Rajan Lukose
Hewlett-Packard
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Rajan Lukose.
Physical Review E | 2001
Lada A. Adamic; Rajan Lukose; Amit Puniyani; Bernardo A. Huberman
Many communication and social networks have power-law link distributions, containing a few nodes that have a very high degree and many with low degree. The high connectivity nodes play the important role of hubs in communication and networking, a fact that can be exploited when designing efficient search algorithms. We introduce a number of local search strategies that utilize high degree nodes in power-law graphs and that have costs scaling sublinearly with the size of the graph. We also demonstrate the utility of these strategies on the GNUTELLA peer-to-peer network.
international conference on data mining | 2008
Rong Pan; Yunhong Zhou; Bin Cao; Nathan Nan Liu; Rajan Lukose; Martin B. Scholz; Qiang Yang
Many applications of collaborative filtering (CF), such as news item recommendation and bookmark recommendation, are most naturally thought of as one-class collaborative filtering (OCCF) problems. In these problems, the training data usually consist simply of binary data reflecting a users action or inaction, such as page visitation in the case of news item recommendation or webpage bookmarking in the bookmarking scenario. Usually this kind of data are extremely sparse (a small fraction are positive examples), therefore ambiguity arises in the interpretation of the non-positive examples. Negative examples and unlabeled positive examples are mixed together and we are typically unable to distinguish them. For example, we cannot really attribute a user not bookmarking a page to a lack of interest or lack of awareness of the page. Previous research addressing this one-class problem only considered it as a classification task. In this paper, we consider the one-class problem under the CF setting. We propose two frameworks to tackle OCCF. One is based on weighted low rank approximation; the other is based on negative example sampling. The experimental results show that our approaches significantly outperform the baselines.
international conference on electronic commerce | 2007
Yunhong Zhou; Rajan Lukose
We study vindictive bidding, a strategic bidding behavior in keyword auctions where a bidder forces his competitor to pay more without affecting his own payment. We show that most Nash equilibria (NE) are vulnerable to vindictive bidding and are thus unstable. There always exists a pure strategy Nash equilibrium (PSNE) if there is only one pair of vindictive players; however PSNE may not exist when there are at least three players who are all vindictive with each other. Given the set of vindictive bidding pairs, we show how to compute a PSNE if one exists. Preliminary data analysis suggests that vindictive bidding is prevalent in real-world keyword auctions. As an ongoing work, we also propose several interesting open problems related to vindictive bidding.
international world wide web conferences | 2003
Rajan Lukose; Eytan Adar; Joshua Rogers Tyler; Caesar Sengupta
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or instant messages, they make possible a number of useful applications. In this paper, we describe a general and flexible messaging system called SHOCK that extends the functionality of prior computational email systems by allowing XML-encoded SHOCK messages to interact with an automatically created profile of a user. These profiles consist of information about the most common tasks users perform, such as their Web browsing behavior, their conventional email usage, etc. Since users are sensitive about such data, the system is designed with privacy as a central design goal, and employs a distributed peer-to-peer architecture to achieve it. The system is largely implemented with commodity Web technologies and provides both a Web interface as well as one that is tightly integrated with users ordinary email clients. With SHOCK, users can send highly targeted messages without violating others privacy, and engage in structured conversation appropriate to the context without disrupting their existing work practices. We describe our implementation in detail, the most useful novel applications of the system, and our experiences with the system in a pilot field test.
international world wide web conferences | 2008
Yunhong Zhou; Deeparnab Chakrabarty; Rajan Lukose
knowledge discovery and data mining | 2008
Rajan Lukose; Jiye Li; Jing Zhou; Satyanarayana Raju Penmetsa
arXiv: Disordered Systems and Neural Networks | 2002
Lada A. Adamic; Rajan Lukose; Bernardo A. Huberman
Archive | 2004
Eytan Adar; Li Zhang; Lada A. Adamic; Rajan Lukose
Archive | 2006
Rajan Lukose; Ravigopal Vennelakanti
Archive | 2004
Rajan Lukose; Joshua Rogers Tyler