To establish a standard system for geneticstudies on sheath blight resistance, a field testwas conducted at the experimental farm ofYangzhou University to compare several pro-cedures for inoculating rice plants with R...To establish a standard system for geneticstudies on sheath blight resistance, a field testwas conducted at the experimental farm ofYangzhou University to compare several pro-cedures for inoculating rice plants with R.solani Kuhn (RH9). The varieties used wereJasmine 85, Teqing (resistant or moderatelyresistant), and Lemont (susceptible). They展开更多
Influence maximization(IM)algorithms play a significant role in hypergraph analysis tasks,such as epidemic control analysis,viral marketing,and social influence analysis,and various IM algorithms have been proposed.Th...Influence maximization(IM)algorithms play a significant role in hypergraph analysis tasks,such as epidemic control analysis,viral marketing,and social influence analysis,and various IM algorithms have been proposed.The main challenge lies in IM algorithm evaluation,due to the complexity and diversity of the spreading processes of different IM algorithms in different hypergraphs.Existing evaluation methods mainly leverage statistical metrics,such as influence spread,to quantify overall performance,but do not fully unravel spreading characteristics and patterns.In this paper,we propose an exploratory visual analytics system,IMVis,to assist users in exploring and evaluating IM algorithms at the overview,pattern,and node levels.A spreading pattern mining method is first proposed to characterize spreading processes and extract important spreading patterns to facilitate efficient analysis and comparison of IM algorithms.Novel visualization glyphs are designed to comprehensively reveal both temporal and structural features of IM algorithms’spreading processes in hypergraphs at multiple levels.The effectiveness and usefulness of IMVis are demonstrated through two case studies and expert interviews.展开更多
Due to the prevalence of social network services, more and more attentions are paid to explore how information diffuses and users affect each other in these networks, which has a wide range of applications, such as vi...Due to the prevalence of social network services, more and more attentions are paid to explore how information diffuses and users affect each other in these networks, which has a wide range of applications, such as viral marketing, reposting prediction and social recommendation. Therefore, in this paper, we review the recent advances on information diffusion analysis in social networks and its applications. Specifically, we first shed light on several popular models to describe the information diffusion process in social networks, which enables three practical applications, i.e., influence evaluation, influence maximization and information source detection. Then, we discuss how to evaluate the authority and influence based on network structures. After that, current solutions to influence maximiza- tion and information source detection are discussed in detail, respectively. Finally, some possible research directions of information diffu- sion analysis are listed for further study.展开更多
文摘To establish a standard system for geneticstudies on sheath blight resistance, a field testwas conducted at the experimental farm ofYangzhou University to compare several pro-cedures for inoculating rice plants with R.solani Kuhn (RH9). The varieties used wereJasmine 85, Teqing (resistant or moderatelyresistant), and Lemont (susceptible). They
基金Zhejiang Provincial Natural Science Foundation of China(LQ22F020017)National Natural Science Foundation of China(62302137)Open Project Program of the State Key Lab of CAD&CG of Zhejiang University(A2104).
文摘Influence maximization(IM)algorithms play a significant role in hypergraph analysis tasks,such as epidemic control analysis,viral marketing,and social influence analysis,and various IM algorithms have been proposed.The main challenge lies in IM algorithm evaluation,due to the complexity and diversity of the spreading processes of different IM algorithms in different hypergraphs.Existing evaluation methods mainly leverage statistical metrics,such as influence spread,to quantify overall performance,but do not fully unravel spreading characteristics and patterns.In this paper,we propose an exploratory visual analytics system,IMVis,to assist users in exploring and evaluating IM algorithms at the overview,pattern,and node levels.A spreading pattern mining method is first proposed to characterize spreading processes and extract important spreading patterns to facilitate efficient analysis and comparison of IM algorithms.Novel visualization glyphs are designed to comprehensively reveal both temporal and structural features of IM algorithms’spreading processes in hypergraphs at multiple levels.The effectiveness and usefulness of IMVis are demonstrated through two case studies and expert interviews.
基金supported by National Natural Science Foundation of China(Nos.61703386,U1605251 and91546103)the Anhui Provincial Natural Science Foundation(No.1708085QF140)+1 种基金the Fundamental Research Funds for the Central Universities(No.WK2150110006)the Youth Innovation Promotion Association of Chinese Academy of Sciences(No.2014299)
文摘Due to the prevalence of social network services, more and more attentions are paid to explore how information diffuses and users affect each other in these networks, which has a wide range of applications, such as viral marketing, reposting prediction and social recommendation. Therefore, in this paper, we review the recent advances on information diffusion analysis in social networks and its applications. Specifically, we first shed light on several popular models to describe the information diffusion process in social networks, which enables three practical applications, i.e., influence evaluation, influence maximization and information source detection. Then, we discuss how to evaluate the authority and influence based on network structures. After that, current solutions to influence maximiza- tion and information source detection are discussed in detail, respectively. Finally, some possible research directions of information diffu- sion analysis are listed for further study.