SM User Guide

Total Page:16

File Type:pdf, Size:1020Kb

SM User Guide Oracle® Communications Tekelec Platform Licensing Information User Manual Release 7.0.3 E71613 Revision 1 January 2016 Copyright © 2011,2016 Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are “commercial computer software” pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications. This software or hardware and documentation may provide access to or information on content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services. License Information User Manual Page 2 Oracle Communications Tekelec Platform 7.0.3 January 2016 Introduction This Licensing Information document is a part of the product or program documentation under the terms of your Oracle license agreement and is intended to help you understand the program editions, entitlements, restrictions, prerequisites, and/or separately licensed third party technology terms associated with the Oracle software program(s) covered by this document (the “Program(s)”). Entitled or restricted use products or components identified in this document that are not provided with the particular Program may be obtained from the Oracle Software Delivery Cloud website (https://edelivery.oracle.com) or from media Oracle may provide. If you have a question about your license rights and obligations, please contact your Oracle sales representative, review the information provided in Oracle’s Software Investment Guide (http://www.oracle.com/us/corporate/pricing/software-investment-guide/index.html), and/or contact the applicable Oracle License Management Services representative listed on http://www.oracle.com/us/corporate/license-management-services/index.html. Licensing Information Description of Product Editions and Permitted Features Prerequisite Products Entitled Products and Restricted Use Licenses License Information User Manual Page 3 Oracle Communications Tekelec Platform 7.0.3 January 2016 Oracle Communications Tekelec Platform – Licensing Notes This Oracle Communications Tekelec Platform software provides the operating environment for multiple Oracle Communications applications including: Oracle Communications Diameter Signaling Router Oracle Communications Diameter Intelligence Hub Oracle Communications EAGLE Application Processor Oracle Communications EAGLE LNP Application Processor HLR Router Oracle Communications LSMS Oracle Communications Performance Intelligence Center Oracle Communications Policy Management Oracle Communications Subscriber Database Manager Oracle Communications Subscriber Profile Repository This software is licensed as part of the applicable Oracle Communications application. For licensing details see the application license information user manual for the Oracle Communications application you are using. License Information User Manual Page 4 Oracle Communications Tekelec Platform 7.0.3 January 2016 Third-Party Commercial and Open Source Software Commercial Software Commercial software used in Oracle Communications Tekelec Platform is identified in the following table with the following license notes, restrictions, and disclaimers. Vendor Product(s) and Licensing Licensing Description/Disclaimer/Disclaimer Version(s) Altera Jam STAPL Byte-Code Copyright (C) Altera Corporation 1997-2001 Player v.2.2 Genivia gSOAP v.2.8.17 License Information User Manual Page 5 Oracle Communications Tekelec Platform 7.0.3 January 2016 Open Source Disclosure Open Source Disclosure Open source software used in Oracle Communications Tekelec Platform is identified in the following table with the following license notes, restrictions, and disclaimers. Additional open source software notices and licenses may be found in the Documentation or readme files of the products making up the individual components. Vendor Product(s) and Licensing Description/Disclaimer Version(s) A. Sinan Unur, David perl-Crypt-SSLeay Copyright (c) 2010 A. Sinan Unur Landgren, Joshua v.0.58_01 Copyright (c) 2006-2007 David Landgren Chamas, Gisle Aas Copyright (c) 1999-2003 Joshua Chamas Copyright (c) 1998 Gisle Aas This program is free software; you can redistribute it and/or modify it under the same terms as Perl itself. The perl-Crypt-SSLeay -0.58_01 software and sample code developed by A. Sinan Unur, David Landgren, Joshua Chamas and Gisle Aas is licensed under Artistic License. Artistic License – See Appendix I Achim Grolms, Philip perl-GSSAPI v.0.28 Copyright (c) 2006,2008 Achim Grolms. All rights reserved. Guenther This program is free software; you can redistribute it and/or modify it under the same terms as Perl itself. Copyright (c) 2000,2001,2005 Philip Guenther. All rights reserved. This program is free software; you can redistribute it and/or modify it under the same terms as Perl itself. The perl-GSSAPI-0.28 software and sample code developed by Achim Grolms, Philip Guenther is licensed under Artistic License. Artistic License – See Appendix I Adam Kennedy perl-Class-Inspector Copyright 2002 - 2011 Adam Kennedy. This program is free v.1.25 software; you can redistribute it and/or modify it under the same terms as Perl itself. The perl-Class-Inspector-1.25 software and sample code developed by Adam Kennedy is licensed under Artistic License. Artistic License – See Appendix I Adam Kennedy perl-LWP-Online Copyright 2006 - 2011 Adam Kennedy. This program is free v.1.08 software; you can redistribute it and/or modify it under the same terms as Perl itself. The perl-LWP-Online-1.08 software and sample code developed by Adam Kennedy is licensed under Artistic License. Artistic License – See Appendix I Adam Kennedy perl-Params-Util Copyright 2005 - 2011 Adam Kennedy. This program is free v.1.04 software; you can redistribute it and/or modify it under the same terms as Perl itself. The perl-Params-Util-1.04 software and sample code developed by Adam Kennedy is licensed under Artistic License. Artistic License – See Appendix I License Information User Manual Page 6 Oracle Communications Tekelec Platform 7.0.3 January 2016 Vendor Product(s) and Licensing Description/Disclaimer Version(s) Adam Kennedy perl-Parse-CPAN- Copyright 2006 - 2010 Adam Kennedy. Meta v.1.4401 This program is free software; you can redistribute it and/or modify it under the same terms as Perl itself. The perl-Parse-CPAN-Meta-1.4401 software and sample code developed by Adam Kennedy is licensed under Artistic License. Artistic License – See Appendix I Adam Kennedy perl-Task-Weaken Copyright 2006 - 2011 Adam Kennedy. v.1.04 This program is free software; you can redistribute it and/or modify it under the same terms as Perl itself. The perl-Task-Weaken-1.04 software and sample code developed by Adam Kennedy is licensed under Artistic License. Artistic License – See Appendix I Adam Kennedy perl-CPAN-Meta- This software is copyright (c) 2010 by Adam Kennedy. YAML v.0.003 This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself. The perl-CPAN-Meta-YAML-0.003 software and sample code developed by Adam Kennedy is licensed under Artistic License. Artistic
Recommended publications
  • MANNING Greenwich (74° W
    Object Oriented Perl Object Oriented Perl DAMIAN CONWAY MANNING Greenwich (74° w. long.) For electronic browsing and ordering of this and other Manning books, visit http://www.manning.com. The publisher offers discounts on this book when ordered in quantity. For more information, please contact: Special Sales Department Manning Publications Co. 32 Lafayette Place Fax: (203) 661-9018 Greenwich, CT 06830 email: [email protected] ©2000 by Manning Publications Co. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by means electronic, mechanical, photocopying, or otherwise, without prior written permission of the publisher. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in the book, and Manning Publications was aware of a trademark claim, the designations have been printed in initial caps or all caps. Recognizing the importance of preserving what has been written, it is Manning’s policy to have the books we publish printed on acid-free paper, and we exert our best efforts to that end. Library of Congress Cataloging-in-Publication Data Conway, Damian, 1964- Object oriented Perl / Damian Conway. p. cm. includes bibliographical references. ISBN 1-884777-79-1 (alk. paper) 1. Object-oriented programming (Computer science) 2. Perl (Computer program language) I. Title. QA76.64.C639 1999 005.13'3--dc21 99-27793 CIP Manning Publications Co. Copyeditor: Adrianne Harun 32 Lafayette
    [Show full text]
  • The Samhain Host Integrity Monitoring System the Samhain Host Integrity Monitoring System This Is Version 2.4.3 of the Samhain Manual
    The Samhain Host Integrity Monitoring System The Samhain Host Integrity Monitoring System This is version 2.4.3 of the Samhain manual. Copyright © 2002-2019 Rainer Wichmann Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. You may obtain a copy of the GNU Free Documentation Licensefrom the Free Software Foundation by visiting their Web site or by writing to: Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. This manual refers to version 4.4.0 of Samhain. Table of Contents 1. Introduction .............................................................................................................. 1 1. Backward compatibility ...................................................................................... 1 2. Compiling and installing ............................................................................................. 2 1. Overview ......................................................................................................... 2 2. Requirements .................................................................................................... 3 3. Download and extract ......................................................................................... 3 4. Configuring the source ......................................................................................
    [Show full text]
  • Java Bytecode Manipulation Framework
    Notice About this document The following copyright statements and licenses apply to software components that are distributed with various versions of the OnCommand Performance Manager products. Your product does not necessarily use all the software components referred to below. Where required, source code is published at the following location: ftp://ftp.netapp.com/frm-ntap/opensource/ 215-09632 _A0_ur001 -Copyright 2014 NetApp, Inc. All rights reserved. 1 Notice Copyrights and licenses The following component is subject to the ANTLR License • ANTLR, ANother Tool for Language Recognition - 2.7.6 © Copyright ANTLR / Terence Parr 2009 ANTLR License SOFTWARE RIGHTS ANTLR 1989-2004 Developed by Terence Parr Partially supported by University of San Francisco & jGuru.com We reserve no legal rights to the ANTLR--it is fully in the public domain. An individual or company may do whatever they wish with source code distributed with ANTLR or the code generated by ANTLR, including the incorporation of ANTLR, or its output, into commerical software. We encourage users to develop software with ANTLR. However, we do ask that credit is given to us for developing ANTLR. By "credit", we mean that if you use ANTLR or incorporate any source code into one of your programs (commercial product, research project, or otherwise) that you acknowledge this fact somewhere in the documentation, research report, etc... If you like ANTLR and have developed a nice tool with the output, please mention that you developed it using ANTLR. In addition, we ask that the headers remain intact in our source code. As long as these guidelines are kept, we expect to continue enhancing this system and expect to make other tools available as they are completed.
    [Show full text]
  • Cloaker: Hardware Supported Rootkit Concealment
    Cloaker: Hardware Supported Rootkit Concealment Francis M. David, Ellick M. Chan, Jeffrey C. Carlyle, Roy H. Campbell Department of Computer Science University of Illinois at Urbana-Champaign 201 N Goodwin Ave, Urbana, IL 61801 {fdavid,emchan,jcarlyle,rhc}@uiuc.edu Abstract signers resorted to more complex techniques such as modi- fying boot sectors [33, 51] and manipulating the in-memory Rootkits are used by malicious attackers who desire to image of the kernel. These rootkits are susceptible to de- run software on a compromised machine without being de- tection by tools that check kernel code and data for alter- tected. They have become stealthier over the years as a ation [43, 13, 42, 21]. Rootkits that modify the system consequence of the ongoing struggle between attackers and BIOS or device firmware [25, 26] can also be detected by system defenders. In order to explore the next step in rootkit integrity checking tools. More recently, virtualization tech- evolution and to build strong defenses, we look at this issue nology has been studied as yet another means to conceal from the point of view of an attacker. We construct Cloaker, rootkits [31, 44]. These rootkits remain hidden by running a proof-of-concept rootkit for the ARM platform that is non- the host OS in a virtual machine environment. To counter persistent and only relies on hardware state modifications the threat from these Virtual Machine Based Rootkits (VM- for concealment and operation. A primary goal in the de- BRs), researchers have detailed approaches to detect if code sign of Cloaker is to not alter any part of the host oper- is executing inside a virtual machine [20].
    [Show full text]
  • A Brief Study and Comparison Of, Open Source Intrusion Detection System Tools
    International Journal of Advanced Computational Engineering and Networking, ISSN: 2320-2106, Volume-1, Issue-10, Dec-2013 A BRIEF STUDY AND COMPARISON OF, OPEN SOURCE INTRUSION DETECTION SYSTEM TOOLS 1SURYA BHAGAVAN AMBATI, 2DEEPTI VIDYARTHI 1,2Defence Institute of Advanced Technology (DU) Pune –411025 Email: [email protected], [email protected] Abstract - As the world becomes more connected to the cyber world, attackers and hackers are becoming increasingly sophisticated to penetrate computer systems and networks. Intrusion Detection System (IDS) plays a vital role in defending a network against intrusion. Many commercial IDSs are available in marketplace but with high cost. At the same time open source IDSs are also available with continuous support and upgradation from large user community. Each of these IDSs adopts a different approaches thus may target different applications. This paper provides a quick review of six Open Source IDS tools so that one can choose the appropriate Open Source IDS tool as per their organization requirements. Keywords - Intrusion Detection, Open Source IDS, Network Securit, HIDS, NIDS. I. INTRODUCTION concentrate on the activities in a host without considering the activities in the computer networks. Every day, intruders are invading countless homes On the other hand, NIDS put its focus on computer and organisations across the country via virus, networks without examining the hosts’ activities. worms, Trojans, DoS/DDoS attacks by inserting bits Intrusion Detection methodologies can be classified of malicious code. Intrusion detection system tools as Signature based detection, Anomaly based helps in protecting computer and network from a detection and Stateful Protocol analysis based numerous threats and attacks.
    [Show full text]
  • Cancer Immunology of Cutaneous Melanoma: a Systems Biology Approach
    Cancer Immunology of Cutaneous Melanoma: A Systems Biology Approach Mindy Stephania De Los Ángeles Muñoz Miranda Doctoral Thesis presented to Bioinformatics Graduate Program at Institute of Mathematics and Statistics of University of São Paulo to obtain Doctor of Science degree Concentration Area: Bioinformatics Supervisor: Prof. Dr. Helder Takashi Imoto Nakaya During the project development the author received funding from CAPES São Paulo, September 2020 Mindy Stephania De Los Ángeles Muñoz Miranda Imunologia do Câncer de Melanoma Cutâneo: Uma abordagem de Biologia de Sistemas VERSÃO CORRIGIDA Esta versão de tese contém as correções e alterações sugeridas pela Comissão Julgadora durante a defesa da versão original do trabalho, realizada em 28/09/2020. Uma cópia da versão original está disponível no Instituto de Matemática e Estatística da Universidade de São Paulo. This thesis version contains the corrections and changes suggested by the Committee during the defense of the original version of the work presented on 09/28/2020. A copy of the original version is available at Institute of Mathematics and Statistics at the University of São Paulo. Comissão Julgadora: • Prof. Dr. Helder Takashi Imoto Nakaya (Orientador, Não Votante) - FCF-USP • Prof. Dr. André Fujita - IME-USP • Profa. Dra. Patricia Abrão Possik - INCA-Externo • Profa. Dra. Ana Carolina Tahira - I.Butantan-Externo i FICHA CATALOGRÁFICA Muñoz Miranda, Mindy StephaniaFicha de Catalográfica los Ángeles M967 Cancer immunology of cutaneous melanoma: a systems biology approach = Imuno- logia do câncer de melanoma cutâneo: uma abordagem de biologia de sistemas / Mindy Stephania de los Ángeles Muñoz Miranda, [orientador] Helder Takashi Imoto Nakaya. São Paulo : 2020. 58 p.
    [Show full text]
  • The Forseti Distributed File Integrity Checker
    Cluster Security with NVisionCC: The Forseti Distributed File Integrity Checker Adam J. Lee†‡, Gregory A. Koenig†‡, and William Yurcik† †National Center for Supercomputing Applications ‡Department of Computer Science University of Illinois at Urbana-Champaign {adamlee, koenig, byurcik}@ncsa.uiuc.edu Abstract for a number of malicious actions. In many cases, the password used to log into a single node can be used Attackers who are able to compromise a single node to access a large number of nodes in the system, al- in a high performance computing cluster can use that lowing the attacker to utilize the vast computing and node as a launch point for a number of malicious ac- storage capabilities of the compromised cluster to carry tions. In many cases, the password used to log into out brute-force password cracking, launch distributed a single node can be used to access a large number of denial of service attacks, or serve illegal digital content. nodes in the system, allowing the attacker to utilize the Additionally, an attacker can listen to network traffic vast computing and storage capabilities of the compro- for other users to log into their compromised nodes in mised cluster to sniff network traffic, carry out brute- hopes of learning passwords for other accounts on these force password cracking, launch distributed denial of systems. service attacks, or serve illegal digital content. Often, The recent rise in popularity of grid computing has these types of attackers modify important system files exacerbated this problem by increasing the amount to collect passwords to other accounts, disable certain of damage that can be caused with a single compro- logging facilities, or create back-doors into the system.
    [Show full text]
  • I3FS: an In-Kernel Integrity Checker and Intrusion Detection File System Swapnil Patil, Anand Kashyap, Gopalan Sivathanu, and Erez Zadok Stony Brook University
    I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System Swapnil Patil, Anand Kashyap, Gopalan Sivathanu, and Erez Zadok Stony Brook University Appears in the proceedings of the 18th USENIX Large Installation System Administration Conference (LISA 2004) Abstract System administrators must stay alert to protect their systems against the effects of malicious intrusions. In Today, improving the security of computer systems this process, the administrators must first detect that an has become an important and difficult problem. Attack- intrusion has occurred and that the system is in an in- ers can seriously damage the integrity of systems. At- consistent state. Second, they have to investigate the tack detection is complex and time-consuming for sys- damage done by attackers, like data deletion, adding in- tem administrators, and it is becoming more so. Current secure Trojan programs, etc. Finally, they have to fix integrity checkers and IDSs operate as user-mode utili- the vulnerabilities to avoid future attacks. These steps ties and they primarily perform scheduled checks. Such are often too difficult and hence machines are mostly re- systems are less effective in detecting attacks that hap- installed and then reconfigured. Our work does not aim pen between scheduled checks. These user tools can be at preventing malicious intrusions, but offers a method easily compromised if an attacker breaks into the sys- of notifying administrators and restricting access once tem with administrator privileges. Moreover, these tools an intrusion has happened, so as to minimize the effects result in significant performance degradation during the of attacks. Our system uses integrity checking to detect checks.
    [Show full text]
  • Intermediate Perl
    SECOND EDITION Intermediate Perl Randal L. Schwartz, brian d foy, and Tom Phoenix Beijing • Cambridge • Farnham • Köln • Sebastopol • Tokyo Intermediate Perl, Second Edition by Randal L. Schwartz, brian d foy, and Tom Phoenix Copyright © 2012 Randal Schwartz, brian d foy, Tom Phoenix. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://my.safaribooksonline.com). For more information, contact our corporate/institutional sales department: 800-998-9938 or [email protected]. Editors: Simon St. Laurent and Shawn Wallace Indexer: Lucie Haskins Production Editor: Kristen Borg Cover Designer: Karen Montgomery Copyeditor: Absolute Service, Inc. Interior Designer: David Futato Proofreader: Absolute Service, Inc. Illustrator: Rebecca Demarest March 2006: First Edition. August 2012: Second Edition. Revision History for the Second Edition: 2012-07-20 First release See http://oreilly.com/catalog/errata.csp?isbn=9781449393090 for release details. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. Intermediate Perl, the image of an alpaca, and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc., was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information con- tained herein.
    [Show full text]
  • SM User Guide
    Oracle® Communications Tekelec Virtual Operating Environment Licensing Information User Manual Release 3.5 E93070-01 November 2017 Copyright ©2010, 2017 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S.
    [Show full text]
  • Bio::Graphics HOWTO Lincoln Stein Cold Spring Harbor Laboratory1 [email protected]
    Bio::Graphics HOWTO Lincoln Stein Cold Spring Harbor Laboratory1 [email protected] This HOWTO describes how to render sequence data graphically in a horizontal map. It applies to a variety of situations ranging from rendering the feature table of a GenBank entry, to graphing the positions and scores of a BLAST search, to rendering a clone map. It describes the programmatic interface to the Bio::Graphics module, and discusses how to create dynamic web pages using Bio::DB::GFF and the gbrowse package. Table of Contents Introduction ...........................................................................................................................3 Preliminaries..........................................................................................................................3 Getting Started ......................................................................................................................3 Adding a Scale to the Image ...............................................................................................5 Improving the Image............................................................................................................7 Parsing Real BLAST Output...............................................................................................8 Rendering Features from a GenBank or EMBL File ....................................................12 A Better Version of the Feature Renderer ......................................................................14 Summary...............................................................................................................................18
    [Show full text]
  • UCLA UCLA Electronic Theses and Dissertations
    UCLA UCLA Electronic Theses and Dissertations Title Bipartite Network Community Detection: Development and Survey of Algorithmic and Stochastic Block Model Based Methods Permalink https://escholarship.org/uc/item/0tr9j01r Author Sun, Yidan Publication Date 2021 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Los Angeles Bipartite Network Community Detection: Development and Survey of Algorithmic and Stochastic Block Model Based Methods A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Statistics by Yidan Sun 2021 © Copyright by Yidan Sun 2021 ABSTRACT OF THE DISSERTATION Bipartite Network Community Detection: Development and Survey of Algorithmic and Stochastic Block Model Based Methods by Yidan Sun Doctor of Philosophy in Statistics University of California, Los Angeles, 2021 Professor Jingyi Li, Chair In a bipartite network, nodes are divided into two types, and edges are only allowed to connect nodes of different types. Bipartite network clustering problems aim to identify node groups with more edges between themselves and fewer edges to the rest of the network. The approaches for community detection in the bipartite network can roughly be classified into algorithmic and model-based methods. The algorithmic methods solve the problem either by greedy searches in a heuristic way or optimizing based on some criteria over all possible partitions. The model-based methods fit a generative model to the observed data and study the model in a statistically principled way. In this dissertation, we mainly focus on bipartite clustering under two scenarios: incorporation of node covariates and detection of mixed membership communities.
    [Show full text]