Exploring foci of:
doi.org
SpotLight
July 2018 • Dhivya Eswaran, Christos Faloutsos, Sudipto Guha, Nina Mishra
How do we spot interesting events from e-mail or transportation logs? How can we detect port scan or denial of service attacks from IP-IP communication data? In general, given a sequence of weighted, directed or bipartite graphs, each summarizing a snapshot of activity in a time window, how can we spot anomalous graphs containing the sudden appearance or disappearance of large dense subgraphs (e.g., near bicliques) in near real-time using sublinear memory? To this end, we propose a randomized sketching-based appro…
Bipartite Graph
Computer Science
Snapshot (Computer Storage)
Theoretical Computer Science
Mathematics
Internet
Combinatorics
Algorithm
Database
The Dancers At The End Of Time
Hope Ii
The Ninth Wave
The Bureaucrats (1936 Film)
Main Page
The False Mirror
The Massacre At Chios
Weapons (2025 Film)
Squid Game Season 3
Technological Fix
Harvester Vase
Electronic Colonialism
Victoria Mboko
Lauren Sánchez
Jeff Bezos
Collective Action Problem
Shefali Jariwala
Hackers: Heroes Of The Computer Revolution