Social Network Analysis: Tasks and Tools Steven Loscalzo and Lei Yu Department of Computer Science Watson School of Engineering and Applied Science State.

Slides:



Advertisements
Similar presentations
Community Detection and Graph-based Clustering
Advertisements

Data Mining and Text Analytics GATE, by Joel Bywater.
Components of GIS.
Farewell to ICT or evolving ICT into Computing? Phil Bagge code-it.co.uk.
A SOFTWARE TOOL DEVELOPED FOR THE CLASSIFICATION OF REMOTE SENSING SPECTRAL REFLECTANCE DATA Abdullah Faruque School of Computing & Software Engineering.
1 SWE Introduction to Software Engineering Lecture 13 – System Modeling.
What is a protocol? 1.set of rules governing communications 2.the etiquette of diplomacy and affairs of state 3.a movie starring Goldie Hawn 4.all of the.
Text Classification: An Implementation Project Prerak Sanghvi Computer Science and Engineering Department State University of New York at Buffalo.
Data Analysis (and User Interaction) GEOG 463 5/7/04.
User Interfaces for DGRC Steven Feiner Surabhan Temiyabutr Department of Computer Science Columbia University New York, NY 10027
Chapter 1: The Database Environment and Development Process
Objectives Explain the purpose and various phases of the traditional systems development life cycle (SDLC) Explain when to use an adaptive approach to.
Generation of WEB SERVICES Using PROGRAM SLICING RAVINDRA KUMAR SUDIP AKURA AMIT KUMAR BALKARAN SINGH SIDHU
Business Intelligence
What are the functions of an operating system? The operating system is the core software component of your computer. It performs many functions and is,
Deerfield High School STEM Presentation CAREERS IN SOCIAL BUSINESS.
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
CS598CXZ Course Summary ChengXiang Zhai Department of Computer Science University of Illinois, Urbana-Champaign.
5.1 © 2007 by Prentice Hall 5 Chapter Foundations of Business Intelligence: Databases and Information Management.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Noadswood Science,  Information Wednesday, September 09, 2015.
9/13/20151 Threads ICS 240: Operating Systems –William Albritton Information and Computer Sciences Department at Leeward Community College –Original slides.
Tennessee Technological University1 The Scientific Importance of Big Data Xia Li Tennessee Technological University.
Avalanche Internet Data Management System. Presentation plan 1. The problem to be solved 2. Description of the software needed 3. The solution 4. Avalanche.
Department of Electrical Engineering and Computer Science University of Central Florida Fall 2014.
The Program Development Cycle
Chapter 1 Introduction to Data Mining
Expert Group for Virtual Reality in Transport, Manufacturing and Logistics Virtual Reality in Transport, Manufacturing and Logistics VIRTUAL REALITY IN.
Introduction to Text and Web Mining. I. Text Mining is part of our lives.
Minors in Information System Dr. Feng Liu Department of Mathematics, Sciences and Information System.
Software Engineering Chapter 16 User Interface Design Ku-Yaw Chang Assistant Professor Department of Computer Science and Information.
Social Networks in Most Visible Form. Social Networking Techniques in Business Several social networking techniques can help us in reaching maximum number.
5 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 5 Social Network Analysis: Techniques to Discover How Work Really Gets Done.
VLDB Demo WISE-Integrator: A System for Extracting and Integrating Complex Web Search Interfaces of the Deep Web Hai He, Weiyi Meng, Clement Yu, Zonghuan.
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Chapter 5: Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization DECISION SUPPORT SYSTEMS AND BUSINESS.
C. Lawrence Zitnick Microsoft Research, Redmond Devi Parikh Virginia Tech Bringing Semantics Into Focus Using Visual.
A project from the Social Media Research Foundation: Finding direction in a sea of connection:
CyberInfrastructure for Network Analysis Importance of, contributions by network analysis Transformation of NA Support needed for NA.
Steve Smalley 5/21/12 Hour 4.  Design and develop software  Use computer science and mathematics to test and evaluate software applications  Design.
INTRODUCTION GORT is a virtual 3D modeling environment for computer programmers. Its main area of focus is to aid in the education of programmers learning.
1 COMPUTER SCIENCE DEPARTMENT COLORADO STATE UNIVERSITY 1/9/2008 SAXS Software.
June 13-15, 2007Policy 2007 Infrastructure-aware Autonomic Manager for Change Management H. Abdel SalamK. Maly R. MukkamalaM. Zubair Department of Computer.
A RESEARCH SUPPORT SYSTEM FRAMEWORK FOR WEB DATA MINING Jin Xu, Yingping Huang, Gregory Madey Department of Computer Science and Engineering University.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Modeling with Rational Rose Huzefa Kagdi Software Development Laboratory Department of Computer Science Kent State University Kent Ohio, USA.
1 Intelligent Information System Lab., Department of Computer and Information Science, Korea University Semantic Social Network Analysis Kyunglag Kwon.
Introduction to UML and Rational Rose UML - Unified Modeling Language Rational Rose 98 - a GUI tool to systematically develop software through the following.
By Matt Bogard, M.S. Coordinator, Market Research Instructor, Department of Economics Western Kentucky University.
Data Science Interview Questions 1.What do you mean by word Data Science? Data Science is the extraction of knowledge from large.
Applying Adaptive Software Development (ASD) Agile Modeling on Predictive Data Mining Applications: ASD-DM Methodology M. Alnoukari 1 Z.Alzoabi 2 S.Hanna.
Lecture-6 Bscshelp.com. Todays Lecture  Which Kinds of Applications Are Targeted?  Business intelligence  Search engines.
Zachary Starr Dept. of Computer Science, University of Missouri, Columbia, MO 65211, USA Digital Image Processing Final Project Dec 11 th /16 th, 2014.
Social Networks Analysis
Tutorial: Big Data Algorithms and Applications Under Hadoop
Data Mining 101 with Scikit-Learn
Datamining : Refers to extracting or mining knowledge from large amounts of data Applications : Market Analysis Fraud Detection Customer Retention Production.
TASK 4 Guideline.
Introduction to Software Engineering
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
What's New in eCognition 9
Web Mining Department of Computer Science and Engg.
Background Prepared by: Mr. Mahmoud Rafeek Alfarra.
Data Warehousing Data Mining Privacy
orange.biolab.si A general-purpose open source component-based
Core Methods in Educational Data Mining
What's New in eCognition 9
Representing Higher-order Dependencies in Networks: Hands-on Tasks
Presentation transcript:

Social Network Analysis: Tasks and Tools Steven Loscalzo and Lei Yu Department of Computer Science Watson School of Engineering and Applied Science State University of New York at Binghamton

Networks Above: Flickr users network Left: Relationship Network

Tasks in SNA  Traditional SNA consists of tasks that measure structural properties of networks Centrality Measures: degree, betweenness, closeness, eigenvector Community Measures: cliques, cores, clans  Visualization analysis involves the creation of meaningful depictions of networks  Link mining describes contemporary analytical methods that apply data mining techniques to networks Link based object classification, link existence prediction, group detection…

Evaluated Tools  Selected based on diverse environments Stand alone software packages Code libraries Web Based interfaces  Well known and widely available