{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:50Z","timestamp":1750306190443,"version":"3.41.0"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2016,8,1]],"date-time":"2016-08-01T00:00:00Z","timestamp":1470009600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGKDD Explor. Newsl."],"published-print":{"date-parts":[[2016,8]]},"abstract":"<jats:p>We report on the Second Workshop on Mining Networks and Graphs held at the 2015 SIAM International Conference on Data Mining. This half-day workshop consisted of a keynote talk, four technical paper presentations, one demonstration, and a panel on future challenges in mining large networks. We summarize the main highlights of the workshop, including expanded written summaries of the future challenges provided by the panelists. The current and future challenges discussed at the workshop and elaborated here provide valuable guidance for future research in the field<\/jats:p>","DOI":"10.1145\/2980765.2980770","type":"journal-article","created":{"date-parts":[[2016,8,1]],"date-time":"2016-08-01T16:06:31Z","timestamp":1470067591000},"page":"39-45","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Current and Future Challenges in Mining Large Networks"],"prefix":"10.1145","volume":"18","author":[{"given":"Lawrence B.","family":"Holder","sequence":"first","affiliation":[{"name":"Washington State University"}]},{"given":"Rajmonda","family":"Caceres","sequence":"additional","affiliation":[{"name":"MIT Lincoln Lab"}]},{"given":"David F.","family":"Gleich","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Jason","family":"Riedy","sequence":"additional","affiliation":[{"name":"Georgia Tech"}]},{"given":"Maleq","family":"Khan","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Nitesh V.","family":"Chawla","sequence":"additional","affiliation":[{"name":"University of Notre Dame"}]},{"given":"Ravi","family":"Kumar","sequence":"additional","affiliation":[{"name":"Google, Inc."}]},{"given":"Yinghui","family":"Wu","sequence":"additional","affiliation":[{"name":"Washington State University"}]},{"given":"Christine","family":"Klymko","sequence":"additional","affiliation":[{"name":"Lawrence Livermore"}]},{"given":"Tina","family":"Eliassi-Rad","sequence":"additional","affiliation":[{"name":"Rutgers University"}]},{"given":"Aditya","family":"Prakash","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]}],"member":"320","published-online":{"date-parts":[[2016,8]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/eScience.2014.21"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the 2nd SDM Workshop on Mining Networks and Graphs: A Big Data Analytic Challenge","author":"Ahmed R.","year":"2015","unstructured":"Ahmed , R. and Karypis , G . 2015. Mining Coevolving Induced Relational Motifs in Dynamic Networks . Proceedings of the 2nd SDM Workshop on Mining Networks and Graphs: A Big Data Analytic Challenge ( 2015 ). Ahmed, R. and Karypis, G. 2015. Mining Coevolving Induced Relational Motifs in Dynamic Networks. Proceedings of the 2nd SDM Workshop on Mining Networks and Graphs: A Big Data Analytic Challenge (2015)."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213556.2213560"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1038\/nbt924"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187907"},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the 27th International Conference on Machine Learning (ICML-10)","author":"Bilgic M.","year":"2010","unstructured":"Bilgic , M. , Mihalkova , L. and Getoor , L . 2010. Active Learning for Networked Data . Proceedings of the 27th International Conference on Machine Learning (ICML-10) ( 2010 ). Bilgic, M., Mihalkova, L. and Getoor, L. 2010. Active Learning for Networked Data. Proceedings of the 27th International Conference on Machine Learning (ICML-10) (2010)."},{"key":"e_1_2_1_7_1","unstructured":"Burkhardt P. and Waring C. 2013. An NSA Big Graph experiment. Report NSA-RD-2013-056002v1 (2013).  Burkhardt P. and Waring C. 2013. An NSA Big Graph experiment. Report NSA-RD-2013-056002v1 (2013)."},{"volume-title":"Identifying Mafia Bosses from Meeting Attendance. Networks and Network Analysis for Defence and Security","author":"Calderoni F.","key":"e_1_2_1_8_1","unstructured":"Calderoni , F. 2014. Identifying Mafia Bosses from Meeting Attendance. Networks and Network Analysis for Defence and Security . A.J. Masys, ed. Springer International Publishing . 27--48. Calderoni, F. 2014. Identifying Mafia Bosses from Meeting Attendance. Networks and Network Analysis for Defence and Security. A.J. Masys, ed. Springer International Publishing. 27--48."},{"key":"e_1_2_1_9_1","volume-title":"RMAT: A Recursive Model for Graph Mining. SIAM International Conference on Data Mining","author":"Chakrabarti D.","year":"2004","unstructured":"Chakrabarti , D. , Zhan , Y. and Faloutsos , C . 2004 . RMAT: A Recursive Model for Graph Mining. SIAM International Conference on Data Mining ( 2004 ). Chakrabarti, D., Zhan, Y. and Faloutsos, C. 2004. RMAT: A Recursive Model for Graph Mining. SIAM International Conference on Data Mining (2004)."},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the 2nd SDM Workshop on Mining Networks and Graphs: A Big Data Analytic Challenge","author":"Cheng Y.","year":"2015","unstructured":"Cheng , Y. and Wang , N . 2015. Graph clustering by recursive membership identification in neighborhood . Proceedings of the 2nd SDM Workshop on Mining Networks and Graphs: A Big Data Analytic Challenge ( 2015 ). Cheng, Y. and Wang, N. 2015. Graph clustering by recursive membership identification in neighborhood. Proceedings of the 2nd SDM Workshop on Mining Networks and Graphs: A Big Data Analytic Challenge (2015)."},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 18th International Conference on Extending Database Technology (EDBT)","author":"Choudhury S.","year":"2015","unstructured":"Choudhury , S. , Holder , L.B. , Chin , G. , Agarwal , K. and Feo , J . 2015. A Selectivity based approach to Continuous Pattern Detection in Streaming Graphs . Proceedings of the 18th International Conference on Extending Database Technology (EDBT) ( 2015 ), 157--168. Choudhury, S., Holder, L.B., Chin, G., Agarwal, K. and Feo, J. 2015. A Selectivity based approach to Continuous Pattern Detection in Streaming Graphs. Proceedings of the 18th International Conference on Extending Database Technology (EDBT) (2015), 157--168."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568019"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2610513"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/285055.285060"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/eScience.2012.6404422"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the 2nd SDM Workshop on Mining Networks and Graphs: A Big Data Analytic Challenge","author":"Herrera-Semenets V.","year":"2015","unstructured":"Herrera-Semenets , V. , Acosta-Mendoze , M. and Gago- Alonso, A. 2015. A Framework for Intrusion Detection based on Frequent Subgraph Mining . Proceedings of the 2nd SDM Workshop on Mining Networks and Graphs: A Big Data Analytic Challenge ( 2015 ). Herrera-Semenets, V., Acosta-Mendoze, M. and Gago- Alonso, A. 2015. A Framework for Intrusion Detection based on Frequent Subgraph Mining. Proceedings of the 2nd SDM Workshop on Mining Networks and Graphs: A Big Data Analytic Challenge (2015)."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.87.032717"},{"key":"e_1_2_1_18_1","unstructured":"Huffaker B. Fomenkov M. and Claffy K. 2012. Internet Topology Data Comparison. CAIDA Technical Report (2012).  Huffaker B. Fomenkov M. and Claffy K. 2012. Internet Topology Data Comparison. CAIDA Technical Report (2012)."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bth163"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the Second Workshop on Mining Networks and Graphs. SIAM International Conference on Data Mining","author":"Khan M.","year":"2015","unstructured":"Khan , M. , Klymko , C. and Holder , L.B . eds. 2015 . Proceedings of the Second Workshop on Mining Networks and Graphs. SIAM International Conference on Data Mining ( 2015 ). Khan, M., Klymko, C. and Holder, L.B. eds. 2015. Proceedings of the Second Workshop on Mining Networks and Graphs. SIAM International Conference on Data Mining (2015)."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2012.625257"},{"key":"e_1_2_1_23_1","volume-title":"Infectious diseases of humans: Dynamics and control. By R.M. Anderson and R.M. May, 757","author":"Koff R.S.","year":"1991","unstructured":"Koff , R.S. 1992. Infectious diseases of humans: Dynamics and control. By R.M. Anderson and R.M. May, 757 pp. Oxford: Oxford University Press , 1991 . 95.00. Hepatology. 15, 1 (1992), 169. Koff, R.S. 1992. Infectious diseases of humans: Dynamics and control. By R.M. Anderson and R.M. May, 757 pp. Oxford: Oxford University Press, 1991. 95.00. Hepatology. 15, 1 (1992), 169."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217301"},{"key":"e_1_2_1_25_1","volume-title":"-K","author":"Li X.","year":"2010","unstructured":"Li , X. , Wu , M. , Kwoh , C.-K. and Ng , S . -K . 2010 . Computational approaches for detecting protein complexes from protein interaction networks: a survey. BMC Genomics. 11, Suppl 1 (2010). Li, X., Wu, M., Kwoh, C.-K. and Ng, S.-K. 2010. Computational approaches for detecting protein complexes from protein interaction networks: a survey. BMC Genomics. 11, Suppl 1 (2010)."},{"key":"e_1_2_1_26_1","volume-title":"15th Workshop on Hot Topics in Operating Systems (HotOS XV)","author":"McSherry F.","year":"2015","unstructured":"McSherry , F. , Isard , M. and Murray , D.G . 2015. Scalability! But at what cost ? 15th Workshop on Hot Topics in Operating Systems (HotOS XV) ( Kartause Ittingen, Switzerland , May 2015 ). McSherry, F., Isard, M. and Murray, D.G. 2015. Scalability! But at what cost? 15th Workshop on Hot Topics in Operating Systems (HotOS XV) (Kartause Ittingen, Switzerland, May 2015)."},{"key":"e_1_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Moreno S. Kirshner S. Neville J. and Vishwanathan S. 2010. Tied kronecker product graph models to capture variance in network populations. Allerton'10 (2010) 17--61.  Moreno S. Kirshner S. Neville J. and Vishwanathan S. 2010. Tied kronecker product graph models to capture variance in network populations. Allerton'10 (2010) 17--61.","DOI":"10.1109\/ALLERTON.2010.5707038"},{"key":"e_1_2_1_28_1","volume-title":"Network Hypothesis Testing Using Mixed Kronecker Product Graph Models. IEEE 13th International Conference on Data Mining (ICDM) (Dec.","author":"Moreno S.","year":"2013","unstructured":"Moreno , S. and Neville , J . 2013 . Network Hypothesis Testing Using Mixed Kronecker Product Graph Models. IEEE 13th International Conference on Data Mining (ICDM) (Dec. 2013 ), 1163--1168. Moreno, S. and Neville, J. 2013. Network Hypothesis Testing Using Mixed Kronecker Product Graph Models. IEEE 13th International Conference on Data Mining (ICDM) (Dec. 2013), 1163--1168."},{"key":"e_1_2_1_29_1","unstructured":"Murphy R.C. Wheeler K.B. Barrett B.W. and Ang J.A. 2010. Introducing the Graph 500. Cray User's Group (May 2010).  Murphy R.C. Wheeler K.B. Barrett B.W. and Ang J.A. 2010. Introducing the Graph 500. Cray User's Group (May 2010)."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2662072"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.145"},{"volume-title":"Algorithmic and Analysis Techniques in Property Testing","author":"Ron D.","key":"e_1_2_1_32_1","unstructured":"Ron , D. 2010. Algorithmic and Analysis Techniques in Property Testing . Now Publishers Inc . Ron, D. 2010. Algorithmic and Analysis Techniques in Property Testing. Now Publishers Inc."},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the International Conference of Mathematicians","author":"Rubinfield R.","year":"2006","unstructured":"Rubinfield , R. 2006 . Sublinear Time Algorithms . Proceedings of the International Conference of Mathematicians (2006). Rubinfield, R. 2006. Sublinear Time Algorithms. Proceedings of the International Conference of Mathematicians (2006)."},{"key":"e_1_2_1_34_1","unstructured":"Scaling Apache Giraph to a Trillion Edges: 2013. https:\/\/www.facebook.com\/notes\/facebookengineering\/scaling-apache-giraph-to-a-trillionedges\/10151617006153920.  Scaling Apache Giraph to a Trillion Edges: 2013. https:\/\/www.facebook.com\/notes\/facebookengineering\/scaling-apache-giraph-to-a-trillionedges\/10151617006153920."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.85.056109"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.23"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2014.10.005"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the 2nd SDM Workshop on Mining Networks and Graphs: A Big Data Analytic Challenge","author":"Wang H.","year":"2015","unstructured":"Wang , H. , Zheng , D. , Burns , R. and Priebe , C . 2015. Active Community Detection in Massive Graphs . Proceedings of the 2nd SDM Workshop on Mining Networks and Graphs: A Big Data Analytic Challenge ( 2015 ). Wang, H., Zheng, D., Burns, R. and Priebe, C. 2015. Active Community Detection in Massive Graphs. Proceedings of the 2nd SDM Workshop on Mining Networks and Graphs: A Big Data Analytic Challenge (2015)."},{"key":"e_1_2_1_39_1","unstructured":"Web Data Commons - Hyperlink Graphs: http:\/\/webdatacommons.org\/hyperlinkgraph\/.  Web Data Commons - Hyperlink Graphs: http:\/\/webdatacommons.org\/hyperlinkgraph\/."},{"key":"e_1_2_1_40_1","volume-title":"PPAM Workshop on Power and Energy Aspects of Computation (Sep.","author":"Zakrzewska A.","year":"2013","unstructured":"Zakrzewska , A. and Bader , D.A . 2013. Measuring the Sensitivity of Graph Metrics to Missing Data . PPAM Workshop on Power and Energy Aspects of Computation (Sep. 2013 ). Zakrzewska, A. and Bader, D.A. 2013. Measuring the Sensitivity of Graph Metrics to Missing Data. PPAM Workshop on Power and Energy Aspects of Computation (Sep. 2013)."}],"container-title":["ACM SIGKDD Explorations Newsletter"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2980765.2980770","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2980765.2980770","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:13Z","timestamp":1750218613000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2980765.2980770"}},"subtitle":["Report on the Second SDM Workshop on Mining Networks and Graphs"],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,8]]}},"alternative-id":["10.1145\/2980765.2980770"],"URL":"https:\/\/doi.org\/10.1145\/2980765.2980770","relation":{},"ISSN":["1931-0145","1931-0153"],"issn-type":[{"type":"print","value":"1931-0145"},{"type":"electronic","value":"1931-0153"}],"subject":[],"published":{"date-parts":[[2016,8]]},"assertion":[{"value":"2016-08-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}