Advanced Review Bayesian Vertex Nomination Using Content and Context
نویسندگان
چکیده
Using attributed graphs to model network data has become an attractive approach for various graph inference tasks. Consider a network containing a small subset of interesting entities whose identities are not fully known and that discovering them will be of some significance. Vertex nomination, a subclass of recommender systems relying on the exploitation of attributed graphs, is a task which seeks to identify the unknown entities that are similarly interesting or exhibit analogous latent attributes. This task is a specific type of community detection and is increasingly becoming a subject of current research in many disciplines. Recent studies have shown that information relevant to this task is contained in both the structure of the network and its attributes, and that jointly exploiting them can provide superior vertex nomination performance than either one used alone. We adopt this new approach to formulate a Bayesian model for the vertex nomination problem. Specifically, the goal here is to construct a ‘nomination list’ where entities that are truly interesting are concentrated at the top of the list. Inference with themodel is conducted using a Metropolis-within-Gibbs algorithm. Performance of the model is illustrated by a Monte Carlo simulation study and on the well-known Enron email dataset. © 2015 Wiley Periodicals, Inc.
منابع مشابه
On the Consistency of the Likelihood Maximization Vertex Nomination Scheme: Bridging the Gap Between Maximum Likelihood Estimation and Graph Matching
Given a graph in which a few vertices are deemed interesting a priori, the vertex nomination task is to order the remaining vertices into a nomination list such that there is a concentration of interesting vertices at the top of the list. Previous work has yielded several approaches to this problem, with theoretical results in the setting where the graph is drawn from a stochastic block model (...
متن کاملVertex Nomination via Content and Context
If I know of a few persons of interest, how can a combination of human language technology and graph theory help me find other people similarly interesting? If I know of a few people committing a crime, how can I determine their co-conspirators? Given a set of actors deemed interesting, we seek other actors who are similarly interesting. We use a collection of communications encoded as an attri...
متن کاملComparison of Estimates Using Record Statistics from Lomax Model: Bayesian and Non Bayesian Approaches
This paper address the problem of Bayesian estimation of the parameters, reliability and hazard function in the context of record statistics values from the two-parameter Lomax distribution. The ML and the Bayes estimates based on records are derived for the two unknown parameters and the survival time parameters, reliability and hazard functions. The Bayes estimates are obtained based on conju...
متن کاملIdentity Representation Strategies used by English and EL2 Political Actors and Researchers
Previous literature on the study of identity representation in political discourse has been mainly concerned with the spoken discourse and the representation of self. However, the way different groups of political agents represent others’ identities across languages has not attracted much attention. Using Wodak’s (2007) Discourse Historical approach to CDA, the present study investigates the wa...
متن کاملThe modeling of body's immune system using Bayesian Networks
In this paper, the urinary infection, that is a common symptom of the decline of the immune system, is discussed based on the well-known algorithms in machine learning, such as Bayesian networks in both Markov and tree structures. A large scale sampling has been executed to evaluate the performance of Bayesian network algorithm. A number of 4052 samples wereobtained from the database of the Tak...
متن کامل