Filters








1,541 Hits in 4.5 sec

Admissible Hierarchical Clustering Methods and Algorithms for Asymmetric Networks [article]

Gunnar Carlsson, Facundo Mémoli, Alejandro Ribeiro, Santiago Segarra
2016 arXiv   pre-print
We leverage the fact that, for asymmetric networks, every admissible method must be contained between reciprocal and nonreciprocal clustering, and describe three families of intermediate methods.  ...  This paper characterizes hierarchical clustering methods that abide by two previously introduced axioms -- thus, denominated admissible methods -- and proposes tractable algorithms for their implementation  ...  The difference between reciprocal and nonreciprocal clustering for general asymmetric networks allows the existence of intermediate admissible methods.  ... 
arXiv:1607.06335v1 fatcat:7zppi6j5krbwzg24kkkq75bufi

Hierarchical clustering methods and algorithms for asymmetric networks

Gunnar Carlsson, Facundo Memoli, Alejandro Ribeiro, Santiago Segarra
2013 2013 Asilomar Conference on Signals, Systems and Computers  
This paper introduces hierarchical quasiclustering methods, a generalization of hierarchical clustering for asymmetric networks where the output structure preserves the asymmetry of the input data.  ...  We prove that a modified version of single linkage is the only admissible quasi-clustering method.  ...  Acknowledgments Work in this paper is supported by NSF CCF-0952867, AFOSR MURI FA9550-10-1-0567, DARPA GRAPHS FA9550-12-1-0416, AFOSR FA9550-09-0-1-0531, AFOSR FA9550-09-1-0643, NSF DMS 0905823, and NSF  ... 
doi:10.1109/acssc.2013.6810606 dblp:conf/acssc/CarlssonMRS13 fatcat:uilgfkzvuvgopf575oiua5pp7e

Axiomatic construction of hierarchical clustering in asymmetric networks

Gunnar Carlsson, Facundo Memoli, Alejandro Ribeiro, Santiago Segarra
2013 2013 IEEE International Conference on Acoustics, Speech and Signal Processing  
Two hierarchical clustering methods that abide to these axioms are derived: reciprocal and nonreciprocal clustering.  ...  We present an axiomatic construction of hierarchical clustering in asymmetric networks where the dissimilarity from node a to node b is not necessarily equal to the dissimilarity from node b to node a.  ...  VALUE AND TRANSFORMATION To study hierarchical clustering algorithms in the context of asymmetric networks, we start from two intuitive notions that we translate into the axioms of value and transformation  ... 
doi:10.1109/icassp.2013.6638658 dblp:conf/icassp/CarlssonMRS13 fatcat:ny3apdprezgkdhi3sk3kvhglg4

Alternative axiomatic constructions for hierarchical clustering of asymmetric networks

Gunnar Carlsson, Facundo Memoli, Alejandro Ribeiro, Santiago Segarra
2013 2013 IEEE Global Conference on Signal and Information Processing  
The authors have introduced an axiomatic construction for hierarchical clustering of asymmetric -i.e. weighted and directednetworks.  ...  Unilateral clustering is used to study internal migration in the United States. Index Terms-Clustering, asymmetric networks 978-1-4799-0248-4/13/$31.00  ...  By Theorem 4, given an asymmetric network (X, AX ), any hierarchical clustering method satisfying axioms (A1") and (A2) is contained between two methods.  ... 
doi:10.1109/globalsip.2013.6737010 dblp:conf/globalsip/CarlssonMRS13 fatcat:t5h3tq35ufefnfl5olpxk2znvy

Hierarchical Quasi-Clustering Methods for Asymmetric Networks [article]

Gunnar Carlsson, Facundo Mémoli, Alejandro Ribeiro, Santiago Segarra
2014 arXiv   pre-print
This paper introduces hierarchical quasi-clustering methods, a generalization of hierarchical clustering for asymmetric networks where the output structure preserves the asymmetry of the input data.  ...  We prove that a modified version of single linkage is the only admissible quasi-clustering method.  ...  Acknowledgments Work in this paper is supported by NSF CCF-0952867, AFOSR MURI FA9550-10-1-0567, DARPA GRAPHS FA9550-12-1-0416, AFOSR FA9550-09-0-1-0531, AFOSR FA9550-09-1-0643, NSF DMS 0905823, and NSF  ... 
arXiv:1404.4655v1 fatcat:tjrvglxzmvfarhvcebcoz5qfcm

Excisive Hierarchical Clustering Methods for Network Data [article]

Gunnar Carlsson, Facundo Mémoli, Alejandro Ribeiro, Santiago Segarra
2016 arXiv   pre-print
We introduce two practical properties of hierarchical clustering methods for (possibly asymmetric) network data: excisiveness and linear scale preservation.  ...  Moreover, we introduce the concept of representability, i.e. a generative model for describing clustering methods through the specification of their action on a collection of networks.  ...  A hierarchical clustering method H is admissible if it satisfies axioms (A1) and (A2). Two admissible methods of interest are reciprocal and nonreciprocal clustering.  ... 
arXiv:1607.06339v1 fatcat:bhtaqbyptfefdmkroxuq2oekmq

Axiomatic Construction of Hierarchical Clustering in Asymmetric Networks [article]

Gunnar Carlsson, Facundo Mémoli, Alejandro Ribeiro, Santiago Segarra
2014 arXiv   pre-print
The paper also develops algorithms for the computation of hierarchical clusters using matrix powers on a min-max dioid algebra and studies the stability of the methods proposed.  ...  Several admissible methods are constructed and two particular methods, termed reciprocal and nonreciprocal clustering, are shown to provide upper and lower bounds in the space of admissible methods.  ...  As it follows from Section VII, there are exist many (actually, infinitely many) different admissible hierarchical clustering algorithms for asymmetric networks.  ... 
arXiv:1301.7724v2 fatcat:mfyoakowqvhs7g2kiru4kwjygy

Robust Hierarchical Clustering for Directed Networks: An Axiomatic Approach [article]

Gunnar Carlsson, Facundo Mémoli, Santiago Segarra
2021 arXiv   pre-print
We provide a complete taxonomic characterization of robust hierarchical clustering methods for directed networks following an axiomatic approach.  ...  Our main result is to leverage this generative model to give a precise characterization of all robust -- i.e., excisive, linear scale preserving, and stable -- hierarchical clustering methods for directed  ...  The authors would like to thank Alejandro Ribeiro for his valuable technical input and his thoughtful comments on an earlier version of this manuscript.  ... 
arXiv:2108.07247v1 fatcat:njnr3n6xlnc57dshgpt7v2j2bm

Secure Hierarchical Routing Protocols in Wireless Sensor Networks: a Comparative Analysis

Ibrihich Ouafaa, Esghir Mustapha, Krit Salah-ddine, El Hajji Said
2016 International Journal of Software Engineering and Its Applications  
AKM [31] is an Authenticated Key Management scheme for hierarchical networks based on the random key pre-distribution.  ...  As sensor nodes may be easily captured and compromised, the classical cryptographic solutions become insufficient to provide optimal routing security, especially, for hierarchical WSNs, where cluster heads  ...  It can be inferred that scalability for all the secure clustered protocols are in the admissible range except EECBKM, Sec-Rout and SCMRP.  ... 
doi:10.14257/ijseia.2016.10.11.08 fatcat:6i6tftr66ffyhp222azwq3amyq

Editorial for Special Issue on Analysis of Asymmetric Relationships

Giuseppe Bove, Akinori Okada
2018 Advances in Data Analysis and Classification  
A key role in the development of models and methods for multidimensional scaling and cluster analysis has been played by John Gower. In two pioneering papers B Giuseppe Bove  ...  In the first article of this issue, entitled "Methods for the Analysis of Asymmetric Pairwise Relationships", Giuseppe Bove and Akinori Okada provide a brief review of models and methods of multidimensional  ...  clustering of asymmetric networks".  ... 
doi:10.1007/s11634-018-0315-4 fatcat:epcba75zzbcmbpif64gd6zqqoi

Algorithms for Interference Minimization in Future Wireless Network Decomposition [article]

Péter L. Erdős, Tamás Róbert Mezei, Yiding Yu, Xiang Chen, Wei Han, Bo Bai
2021 arXiv   pre-print
We propose a simple and fast method for providing a high quality solution for the sum-interference minimization problem.  ...  As future networks are deployed in high density urban areas, improved clustering methods are needed to provide low interference network connectivity.  ...  CONCLUSION AND FURTHER CONSIDERATIONS This paper proposed a similarity based hierarchical clustering method for simple-and-fast wireless network decomposition in future wireless networks, with the goal  ... 
arXiv:2111.00885v1 fatcat:6af33g73pbhunmybeglnkyb5jy

Energy Efficient, Lifetime Improving and Secure Periodic Data Collection Protocol for Wireless Sensor Networks

Anuja P, Raju S
2016 International Journal on Computational Science & Applications  
This proposed method increases the network lifetime there by reducing the total traffic load.  ...  This protocol uses artificial intelligence (AI) based A* heuristic search algorithm to establish energy efficient admissible optimal path to sink in terms of high residual energy, minimum hop counts and  ...  In hierarchical routing technique all the routing sensors in the network are clustered and a cluster head collects and aggregates the data and checks for redundancy of the data that is collected before  ... 
doi:10.5121/ijcsa.2016.6301 fatcat:42owwtdm6ngtnnnwj6gw6fj7zm

Survey on Various Clustering Techniques in Data Mining and its Comparative Study for Sundry Data

Nausheen Naaz
2019 International Journal for Research in Applied Science and Engineering Technology  
Clustering algorithms can be used to find natural grouping and exploring data that is generated.  ...  In this paper, a review of clustering and its different techniques in data mining along with a comparative studies among clustering algorithms, is covered.  ...  , hierarchical and model based clustering algorithms.  ... 
doi:10.22214/ijraset.2019.5342 fatcat:bdqsgrkkf5hkdj5xgf6uhd3sp4

Unraveling S P500 stock volatility and networks – An encoding-and-decoding approach [article]

Xiaodong Wang, Fushing Hsieh
2021 arXiv   pre-print
In the decoding phase, we computationally seek for locations of change points via estimations based on a new searching algorithm in conjunction with the information criterion applied on the observed collection  ...  Finally, volatility dynamic of every single stock of S&P500 is revealed, and a stock network is consequently established to represent dependency relations derived through concurrent volatility states among  ...  The decoding error rate is calculated and compared for the proposed algorithm and the HMM.  ... 
arXiv:2101.09395v3 fatcat:yhwzadewhfezvlf6fxikmxdt3y

Security Issues and Solutions in Wireless Sensor Networks

Rutuja Jadhav, Vatsala V.
2017 International Journal of Computer Applications  
In this paper, we identify the threats and vulnerabilities to WSNs and summarize the defense methods based on the networking protocol layer analysis first.  ...  As such, there has been an increasing need to define and develop simulation frameworks for carrying out high-fidelity WSN simulation.  ...  or Hierarchical Sensor Networks: Some researchers utilize the special structure in physical or logical cluster or hierarchical sensor networks in order to provide more efficient secure routing algorithms  ... 
doi:10.5120/ijca2017913256 fatcat:xkjnmdihh5bitpm66p5klr6gfa
« Previous Showing results 1 — 15 out of 1,541 results