Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management 2014
DOI: 10.1145/2661829.2662075
|View full text |Cite
|
Sign up to set email alerts
|

Sampling Triples from Restricted Networks using MCMC Strategy

Abstract: In large networks, the connected triples are useful for solving various tasks including link prediction, community detection, and spam filtering. Existing works in this direction concern mostly with the exact or approximate counting of connected triples that are closed (aka, triangles). Evidently, the task of triple sampling has not been explored in depth, although sampling is a more fundamental task than counting, and the former is useful for solving various other tasks, including counting. In recent years, s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 14 publications
(19 citation statements)
references
References 24 publications
0
19
0
Order By: Relevance
“…However, Rahman et al did not use IS in their solution, they rather have used MH algorithm. Their solution, named Vertex‐MCMC, works as follows: Use MH algorithm to design a random walk whose stationarity distribution π()d()2.…”
Section: Triangle Counting In Restricted Access Scenariomentioning
confidence: 99%
See 4 more Smart Citations
“…However, Rahman et al did not use IS in their solution, they rather have used MH algorithm. Their solution, named Vertex‐MCMC, works as follows: Use MH algorithm to design a random walk whose stationarity distribution π()d()2.…”
Section: Triangle Counting In Restricted Access Scenariomentioning
confidence: 99%
“…We further consider two of the restricted access‐based methods: random walk over nodes with importance weight adjustment hereby named as randWalk _ importance (Eq. (14)), and ‘vertexMCMC’, i.e., MCMC walk over nodes. We implement all the above methods ourself by using identical graph data structures and edge existence query module.…”
Section: Experimental Comparisonsmentioning
confidence: 99%
See 3 more Smart Citations