Overview Of Various Overlapping Community Detection Approaches
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 7
Abstract
With the advancement in technology, we are surrounded with huge amount of data, which need to be processed in some manner for further processing. For this purpose, we may combine the Data Mining Techniques with the concepts of Graph Theory. Real world systems may be represented as Graphs. For example: Social Networks may be depicted as graph with the people as nodes and their relationships represented as links. Community Structure has been found as an important property of these systems. In simple words we can define community structure as a connected sub-graph which is tightly connected within the subgroups and weakly connected within the subgroups. Various algorithms have been proposed till now to identify and detect these community structures. In this paper we will provide the overview of some approaches which identify the overlapping communities i.e. communities that may belong to more than one subgroups.
Authors and Affiliations
Pooja Chaturvedi
Ubiquitous Computing-Approach to Intelligence Building
Ubiquitous computing (often abbreviated to “ubicomp”) refers to a new genre of computing in which the computer completely permeates the life of the user. In ubiquitous computing, computers become a helpful but invisible...
Cheapest Paths in Multi-Interface Networks A Distributed Approach
Let G = (V,E) be a graph which models a set of wireless devices (nodes V) that can communicate by means of multiple radio interfaces , according to activating the common interface rule at each node. Every Interface can b...
Modified route-maintenance in AODV Routing protocol using static nodes in realistic mobility model
One of the popular wireless network architectures is Mobile Ad Hoc Network (MANET). It can be easily deployed in every environment, without any underlying backbone and infrastructure support. MANET is a wireless network...
COCOMO model for software based on Open Source: Application to the adaptation of TRIADE to the university system
Today, within the software industry, Open Source Software has many qualities that need to be analyzed. This kind of software has gained a lot of attraction nowadays from researchers since it offers technical and economic...
Software Reliability Growth Models for the Safety Critical Software with Imperfect Debugging
In this paper, we will investigate how to perform he log-logistic testing-effort function (TEF) into different software reliability growth models based on non-homogeneous Poisson process (NHPP). The models parameters are...