Bai Xuan Wang

Bai Xuan Wang
Beijing University of Posts and Telecommunications | BUPT

About

96
Publications
12,350
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,135
Citations

Publications

Publications (96)
Article
In the field of social network analysis, information diffusion is a focus of current research. Taking into account the real topological relations among the participants and the psychological characteristics of the users, in this paper, a hotspot propagation model based on heterogeneous mean field and evolutionary games is proposed. First, in real s...
Article
In view of the complex relationships involved in network structures, as well as the Markovian nature of information diffusion and the complexity of diffusion paths in social hotspots, we introduce and optimize a basic structure in social networks—the triad. A group behavior diffusion model is proposed based on the optimal triadic structure and fact...
Article
Community detection is a pivotal task in data mining, and users' emotional behaviors have an important impact on today's society. So it is very significant for society management or marketing strategies to detect emotional communities in social networks. Based on the emotional homophily of users in social networks, it could confirm that users would...
Article
Hierarchical addressing (HA) is a crucial component of the Internet for routing scalability. Recently, the global routing table size shows an explosive growth. To solve the scalability issue, some solutions propose to use HA in a global deployment way. However, it may cause some Autonomous System (AS) being assigned with massive prefixes. This coul...
Conference Paper
We study the problem of link prediction in coupled networks, where we have the structure information of one (source) network and the interactions between this network and another (target) network. The goal is to predict the missing links in the target network. The problem is extremely challenging as we do not have any information of the target netw...
Article
Full-text available
With the broad application of web 2.0 technology, various kinds of online social networks arise at present. The emergence of social networks not only helps the public to facilitate the sharing and communicating, but also helps them to know more new friends from cyberspace social circle. Therefore, friends recommendation becomes a critical function...
Article
Information flows in a network where individuals influence each other. In this paper, we study the influence maximization problem of finding a small subset of nodes in a social network that could maximize the spread of influence. We propose a novel information diffusion model CTMC-ICM, which introduces the theory of Continuous-Time Markov Chain (CT...
Article
Full-text available
Social status, referred to as the relative rank or position that an individual holds in a social hierarchy, is known to be one of the most important motivating forces in social behaviors. However, we have limited knowledge of how social status drives human behaviors in society, which have dynamic effects on promotion or demotion of individual statu...
Article
It is known that the social network is an excellent source for gathering the emotions of people. There are thousands of micro-blogs posted in every second and every micro-blog that may contain a variety of user's emotions. The users' collective emotional behaviors are with great impacts on today's societies, so it is good to find groups for society...
Conference Paper
Complex networks have attracted much research attentions. Community detection is an important problem in complex network which is useful in a variety of applications such as information propagation, link prediction, recommendations and marketing. In this paper, we focus on discovering overlapping community structure using link partition. We propose...
Article
Recently, complex networks have attracted considerable research attention. Community detection is an important problem in the field of complex networks and is useful in a variety of applications such as information propagation, link prediction, recommendation, and marketing. In this study, we focus on discovering overlapping community structures by...
Conference Paper
In online social network, users are much more likely to be influenced by their neighbor nodes and/or connected nodes which have comment interesting. Consequently, the nodes in social network are more easily to accepted the forwarded/recommended online applications from their familiar/trusted nodes. Although most online application have their own pr...
Conference Paper
Currently the increasing prevalence of multi-homing and traffic engineering leads to an explosive growth of the global routing table. It is well known that hierarchical addressing could improve the routing scalability. Hence, some proposals exploring the routing architecture for future Internet reuse the hierarchical addressing for the locator assi...
Article
In order to meet the requirements of standardization of virtualization in cloud computing platform, improve the flexibility and expansibility of the system and enhance the capability of management-control of the platform, by means of introducing the features of decoupling and semantic of metadata, a Metadata-driven Cloud Computing Application Virtu...
Article
Detecting communities of complex networks has been an effective way to identify substructures that could correspond to important functions. Conventional approaches usually consider community detection as a single-objective optimization problem, which may confine the solution to a particular community structure property. Recently, a new community de...
Article
Full-text available
In vehicular networks, the multihop message delivery from information source to moving vehicles presents a challenging task due to many factors, including high mobility, frequent disconnection, and real-time requirement for applications. In this paper, we propose a moving target oriented opportunistic routing algorithm in vehicular networks for mes...
Conference Paper
In network analysis research domain, since a lot of object and their relations are modeled as networks or graphs, network science provides a significant tool and an indispensible platform to track their complexity. Graphs exhibit a very special property: community structure. In this paper, we propose a novel community detection method in directed g...
Article
Full-text available
This paper studies the human behavior in the top-one social network system in China (Sina Microblog system). By analyzing real-life data at a large scale, we find that the message releasing interval (intermessage time) obeys power law distribution both at individual level and at group level. Statistical analysis also reveals that human behavior in...
Article
Full-text available
The increasing development of social networks provides a unique source for analyzing human dynamics in the modern age. In this paper, we analyze the top-one Internet forum in China (“Tianya Club”) and identify the statistical properties of hotspots, which can promptly reflect the crowd events in people's real-life. Empirical observations indicate t...
Conference Paper
This paper focus on the relationship between projects that have same participants. A definition of projects collaborative relationship has been presented, and a projects collaborative network model is constructed. By mining and analyzing more than 10000 projects from sourceforge.net, we find that the projects collaborative relationship of software...
Article
Making accurate recommendations for users has become an important function of e-commerce system with the rapid growth of WWW. Conventional recommendation systems usually recommend similar objects, which are of the same type with the query object without exploring the semantics of different similarity measures. In this paper, we organize objects in...
Article
Telecom BI(Business Intelligence) system consists of a set of application programs and technologies for gathering, storing, analyzing and providing access to data, which contribute to manage business information and make decision precisely. However, traditional analysis algorithms meet new challenges as the continued exponential growth in both the...
Article
Full-text available
This paper has two aims. First, we clarify the belief that many Chinese firms have operated quite successfully both onshore and offshore by following cost-cutting strategies, through process efficiency rather than innovation. Second, we explain the reasons why Chinese firms are not all innovative by means of a review of empirical studies, as well a...
Article
Because the information exchange between peers of P2P application system is limitted by the real network topology, effective resource scheduling technology becoming an important issue. Without change to peers' reciprocity and self-organization, an optimization method based on ant colony algorithm for P2P resource scheduling is proposed. The task of...
Article
Over the last few years, online forums have gained massive popularity and have become one of the most influential web social media in our times. The forum document corpus can be seemed to be composed of various topics evolved over time, and every topics is reflected on a volume of keywords and social actors. In this paper, we attempt to study the i...
Conference Paper
Link prediction is an important issue in social network analysis. It aims at estimating the likelihood of the existence of links between nodes by the known network information. Although this problem has been extensively studied, many significant factors about how to calculate the similarity between two nodes remains unexplored and largely open, esp...
Article
Since the birth of the concept of Content Based Image Retrieval, it has been a hot issue of computer vision and pattern recognition subject. In the information age, with the rapid growth of the data, how can we retrieval image quickly and accurately from the vast amounts of image data become a problem. This paper proposes a method of applying the M...
Article
Telecommunication data analysis has been often used as a background application to motivate many problems. However, traditional analysis algorithms meet new challenges, as the continued exponential growth in both the volume and the complexity of telecom data. With respect to this challenge, a new class of techniques and computing framework, such as...
Conference Paper
A large number of works have been made to apply P2P techniques into services discovery. However, most of them only focus on matching the functional properties. This paper proposed a web QoS Model, which is based on the content addressable network. In this model, we use the non-functional properties values to match web service, and the service match...
Article
This paper proposed an improved Chord model called AF-Chord, which is based on the adjusted constructor for Finger Table, and give out its routing algorithm. While constructing the Finger Table, we have considered the using of the redundancy table entries, and provide a improved routing algorithm. Through simulation experiment, we can prove that in...
Conference Paper
Full-text available
Multi-label learning aims at predicting potentially multiple labels for a given instance. Conventional multi-label learning approaches focus on exploiting the label correlations to improve the accuracy of the learner by building an individual multi-label learner or a combined learner based upon a group of single-label learners. However, the general...
Article
The rapid growth of data promotes the development of parallel computing. MapReduce, which is a simplified programming model of distributed parallel computing, is becoming more and more popular. In this paper, we design and implementation of parallel statistical algorithm based on Hadoop's MapReduce model. The algorithm, which is used to grasp the o...
Conference Paper
Link prediction in complex networks is an important issue in graph mining. It aims at estimating the likelihood of the existence of links between nodes by the know network structure information. Currently, most link prediction algorithms based on local information consider only the individual characteristics of common neighbors. In this paper, firs...
Conference Paper
Most of the existing literature which has entirely focused on clustering nodes in large-scale networks. To discover multi-scale overlapping communities quickly, we propose a highly efficient multi-resolution link community detection algorithm to detect the link communities in massive networks based on the idea of edge labeling. First, we will get t...
Conference Paper
Most of trustworthy web service selection simply focus on individual reputation and ignore the collaboration reputation between services. To enhance the collaboration trust during web service selection, a reputation model called collaboration reputation is proposed. The reputation model is built on web service collaboration network(WSCN), which is...
Article
To solve the disadvantage that huge amount of web service impose on, web service management framework based on Hadoop environment is proposed. In this framework, Hadoop Distributed File System (HDFS) function as a foundation for supporting the HBase and MapReduce. The HBase is assigned to manage the functional and non-functional properties extracte...
Article
Understanding the individual behavior has shown to be of paramount importance to the triumph of the telecommunication operators to retain customers, enhance their purchasing capacity, and predict the churn rate. Different behavior patterns can be observed for different groups of users. Hence, there is an interesting problem posted in telecommunicat...
Conference Paper
Community mining has been the focus of many recent efforts on complex networks, and the genetic algorithm with low time-complexity is widely used in this discipline. To enhance the performance of genetic algorithm for community detection, the modified crossover operators which are more suitable for community detection is proposed in this paper, and...
Conference Paper
Full-text available
In order to promote efficiency of electronic business operating, the newly founded three Telecom operators in China began to reconstruct their CRM of OSS (Operation Support Systems) which offering full telecom service including Fixed and Mobile telephone services. Aiming to support continuous release of new telecom products and services, it is nece...
Conference Paper
To efficiently support customers to find web service which satisfies the non-functional requirement, a distributed quality of service (QoS) index framework is proposed in this paper. The framework consists of two kinds of structured distributed system, one is chord overlay network which is assigned to classify the web services according to the simi...
Conference Paper
Full-text available
In the light of rapid development of technology/knowledge intensive firms arising from the emerging economy of China in recent time, this paper is aimed at developing an analytical framework, based on the institutional theory and resource-based view, to evaluate the drivers and antecedents of technology innovation among Chinese emerging multination...
Conference Paper
In this paper, we present a multi-level empirical study of locality structures of several temporal call graphs containing both mobile and fixed-line call graphs emphasizing on comparing the patterns of these two types of call graphs. We investigate the topological patterns of the cohesive subgraphs in a mesoscopic scale, and we find several novel p...
Conference Paper
Full-text available
With the emergence of massive social media, massive social networks have led to a huge interest in data analysis. In this paper, we propose an empirical study on several massive social networks including 4 mobile call graphs, a fixed-line call graph, two co-authorship networks and two Email networks. We find that call graphs tend to be more localit...
Article
DNS is one of the most important fundamental services on the internet, so people are taking more and more attention to its security. At present, the study on DNS security is mainly about protocol security, whereas all problems involved in DNS security are largely influenced by its structure. The article discussed an available alternative scheme of...
Conference Paper
Full-text available
Recently, a growing number of researches have focused on the issues raised by the knowledge discovery of online information, particularly the problems of tracking topics, ideas, and users' spreading influence across the Web. In this paper, the search-engine query logs on Topic Detection and Tracking (TDT) is analyzed other than study of the quality...
Conference Paper
Currently, community detection has led to a huge interest in data analysis on real-world networks. However, the high computationally demanding of most community detection algorithms limits their applications. In this paper, we propose a heuristic algorithm to extract the community structure in large networks based on local community attractive forc...
Article
We study the problem of automatically extracting semantic information network and social network from the online forum. We describe an efficient system called INEOF which is capable of processing millions of forum posts in a few hours. We also introduce some applications, including topic detection and opinion leader detection based on social networ...
Article
Complex network analysis has received increasing interest in recent years, which provides a remarkable tool to describe complex systems of interacting entities, particular for biological systems. In this paper, we propose a methodology for identifying the significant nodes of the networks, including core nodes, bridge nodes and high-influential nod...
Conference Paper
With the rapid development of Information Technology such as Web 2.0, the internet is getting more interactive which supplying more information of individuals and social community composed of individuals for market analysis in enterprises. A new Social CRM Tool framework based on complex network analysis technologies aiming to offer better marketin...
Conference Paper
Full-text available
The average shortest path length is one of the most important and frequent-invoked characteristics of real-world complex networks. However, the high time complexity of the algorithms prevents us to apply them to calculate the average shortest path lengths in real-world massive networks. In this paper, we present an empirical study of the vertex-ver...
Conference Paper
Analysis of real communication network's performance after node fault has always been the research hotpots of network resilience and fault node location. In this article, we adopt four different fault generation policies to network dataset including real communication networks and simulated networks. Experiments focus on the relationship between fa...
Article
Structure mining plays an important part in the researches in biology, physics, internet or telecommunications in recently emerging network science. As a main task in this area, the problem of maximal clique enumeration has attracted much interest and been studied in variant avenues in prior works. However, most of these works mainly rely on single...
Conference Paper
Structure mining plays an important part in the researches in biology, physics, Internet and telecommunications in recently emerging network science. As a main task in this area, the problem of structure mining on graph has attracted much interest and been studied in variant avenues in prior works. However, most of these works mainly rely on single...
Conference Paper
The continued exponential growth in both the volume and the complexity of information, compared with the computing capacity of the silicon-based devices restricted by Moore’s Law, is giving birth to a new challenge to the specific requirements of analysts, researchers and intelligence providers. With respect to this challenge, a new class of techni...
Article
Most contemporary multi-objective evolutionary algorithms (MOEAs) store and handle a population with a linear list, and this may impose high computational complexities on the comparisons of solutions and the fitness assignment processes. This paper presents a data structure for storing the whole population and their dominating information in MOEAs....
Conference Paper
Full-text available
By the structure of call graphs derived from huge amounts of Call Detail Records, we can find out the social communities in the call graphs and make different market strategies for these social communities in real telecom applications. However, traditional telecom business intelligence methods are short of ways to understand the social interactions...
Article
Recent studies on social network have spurred significant interests in human behaviors. Nowadays, various kinds of interpersonal human interactions, from mobile calls to emails, provide particular avenues to explore the inherent properties of communication patterns. In this article, we present a comprehensive study on a massive anonymous call recor...
Article
Researchers have done considerable work on the structure of social network recently, but mostly neglected the correlation between two connected nodes. In this paper, our primary goal is to acquire users’ structural properties in mobile call networks. We take a novel perspective-structure correlation between two connected users perspective to study...
Conference Paper
Recent graph-theoretic approaches have demonstrated remarkable success for ranking networked entities, including degree, closeness, betweenness, etc. They are mainly considering the local link factors only, while not so much work concentrates on the social influence ranking based on the local structure in social network. In this paper, two new soci...
Conference Paper
So far researchers have done a large amount of work on the structure of social network, but neglected the correlation between two connected nodes from structure perspective. In this paper, our primary goal is to acquire structural properties and detect anomalies in mobile call networks. In order to investigate the structural properties, we define s...
Conference Paper
Full-text available
Detecting the community of complex networks became the hot research fields of Graph Ming in recent years and most community detecting methods current try to find correct community structure basing on optimization of Modularity Q. In this article, the author constructs a new theoretic model of Q based on information entropy by simulation and evaluat...
Conference Paper
Contrary to previous static knowledge, our dynamic view in social network is so limited. Recent uncovering those hidden dynamic patterns has posed a series of challenging problems in network evolution. To make effective exploration, we present a fundamentally novel framework for uncovering the intricate properties of evolutionary networks. Differen...
Conference Paper
Full-text available
ABSTRACT The structure of customer,communication,network,provides us a natural way,to understand customers’ relationships. Traditional customer relationship management,(CRM) methods,focus on vari- ous customer profitability models, and they are short of ways to un- derstand the social interactions. Graph mining and social network analysis provide w...
Conference Paper
Community detection and tracking in social network is an important research area for many applications which are widely applied in complex systems. Recently there has been a surge of investigation in this area, fueled largely by interest in social networks, but also by interest in bibliographic citations and telecommunication records. However, due...
Conference Paper
Full-text available
The structure of customer communication network provides us the insights into the function of customers' relationships. In this paper, we use egocentric social network to explore how people manage their personal and group communications over time. Our primary goal is that our findings can provide business insights and help devise strategies for tel...
Conference Paper
Full-text available
Given a real, and weighted person-to-person network which changes over time, what can we say about the cliques that it contains? Do the incidents of communication, or weights on the edges of a clique follow any pattern? Real, and in-person social networks have many more triangles than chance would dictate. As it turns out, there are many more cliqu...
Conference Paper
Full-text available
In the mobile call mini challenge of VAST 2008 contest, we explored the temporal communication patterns of Catalano/Vidro social network which is reflected in the mobile call data. We focus on detecting the hierarchy of the social network and try to get the important actors in it. We present our tools and methods in this summary. By using the visua...
Conference Paper
As acquiring and retaining the most profitable customers are challenging tasks of service providers, various CRM tools are used to support these processes. Traditional CRM methods focus on various customer profitability models in different scenarios based on their past profit contribution. Social network analysis provides a natural way to understan...
Chapter
Efficient enumeration of all maximal cliques in a given graph has many applications in the filed of Graph Theory, Social Network Analysis, Bioinformatics and etc. Recent researches indicate that many networks in our world are complex networks involving massive data. Being as the complete sub-graph, a maximal clique can represent a group of friends...
Conference Paper
Although information visualization technologies are indispensable in complex data analysis, wide-spread tools still need to be developed, as successful information visualization applications often require domain-specific customization. In this paper we introduce a software framework JSNVA for network visual analysis in different applications. JSNVA...
Conference Paper
An interesting property of network is that the information is not only contained in the entities, but also in the links between them. As the structure of the co-authorship network can greatly influence its function and reflect how the internal information is exchanged. We attempt to get deep insight of the features in a co-authorship network at a u...
Article
Full-text available
With the rapidly growing evidence that various systems in nature and society can be modeled as complex networks, community detection in networks becomes a hot research topic in physics, sociology, computer society, etc. Although this investigation of community structures has motivated many diverse algorithms, most of them are unsuitable when dealin...
Article
Full-text available
Recent researches have discovered that rich interactions among entities in nature and society bring about complex networks with community structures. Although the investigation of the community structures has promoted the development of many successful algorithms, most of them only find separated communities, while for the vast majority of real-wor...
Conference Paper
Many systems in nature and human society take the form of networks with community structures. In this paper, we describe a simple algorithm COCD(Clique-based Overlapping Community Detection) to efficiently mine the overlapping communities in large-scale networks, which is useful for us to have a better understanding of the nested sub-structures emb...
Chapter
The knowledge organizations have already deployed or are deploying their Knowledge Management systems. And the knowledge service is the key mechanism for knowledge sharing in an organization. There are two mechanisms to implement knowledge service: “Pull” and “Push”. The “Push” mechanism is widely used to push the right knowledge to the right perso...