Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Rajan Lukose is active.

Publication


Featured researches published by Rajan Lukose.


Physical Review E | 2001

Search in power-law networks

Lada A. Adamic; Rajan Lukose; Amit Puniyani; Bernardo A. Huberman

Many communication and social networks have power-law link distributions, containing a few nodes that have a very high degree and many with low degree. The high connectivity nodes play the important role of hubs in communication and networking, a fact that can be exploited when designing efficient search algorithms. We introduce a number of local search strategies that utilize high degree nodes in power-law graphs and that have costs scaling sublinearly with the size of the graph. We also demonstrate the utility of these strategies on the GNUTELLA peer-to-peer network.


international conference on data mining | 2008

One-Class Collaborative Filtering

Rong Pan; Yunhong Zhou; Bin Cao; Nathan Nan Liu; Rajan Lukose; Martin B. Scholz; Qiang Yang

Many applications of collaborative filtering (CF), such as news item recommendation and bookmark recommendation, are most naturally thought of as one-class collaborative filtering (OCCF) problems. In these problems, the training data usually consist simply of binary data reflecting a users action or inaction, such as page visitation in the case of news item recommendation or webpage bookmarking in the bookmarking scenario. Usually this kind of data are extremely sparse (a small fraction are positive examples), therefore ambiguity arises in the interpretation of the non-positive examples. Negative examples and unlabeled positive examples are mixed together and we are typically unable to distinguish them. For example, we cannot really attribute a user not bookmarking a page to a lack of interest or lack of awareness of the page. Previous research addressing this one-class problem only considered it as a classification task. In this paper, we consider the one-class problem under the CF setting. We propose two frameworks to tackle OCCF. One is based on weighted low rank approximation; the other is based on negative example sampling. The experimental results show that our approaches significantly outperform the baselines.


international conference on electronic commerce | 2007

Vindictive bidding in keyword auctions

Yunhong Zhou; Rajan Lukose

We study vindictive bidding, a strategic bidding behavior in keyword auctions where a bidder forces his competitor to pay more without affecting his own payment. We show that most Nash equilibria (NE) are vulnerable to vindictive bidding and are thus unstable. There always exists a pure strategy Nash equilibrium (PSNE) if there is only one pair of vindictive players; however PSNE may not exist when there are at least three players who are all vindictive with each other. Given the set of vindictive bidding pairs, we show how to compute a PSNE if one exists. Preliminary data analysis suggests that vindictive bidding is prevalent in real-world keyword auctions. As an ongoing work, we also propose several interesting open problems related to vindictive bidding.


international world wide web conferences | 2003

SHOCK: communicating with computational messages and automatic private profiles

Rajan Lukose; Eytan Adar; Joshua Rogers Tyler; Caesar Sengupta

A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or instant messages, they make possible a number of useful applications. In this paper, we describe a general and flexible messaging system called SHOCK that extends the functionality of prior computational email systems by allowing XML-encoded SHOCK messages to interact with an automatically created profile of a user. These profiles consist of information about the most common tasks users perform, such as their Web browsing behavior, their conventional email usage, etc. Since users are sensitive about such data, the system is designed with privacy as a central design goal, and employs a distributed peer-to-peer architecture to achieve it. The system is largely implemented with commodity Web technologies and provides both a Web interface as well as one that is tightly integrated with users ordinary email clients. With SHOCK, users can send highly targeted messages without violating others privacy, and engage in structured conversation appropriate to the context without disrupting their existing work practices. We describe our implementation in detail, the most useful novel applications of the system, and our experiences with the system in a pilot field test.


international world wide web conferences | 2008

Budget constrained bidding in keyword auctions and online knapsack problems

Yunhong Zhou; Deeparnab Chakrabarty; Rajan Lukose


knowledge discovery and data mining | 2008

Learning user purchase intent from user-centric data

Rajan Lukose; Jiye Li; Jing Zhou; Satyanarayana Raju Penmetsa


arXiv: Disordered Systems and Neural Networks | 2002

Local search in unstructured networks

Lada A. Adamic; Rajan Lukose; Bernardo A. Huberman


Archive | 2004

Ranking results for network search query

Eytan Adar; Li Zhang; Lada A. Adamic; Rajan Lukose


Archive | 2006

Method and system for tracking conversions in a system for targeted data delivery

Rajan Lukose; Ravigopal Vennelakanti


Archive | 2004

Systems and methods of interfacing an advertisement with a message presentation client

Rajan Lukose; Joshua Rogers Tyler

Collaboration


Dive into the Rajan Lukose's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Eytan Adar

University of Michigan

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge