Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mark K. Goldberg is active.

Publication


Featured researches published by Mark K. Goldberg.


intelligence and security informatics | 2005

Efficient identification of overlapping communities

Jeffrey Baumes; Mark K. Goldberg; Malik Magdon-Ismail

In this paper, we present an efficient algorithm for finding overlapping communities in social networks. Our algorithm does not rely on the contents of the messages and uses the communication graph only. The knowledge of the structure of the communities is important for the analysis of social behavior and evolution of the society as a whole, as well as its individual members. This knowledge can be helpful in discovering groups of actors that hide their communications, possibly for malicious reasons. Although the idea of using communication graphs for identifying clusters of actors is not new, most of the traditional approaches, with the exception of the work by Baumes et al, produce disjoint clusters of actors, de facto postulating that an actor is allowed to belong to at most one cluster. Our algorithm is significantly more efficient than the previous algorithm by Baumes et al; it also produces clusters of a comparable or better quality.


intelligence and security informatics | 2010

Measuring behavioral trust in social networks

Sibel Adali; Robert Escriva; Mark K. Goldberg; Mykola Hayvanovych; Malik Magdon-Ismail; Boleslaw K. Szymanski; William A. Wallace; Gregory Todd Williams

Trust is an important yet complex and little understood aspect of the dyadic relationship between two entities. Trust plays an important role in the formation of coalitions in social networks and in determining how high value of information flows through the network. We present algorithmically quantifiable measures of trust based on communication behavior. We propose that trust results in likely communication behaviors which are statistically different from random communications; detecting these trust-like behaviors allows us to develop a quantitative measure of who trusts whom in the network. We develop algorithms to efficiently compute such behavioral trust and validate these measures on the Twitter network.


intelligence and security informatics | 2004

Discovering Hidden Groups in Communication Networks

Jeffrey Baumes; Mark K. Goldberg; Malik Magdon-Ismail; William A. Wallace

We describe models and efficient algorithms for detecting groups (communities) functioning in communication networks which attempt to hide their functionality – hidden groups. Our results reveal the properties of the background network activity that make detection of the hidden group easy, as well as those that make it difficult.


SIAM Journal on Discrete Mathematics | 1989

Constructing a maximal independent set in parallel

Mark K. Goldberg; Thomas H. Spencer

The problem of constructing in parallel a maximal independent set of a given graph is considered. A new deterministic NC-algorithm implemented in the EREW PRAM model is presented. On graphs with n vertices and m edges, it uses


Journal of Graph Theory | 1984

Edge-coloring of multigraphs: Recoloring technique

Mark K. Goldberg

O((n + m)/\log n)


Journal of Combinatorial Theory | 1981

Construction of class 2 graphs with maximum vertex degree 3

Mark K. Goldberg

processors and runs in


international conference on social computing | 2010

Finding Overlapping Communities in Social Networks

Mark K. Goldberg; Stephen Kelley; Malik Magdon-Ismail; Konstantin Mertsalov; Al Wallace

O(\log^3 n)


intelligence and security informatics | 2003

Locating hidden groups in communication networks using hidden Markov models

Malik Magdon-Ismail; Mark K. Goldberg; William A. Wallace; David Siebecker

time. This reduces by a factor of


international conference on social computing | 2010

Measuring Similarity between Sets of Overlapping Clusters

Mark K. Goldberg; Mykola Hayvanovych; Malik Magdon-Ismail

\log n


international world wide web conferences | 2012

Information cascades in social media in response to a crisis: a preliminary model and a case study

Cindy Hui; Yulia Tyshchuk; William A. Wallace; Malik Magdon-Ismail; Mark K. Goldberg

both the running time and the processor count of the previously fastest deterministic algorithm that solves the problem using a linear number of processors.

Collaboration


Dive into the Mark K. Goldberg's collaboration.

Top Co-Authors

Avatar

Malik Magdon-Ismail

Rensselaer Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

William A. Wallace

Rensselaer Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

Stephen Kelley

Rensselaer Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

Konstantin Mertsalov

Rensselaer Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hung-Ching Chen

Rensselaer Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

Jeffrey Baumes

Rensselaer Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

Cindy Hui

Rensselaer Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

Mykola Hayvanovych

Rensselaer Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge