Modeling user and topic interactions in social networks using Hawkes processes
Journal Title: EAI Endorsed Transactions on Cloud Systems - Year 2015, Vol 1, Issue 3
Abstract
We present in this paper a framework to model information diffusion in social networks based on linear multivariate Hawkes processes. Our model exploits the effective broadcasting times of information by users, which guarantees a more realistic view of the information diffusion process. The proposed model takes into consideration not only interactions between users but also interactions between topics, which provides a deeper analysis of influences in social networks. We provide an estimation algorithm based on nonnegative matrix factorization techniques, which together with a dimensionality reduction argument is able to discover, in addition, the latent community structure of the social network. We also provide several numerical results of our method.
Authors and Affiliations
Julio Cesar Louzada Pinto, Tijani Chahed
Dimensionality Reduction for Handwritten Digit Recognition
Human perception of dimensions is usually limited to two or three degrees. Any further increase in the number of dimensions usually leads to the difficulty in visual imagination for any person. Hence, machine learning rese...
A Dynamic Self-adaptive Resource-Load Evaluation Method in Cloud Computing
Cloud resource and its load have dynamic characteristics. To address this challenge, a dynamic self-adaptive evaluation method (termed SDWM) is proposed in this paper. SDWM uses some dynamic evaluation indicators to eval...
PETFEN: A Performance Evaluation Tool for Flow-Level Network Modeling of Ethernet Networks
We present in this paper PETFEN, a Performance Evaluation Tool for Flow-level network modeling of Ethernet Networks. Flow-level network models are a useful tool to dimension and predict various performances of networks w...
Welcome message for the Special issue on: IoT-as-a- Service from the Editors-in-Chief
On behalf of the Editorial board, we welcome you to the inaugural issue of the ICST Transactions on IoT-asa-Service! We are delighted to launch this new transactions journal after a preparatory process that has receiv...
Authenticated Mobile Groups To Secure The Backhaul: A New Paradigm And Challenges
In this paper, it is proposed to use group communication cryptographic protocols as a new security paradigm. This new paradigm aims at redesigning the security of small cell communications over an insecure mobile backhau...