Current IssuePrevious Issue   Next Issue

Volume 18 No. 4
05 August 2013

Yizhou Sun,Jiawei Han

2013, 18(4): 329-338.   doi:10.1109/TST.2013.6574671
Abstract ( 28 HTML ( 0   PDF(543KB) ( 30 )   Save

Information networks that can be extracted from many domains are widely studied recently. Different functions for mining these networks are proposed and developed, such as ranking, community detection, and link prediction. Most existing network studies are on homogeneous networks, where nodes and links are assumed from one single type. In reality, however, heterogeneous information networks can better model the real-world systems, which are typically semi-structured and typed, following a net...

Po Hu,Minlie Huang,Xiaoyan Zhu

2013, 18(4): 339-352.   doi:10.1109/TST.2013.6574672
Abstract ( 23 HTML ( 0   PDF(514KB) ( 27 )   Save

Patents are critically important for a company to protect its core business concepts and proprietary technologies. Effective patent mining in massive patent databases not only provides business enterprises with valuable insights to develop strategies for research and development, intellectual property management, and product marketing, but also helps patent offices to improve efficiency and optimize their patent examination processes. This paper describes the patent mining problem of automati...

Fulan Qian,Yanping Zhang,Yuan Zhang,Zhen Duan

2013, 18(4): 353-359.   doi:10.1109/TST.2013.6574673
Abstract ( 33 HTML ( 0   PDF(385KB) ( 28 )   Save

Collaborative Filtering (CF) is a commonly used technique in recommendation systems. It can promote items of interest to a target user from a large selection of available items. It is divided into two broad classes: memory-based algorithms and model-based algorithms. The latter requires some time to build a model but recommends online items quickly, while the former is time-consuming but does not require pre-building time. Considering the shortcomings of the two types of algorithms, we propos...

Shu Zhao,Chen Rui,Yanping Zhang

2013, 18(4): 360-368.   doi:10.1109/TST.2013.6574674
Abstract ( 25 HTML ( 0   PDF(365KB) ( 40 )   Save

Mining from ambiguous data is very important in data mining. This paper discusses one of the tasks for mining from ambiguous data known as multi-instance problem. In multi-instance problem, each pattern is a labeled bag that consists of a number of unlabeled instances. A bag is negative if all instances in it are negative. A bag is positive if it has at least one positive instance. Because the instances in the positive bag are not labeled, each positive bag is an ambiguous. The mining aim is ...

Jin Zhou,Liang Hu,Feng Wang,Huimin Lu,Kuo Zhao

2013, 18(4): 369-378.   doi:10.1109/TST.2013.6574675
Abstract ( 42 HTML ( 0   PDF(1649KB) ( 39 )   Save

The Internet of Things (IoT) implies a worldwide network of interconnected objects uniquely addressable, via standard communication protocols. The prevalence of IoT is bound to generate large amounts of multisource, heterogeneous, dynamic, and sparse data. However, IoT offers inconsequential practical benefits without the ability to integrate, fuse, and glean useful information from such massive amounts of data. Accordingly, preparing us for the imminent invasion of things, a tool called data...

Feng Tan,Li Li,Zheyu Zhang,Yunlong Guo

2013, 18(4): 379-386.   doi:10.1109/TST.2013.6574676
Abstract ( 30 HTML ( 0   PDF(1514KB) ( 36 )   Save

With the development of the social media and Internet, discovering latent information from massive information is becoming particularly relevant to improving user experience. Research efforts based on preferences and relationships between users have attracted more and more attention. Predictive problems, such as inferring friend relationship and co-author relationship between users have been explored. However, many such methods are based on analyzing either node features or the network struct...

Le Yu,Bin Wu,Bai Wang

2013, 18(4): 387-397.   doi:10.1109/TST.2013.6574677
Abstract ( 24 HTML ( 0   PDF(2758KB) ( 40 )   Save

Recently, complex networks have attracted considerable research attention. Community detection is an important problem in the field of complex networks and is useful in a variety of applications such as information propagation, link prediction, recommendation, and marketing. In this study, we focus on discovering overlapping community structures by using link partitions. We propose a Latent Dirichlet Allocation (LDA)-Based Link Partition (LBLP) method, which can find communities with an adjus...

Yanhua Yu,Meina Song,Yu Fu,Junde Song

2013, 18(4): 398-405.   doi:10.1109/TST.2013.6574678
Abstract ( 37 HTML ( 0   PDF(1942KB) ( 38 )   Save

Traffic prediction plays an integral role in telecommunication network planning and network optimization. In this paper, we investigate the traffic forecasting for data services in 3G mobile networks. Although the Box-Jenkins model has been proven to be appropriate for voice traffic (since the arrival of calls follows a Poisson distribution), it has been demonstrated that the Internet traffic exhibits statistical self-similarity and has to be modeled using the Fractional AutoRegressive Integr...

Zhen Chen,Lingyun Ruan,Junwei Cao,Yifan Yu,Xin Jiang

2013, 18(4): 406-417.   doi:10.1109/TST.2013.6574679
Abstract ( 27 HTML ( 0   PDF(1105KB) ( 19 )   Save

The archiving of Internet traffic is an essential function for retrospective network event analysis and forensic computer communication. The state-of-the-art approach for network monitoring and analysis involves storage and analysis of network flow statistic. However, this approach loses much valuable information within the Internet traffic. With the advancement of commodity hardware, in particular the volume of storage devices and the speed of interconnect technologies used in network adapte...

Jianlin Xu,Yifan Yu,Zhen Chen,Bin Cao,Wenyu Dong,Yu Guo,Junwei Cao

2013, 18(4): 418-427.   doi:10.1109/TST.2013.6574680
Abstract ( 11 HTML ( 0   PDF(2184KB) ( 15 )   Save

With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Internet, the apps replace the PC client software as the major target of malicious usage. In this paper, to improve the security status of current mobile apps, we propose a methodology to evaluate mobile apps based on cloud computing platform and data mining. We also present a prototy...