Class_11_14_02 - Statistical Data Mining ORIE 474 Fall 2007 Tatiyana Apanasovich Link Analysis What is Link Analysis Technique for drawing

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Statistical Data Mining ORIE 474 Fall 2007 Tatiyana Apanasovich 11/14/07 Link Analysis
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What is Link Analysis? Technique for drawing conclusions about linked data Specifically, a set of nodes linked by relations Hyperlink data, citation data Link analysis is important in web searching PageRank, HITS algorithms There are many other applications Law enforcement, threat detection
Background image of page 2
Crime and Terrorism Asymmetric warfare Police vs. organized crime US vs. terrorists Consider the activity of clandestine organizations Members try to evade detection Actions taken by group might seem harmless, but when linked together could constitute a threat Phone calls, bank transactions, fertilizer purchases We can use link analysis to detect the actions of these organizations
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Obstacles Massive data Primary evidence From news sources and intelligence agencies Secondary evidence Latent data (phone calls, bank transactions) Noise Almost all secondary data is irrelevant Incomplete information
Background image of page 4
Assumption The organization’s behavior is goal-driven Behavior is structured Occurs over a long duration (months to years) Involves several people The behavior is a logical execution of a plan
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Case-Based Reasoning Generate spanning case base from evidence Covers the full range of possible plans Generated from a domain theory and a simulator Detecting plans amounts to a search through case memory for the case that is consistent with a subset of data Use abstraction to reduce case base size Sending an e-mail could be equivalent to a phone conversation, for example
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/23/2009 for the course ORIE 474 at Cornell University (Engineering School).

Page1 / 27

Class_11_14_02 - Statistical Data Mining ORIE 474 Fall 2007 Tatiyana Apanasovich Link Analysis What is Link Analysis Technique for drawing

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online