Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Embedding Complex Networks

View through CrossRef
<p>Graph embedding is a transformation of nodes of a graph into a set of vectors. A good embedding should capture the graph topology, node-to-node relationship, and other relevant information about the graph. The main challenge at hand is to ensure that embeddings describe the properties of the graph well. As a result, selecting the best embedding is a challenging task and very often requires domain experts.</p> <p>In this thesis, we implement a series of extensive experiments with selected graph embedding algorithms, both on real-world and artificial networks. We conclude from these experiments that <strong>Node2Vec </strong>is the general best choice of algorithm, but that there is no single winner in all tests. Therefore, our main recommendation for practitioners is, if possible, to generate several embeddings for a problem at hand and use a general framework that provides a tool for an unsupervised graph embedding comparison.</p>
Ryerson University Library and Archives
Title: Embedding Complex Networks
Description:
<p>Graph embedding is a transformation of nodes of a graph into a set of vectors.
A good embedding should capture the graph topology, node-to-node relationship, and other relevant information about the graph.
The main challenge at hand is to ensure that embeddings describe the properties of the graph well.
As a result, selecting the best embedding is a challenging task and very often requires domain experts.
</p> <p>In this thesis, we implement a series of extensive experiments with selected graph embedding algorithms, both on real-world and artificial networks.
We conclude from these experiments that <strong>Node2Vec </strong>is the general best choice of algorithm, but that there is no single winner in all tests.
Therefore, our main recommendation for practitioners is, if possible, to generate several embeddings for a problem at hand and use a general framework that provides a tool for an unsupervised graph embedding comparison.
</p>.

Related Results

An Efficient ZZW Construction Using Low-Density Generator-Matrix Embedding Techniques
An Efficient ZZW Construction Using Low-Density Generator-Matrix Embedding Techniques
A novel steganographic algorithm based on ZZW construction is proposed to improve the steganographic embedding efficiency. Low-density generator-matrix (LDGM) embedding is an effic...
Information-Theoretic Limits for Steganography in Multimedia
Information-Theoretic Limits for Steganography in Multimedia
<pre>Steganography in multimedia aims to embed secret data into an innocent multimedia cover object. The embedding introduces some distortion to the cover object and produces...
Effective Attributed Network Embedding with Information Behavior Extraction
Effective Attributed Network Embedding with Information Behavior Extraction
Abstract Network embedding has shown its effectiveness in many tasks such as link prediction, node classification, and community detection. Most attributed network embeddin...
Effective attributed network embedding with information behavior extraction
Effective attributed network embedding with information behavior extraction
Network embedding has shown its effectiveness in many tasks, such as link prediction, node classification, and community detection. Most attributed network embedding methods consid...
An Unsupervised Learning Method for Attributed Network Based on Non-Euclidean Geometry
An Unsupervised Learning Method for Attributed Network Based on Non-Euclidean Geometry
Many real-world networks can be modeled as attributed networks, where nodes are affiliated with attributes. When we implement attributed network embedding, we need to face two type...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Information-Theoretic Bounds for Steganography in Multimedia
Information-Theoretic Bounds for Steganography in Multimedia
<p>Steganography in multimedia aims to embed secret data into an innocent looking multimedia cover object. This embedding introduces some distortion to the cover object and p...
Information-Theoretic Bounds for Steganography in Multimedia
Information-Theoretic Bounds for Steganography in Multimedia
<p>Steganography in multimedia aims to embed secret data into an innocent looking multimedia cover object. This embedding introduces some distortion to the cover object and p...

Back to Top