultural data collection and processing, the new discoveries enabled, the challenges encountered, the solutions we came up with, and the utility of this approach for conducting 'Verstehende network analysis' in various fields of application. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
49. Avoiding GIGO: Learnings from data collection in innovation research.
- Author
-
Roden, Bopha, Lusher, Dean, Spurling, Thomas H., Simpson, Gregory W., Klein, Till, Brailly, Julien, and Hogan, Bernie
- Subjects
ACQUISITION of data ,SENSE data ,PUBLIC universities & colleges ,RESEARCH teams ,POLYMERIZATION - Abstract
• Collection of good data is often plagued with trouble even with the best intentions. • Good data collection requires careful planning, but success is not always guaranteed. • Our key message to colleagues is "be flexible, be prepared and be agile". This paper follows a research project meant to focus on understanding how universities and public research organisations (PRO) collaborate with firms in order to innovate and develop products or services using the same technology, an invention called Controlled Radical Polymerisation (CRP). We say 'meant to' quite deliberately as this project was plagued with a range of data collection issues. We aim to give the reader a sense of the complications our research team faced as we share and highlight the issues we did not properly consider in the process of collecting our data, and the strategies we implemented to save the project and collect useful data. These issues included the benefits of the choice of a face-to-face methodology, using our own networks to recruit participants, the underestimated influence of secrecy when collaborating with industry on an innovation project, the value of having a "local champion" and having specific procedures in place for operational matters; but most of all the importance of being flexible and agile. We share the lessons we learned during this journey. Importantly, we seek to give some practical advice and a sense of the reality of data collection – a reality which is often smoothed over and written up as unproblematic in academic publications. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
50. Heuristic Network Similarity Measurement Model Based on Cloud Computing
- Author
-
Guo, Yang, Xu, Jia, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin (Sherman), Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Zhang, Yu-Dong, editor, Wang, Shui-Hua, editor, and Liu, Shuai, editor
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.