Access the full text.
Sign up today, get DeepDyve free for 14 days.
Henry Kautz, B. Selman, A. Milewski (1996)
Agent Amplified Communication
A. Zheng, A. Ng, Michael Jordan (2001)
Stable algorithms for link analysis
V. Bogaevski, A. Povzner (1991)
Matrix Perturbation Theory
(2005)
Enron Email Dataset Research
S. Carrière, R. Kazman (1997)
WebQuery: Searching and Visualizing the Web Through ConnectivityComput. Networks, 29
J. Kleinberg (1999)
Authoritative sources in a hyperlinked environment
R. Gennaro, Stanislaw Jarecki, H. Krawczyk, T. Rabin (1999)
Secure Distributed Key Generation for Discrete-Log Based CryptosystemsJournal of Cryptology, 20
Henry Kautz, B. Selman, Shah Mehul (1997)
Combining social networks and collaborative ?lteringCommunications of The ACM
Torben Pedersen (1991)
A Threshold Cryptosystem without a Trusted Party (Extended Abstract)
Soumen Chakrabarti, B. Dom, P. Raghavan, S. Rajagopalan, David Gibson, J. Kleinberg (1998)
Automatic Resource Compilation by Analyzing Hyperlink Structure and Associated TextComput. Networks, 30
G. Salton (1989)
Automatic Text Processing: The Transformation, Analysis, and Retrieval of Information by Computer
A. Newell (1993)
Mechanisms of Skill Acquisition and the Law of Practice
Enron email dataset. (http://www-2.cs.cmu.edu/~enron/) 14. Corrada-Emmanuel, A.: Enron email dataset research
David McDonald, M. Ackerman (1998)
Just talk to me: a field study of expertise location
P. Pirolli, J. Pitkow, R. Rao (1996)
Silk from a sow's ear: extracting usable structures from the WebProceedings of the SIGCHI Conference on Human Factors in Computing Systems
Tzuong-Tsieng Moh (2020)
Linear Algebra and Its Applications, 10
A. Ng, A. Zheng, Michael Jordan (2001)
Link Analysis, Eigenvectors and Stability
M. Schwartz, D. Wood (1993)
Discovering shared interests using graph analysisCommun. ACM, 36
Henry Kautz, B. Selman, Mehul Shah (1997)
Referral Web: combining social networks and collaborative filteringCommun. ACM, 40
J. Canny (2002)
Collaborative filtering with privacyProceedings 2002 IEEE Symposium on Security and Privacy
Pierre-Alain Fouque, J. Stern (2001)
One Round Threshold Discrete-Log Key Generation without Private Channels
S. Brin, Lawrence Page (1998)
The Anatomy of a Large-Scale Hypertextual Web Search EngineComput. Networks, 30
J. Canny, S. Sorkin (2004)
Practical Large-Scale Distributed Key Generation
A. Salomaa (1991)
Public-Key Cryptography, 23
E. Polak (1971)
Computational methods in optimization
(2005)
Enron Email Dataset
Link analysis algorithms have been used successfully on hyperlinked data to identify authoritative documents and retrieve other information. They also showed great potential in many new areas such as counterterrorism and surveillance. Emergence of new applications and changes in existing ones created new opportunities, as well as difficulties, for them: (1) In many situations where link analysis is applicable, there may not be an explicit hyperlinked structure. (2) The system can be highly dynamic, resulting in constant update to the graph. It is often too expensive to rerun the algorithm for each update. (3) The application often relies heavily on client-side logging and the information encoded in the graph can be very personal and sensitive. In this case privacy becomes a major concern. Existing link analysis algorithms, and their traditional implementations, are not adequate in face of these new challenges. In this paper we propose the use of a weighted graph to define and/or augment a link structure. We present a generalized HITS algorithm that is suitable for running in a dynamic environment. The algorithm uses the idea of “lazy update” to amortize cost across multiple updates while still providing accurate ranking to users in the mean time. We prove the convergence of the new algorithm and evaluate its benefit using the Enron email dataset. Finally we devise a distributed implementation of the algorithm that preserves user privacy thus making it socially acceptable in real-world applications.
Computational and Mathematical Organization Theory – Springer Journals
Published: Jan 1, 2005
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.