Abstract is missing.
- MalSpot: Multi2 Malicious Network Behavior Patterns AnalysisChing-Hao Mao, Chung-Jung Wu, Evangelos E. Papalexakis, Christos Faloutsos, Kuo-Chen Lee, Tien-Cheu Kao. 1-14 [doi]
- Extracting Diverse Patterns with Unbalanced Concept HierarchyMittapally Kumara Swamy, P. Krishna Reddy, Somya Srivastava. 15-27 [doi]
- Efficiently Depth-First Minimal Pattern MiningArnaud Soulet, François Rioult. 28-39 [doi]
- Fast Vertical Mining of Sequential Patterns Using Co-occurrence InformationPhilippe Fournier-Viger, Antonio Gomariz, Manuel Campos, Rincy Thomas. 40-52 [doi]
- Balancing the Analysis of Frequent PatternsArnaud Giacometti, Dominique Haoyuan Li, Arnaud Soulet. 53-64 [doi]
- Balanced Seed Selection for Budgeted Influence Maximization in Social NetworksShuo Han, Fuzhen Zhuang, Qing He, Zhongzhi Shi. 65-77 [doi]
- Persistent Community Detection in Dynamic Social NetworksSiyuan Liu, Shuhui Wang, Ramayya Krishnan. 78-89 [doi]
- Detecting and Analyzing Influenza Epidemics with Social Media in ChinaFang Zhang, Jun Luo, Chao Li, Xin Wang, Zhongying Zhao. 90-101 [doi]
- Analyzing Location Predictability on Location-Based Social NetworksDefu Lian, Yin Zhu, Xing Xie, Enhong Chen. 102-113 [doi]
- ReadBehavior: Reading Probabilities Modeling of Tweets via the Users' Retweeting BehaviorsJianguang Du, Dandan Song, Lejian Liao, Xin Li, Li Liu, Guoqiang Li 0003, Guanguo Gao, Guiying Wu. 114-125 [doi]
- Inferring Strange Behavior from Connectivity Pattern in Social NetworksMeng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, Shiqiang Yang. 126-138 [doi]
- Inferring Attitude in Online Social Networks Based on Quadratic CorrelationCong Wang 0002, Andrei A. Bulatov. 139-150 [doi]
- Hash-Based Stream LDA: Topic Modeling in Social StreamsAnton Slutsky, Xiaohua Hu, Yuan An. 151-162 [doi]
- Two Sides of a Coin: Separating Personal Communication and Public Dissemination Accounts in TwitterPeifeng Yin, Nilam Ram, Wang-Chien Lee, Conrad S. Tucker, Shashank Khandelwal, Marcel Salathé. 163-175 [doi]
- Latent Features Based Prediction on New Users' TastesMing-Chu Chen, Hung-Yu Kao. 176-187 [doi]
- Supervised Nonlinear Factorizations Excel In Semi-supervised RegressionJosif Grabocka, Erind Bedalli, Lars Schmidt-Thieme. 188-199 [doi]
- Learning from Crowds under Experts' SupervisionQingyang Hu, Qinming He, Hao Huang, Kevin Chiew, Zhenguang Liu. 200-211 [doi]
- A Robust Classifier for Imbalanced DatasetsSori Kang, Kotagiri Ramamohanarao. 212-223 [doi]
- Signed-Error Conformal RegressionHenrik Linusson, Ulf Johansson, Tuve Löfström. 224-236 [doi]
- Multi-Instance Learning from Positive and Unlabeled BagsJia Wu, Xingquan Zhu, Chengqi Zhang, Zhihua Cai. 237-248 [doi]
- Mining Contrast SubspacesLei Duan, Guanting Tang, Jian Pei, James Bailey, Guozhu Dong, Akiko Campbell, Changjie Tang. 249-260 [doi]
- Forward Classification on Data StreamsPeng Wang, Peng Zhang, Yanan Cao, Li Guo, Binxing Fang. 261-272 [doi]
- Shingled Graph Disassembly: Finding the Undecideable PathRichard Wartell, Yan Zhou, Kevin W. Hamlen, Murat Kantarcioglu. 273-285 [doi]
- Collective Matrix Factorization of Predictors, Neighborhood and Targets for Semi-supervised ClassificationLucas Rego Drumond, Lars Schmidt-Thieme, Christoph Freudenthaler, Artus Krohn-Grimberghe. 286-297 [doi]
- Ranking Tweets with Local and Global Consistency Using Rich FeaturesZhankun Huang, Shenghua Liu, Pan Du, Xueqi Cheng. 298-309 [doi]
- Fast Triangle Core Decomposition for Mining Large GraphsRyan A. Rossi. 310-322 [doi]
- Super-Graph ClassificationTing Guo, Xingquan Zhu. 323-336 [doi]
- Subtopic Mining via Modifier Graph ClusteringHaitao Yu, Fuji Ren. 337-347 [doi]
- Net-Ray: Visualizing and Mining Billion-Scale GraphsU. Kang, Jay Yoon Lee, Danai Koutra, Christos Faloutsos. 348-361 [doi]
- Structure-Aware Distance Measures for Comparing Clusterings in GraphsJeffrey Chan, Nguyen Xuan Vinh, Wei Liu, James Bailey, Christopher Leckie, Kotagiri Ramamohanarao, Jian Pei. 362-373 [doi]
- Efficiently and Fast Learning a Fine-grained Stochastic Blockmodel from Large NetworksXuehua Zhao, Bo Yang 0002, Hechang Chen. 374-385 [doi]
- Influence Propagation: Patterns, Model and a Case StudyYibin Lin, Agha Ali Raza, Jay Yoon Lee, Danai Koutra, Roni Rosenfeld, Christos Faloutsos. 386-397 [doi]
- Overlapping Communities for Identifying Misbehavior in Network CommunicationsFarnaz Moradi, Tomas Olovsson, Philippas Tsigas. 398-409 [doi]
- Fault-Tolerant Concept Detection in Information NetworksTobias Kötter, Stephan Günnemann, Michael R. Berthold, Christos Faloutsos. 410-421 [doi]
- Characterizing Temporal Anomalies in Evolving NetworksN. N. R. Ranga Suri, M. Narasimha Murty, Gopalasamy Athithan. 422-433 [doi]
- An Integrated Model for User Attribute Discovery: A Case Study on Political Affiliation IdentificationSwapna Gottipati, Minghui Qiu, Liu Yang, Feida Zhu, Jing Jiang. 434-446 [doi]
- Programmatic Buying Bidding Strategies with Win Rate and Winning Price Estimation in Real Time Mobile AdvertisingXiang Li, Devin Guan. 447-460 [doi]
- Self-training Temporal Dynamic Collaborative FilteringCheng Luo, Xiongcai Cai, Nipa Chowdhury. 461-472 [doi]
- Data Augmented Maximum Margin Matrix Factorization for Flickr Group RecommendationLiang Chen, Yilun Wang, Tingting Liang, Lichuan Ji, Jian Wu. 473-484 [doi]
- A Graph Matching Method for Historical Census Household LinkageZhichun Fu, Peter Christen, Jun Zhou. 485-496 [doi]
- Intervention-Driven Predictive Framework for Modeling Healthcare DataSantu Rana, Sunil Kumar Gupta, Dinh Q. Phung, Svetha Venkatesh. 497-508 [doi]
- Visual Analysis of Uncertainty in TrajectoriesLu Lu, Nan Cao, Siyuan Liu, Lionel M. Ni, Xiaoru Yuan, Huamin Qu. 509-520 [doi]
- Activity Recognition Using a Few Label SamplesHeidar Davoudi, Xiao-Li Li, Minh Nhut Nguyen, Shonali Priyadarsini Krishnaswamy. 521-532 [doi]
- A Framework for Large-Scale Train Trip Record Analysis and Its Application to Passengers' Flow Prediction after Train AccidentsDaisaku Yokoyama, Masahiko Itoh, Masashi Toyoda, Yoshimitsu Tomita, Satoshi Kawamura, Masaru Kitsuregawa. 533-544 [doi]
- Patent Evaluation Based on Technological Trajectory Revealed in Relevant Prior PatentsSooyoung Oh, Zhen Lei, Wang-Chien Lee, John Yen. 545-556 [doi]
- Deferentially Private Tagging Recommendation Based on Topic ModelTianqing Zhu, Gang Li, Wanlei Zhou, Ping Xiong, Cao Yuan. 557-568 [doi]
- Matrix Factorization without User Data RetentionDavid Vallet, Arik Friedman, Shlomo Berkovsky. 569-580 [doi]
- Privacy-Preserving Collaborative Anomaly Detection for Participatory SensingSarah M. Erfani, Yee Wei Law, Shanika Karunasekera, Christopher Leckie, Marimuthu Palaniswami. 581-593 [doi]
- Privacy Preserving Publication of Locations Based on Delaunay TriangulationJun Luo, Jinfei Liu, Li Xiong. 594-605 [doi]
- A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule MiningChangyu Dong, Liqun Chen. 606-617 [doi]