Home
Videos uploaded by user “jengolbeck”
OAuth - what it is and how it works
 
06:14
In simple, not technical language!
Views: 17071 jengolbeck
Gephi Tutorial: Filtering Networks
 
06:07
A quick tutorial on how to use filters in Gephi.
Views: 29568 jengolbeck
Creating ARFF Files for Weka
 
05:15
Creating ARFF Files for Weka
Views: 11825 jengolbeck
How to Look at Node Labels in Gephi
 
02:28
Different ways to look at the labels on nodes in gephi including an option to see it only when you mouse over the node.
Views: 7642 jengolbeck
How A Bad Year Taught Me To Ask For Help
 
06:11
The first installment of random thoughts, advice, and stories from Jen. Get your TDAP vaccine updated and ask for help when you need it!
Views: 1683 jengolbeck
How to import a CSV into Gephi
 
01:26
How to import a CSV into Gephi
Views: 17082 jengolbeck
Gephi Tutorial on Network Visualization and Analysis
 
23:00
This tutorial goes from import through the whole analysis phase for a citation network. Data can be accessed at http://www.cs.umd.edu/~golbeck/INST633o/Viz.shtml
Views: 76848 jengolbeck
Updated Gephi Quick Start Tutorial for v 0.9
 
13:31
This is an update of the original Gephi Quick Start Tutorial using the Les Miserables network. This is for Gephi 0.9. Slides to match this tutorial are at https://www.slideshare.net/golbeck/updated-gephi-quick-start-tutorial-for-v-09 Background: The original Gephi Quick Start Tutorial can be found at https://gephi.org/users/quick-start/ Things have moved or changed since it was made, so this tutorial uses their examples and slides but adds updates so you can find these features in version 0.9 I tried to use their originals as much as possible to preserve consistency. All credit for those slides goes to the Gephi creators.
Views: 11185 jengolbeck
Gephi Modularity Tutorial
 
09:31
A quick tutorial on how to use gephi's modularity feature to detect communities and color code them in graphs.
Views: 59091 jengolbeck
Interpreting Results and Accuracy in Weka
 
13:05
What those summary results mean, including precision, recall, f-measures, ROC AUC, and the confusion matrix.
Views: 7525 jengolbeck
Gephi Tutorial: Finding Shortest Paths
 
02:20
A quick tutorial on using the shortest path tool in gephi
Views: 7314 jengolbeck
Network Structure
 
30:44
An introduction to social network analysis and network structure measures, like density and centrality. Table of Contents: 00:00 - Network Structure 00:12 - Degree Distribution 02:42 - Degree Distribution 06:17 - Density 10:31 - Clustering Coefficient 11:24 - Which Node is Most Important? 12:10 - Which Node is Most Important? 13:27 - Closeness Centrality 15:01 - Closeness Centrality 16:17 - Closeness Centrality 16:36 - Degree Centrality 17:33 - Betweenness Centrality 17:53 - Betweenness Centrality 20:55 - Eigenvector Centrality 23:02 - Connectivity and Cohesion 24:24 - Small Worlds 26:28 - Random Graphs and Small Worlds
Views: 66631 jengolbeck
Document Classification in Weka
 
08:16
A couple ways to do document classification in Weka. Data was taken from Trump's tweets, which you can find (with device info) at http://www.trumptwitterarchive.com/archive
Views: 2229 jengolbeck
Class Balancing in Weka
 
08:06
How to deal with unbalanced classes in Weka. Data taken from http://archive.ics.uci.edu/ml/datasets/balance+scale
Views: 4697 jengolbeck
Downloading and Installing Weka
 
01:48
Downloading and Installing Weka
Views: 7116 jengolbeck
Gephi's Twitter Streaming Importer
 
09:31
A tutorial on setting up and running Gephi's Twitter Streaming Importer
Views: 1781 jengolbeck
A Walkthrough Analysis of Tor Networks in Gephi
 
22:46
We load up a couple networks of Tor hidden services, clearnet sites, and IPs and analyze how they are connected. This is an example of how to do an exploratory network analysis using various statistics and filters in Gephi. More info at http://automatingosint.com/blog
Views: 7172 jengolbeck
Gephi Labels and Colors
 
09:23
A tutorial on using the hidden color and label features in Gephi.
Views: 23657 jengolbeck
How to Compute Network Centralization
 
02:11
Here's a quick example of how to compute network centralization (using the Freeman method). Essentially, sum the difference in centrality between the most central node and each other node. Then, divide by the same thing computed on the theoretically most centralized network with the same number of nodes. Usually, the latter will be a star network with one node in the middle connected to each other node.
Views: 3906 jengolbeck
Building Networks
 
12:38
The basics of decision making for how to build a social network data set. Table of Contents: 00:00 - Building Networks 00:13 - First Decisions 01:50 - Examples 04:06 - Networks with multiple node types 05:14 - To Build a Network 06:48 - To Build a Network 08:15 - Handling Large Networks 08:59 - Snowball Sampling 10:01 - Random Sampling 11:23 - Egocentric Network Analysis
Views: 4973 jengolbeck
Converting Various Formats into Adjacency Lists for Gephi
 
21:30
The social network data sets you find online often aren't in the format you need for the analysis tool you are using. There generally aren't converters that will simply change one format to another. However, you can often do the conversion yourself with some creative cut & paste and search & replace. Here, I pick a file I've never seen before and walk you through how I analyze the format, convert it, and import it into Gephi.
Views: 6975 jengolbeck
Machine Learning with Weka - regression and clustering
 
43:59
This is a walkthrough of the IBM weka tutorials covering regression and clustering https://www.ibm.com/developerworks/library/os-weka1/ https://www.ibm.com/developerworks/library/os-weka2/ https://www.ibm.com/developerworks/library/os-weka3/
Views: 14074 jengolbeck
Machine Learning Basics
 
09:42
Machine Learning Basics
Views: 1251 jengolbeck
Gephi email network import tutorial
 
05:46
A quick tutorial on using gephi's email import feature, shown with the setting necessary for importing from Gmail. NOTE: Since I posted this, there has been a change in Gmail. If you are getting an error in Gephi that says it can't connect to the server. you probably need to change your Google security settings. Go to your google account at https://myaccount.google.com. Click on "Connected apps & sites" on the left and turn "Allow less secure apps" to ON. That solved the problem for me.
Views: 7773 jengolbeck
Intro to XML (and handling XML with perl)
 
01:01:21
Basic XML along with some basics of programming perl to parse and work with XML data. This is a virtual lecture for the University of Maryland's INFM 743. The lecture website mentioned in the video is at http://www.cs.umd.edu/~golbeck/INFM743/xml.shtml
Views: 6150 jengolbeck
Trust in Social Networks
 
22:43
An introduction to trust in social network analysis Table of Contents: 00:00 - Trust 00:22 - Defining Trust 02:36 - Why trust? 04:34 - General Definition 05:03 - Categories of Trust 06:32 - How Trust Develops 09:36 - Trust Asymmetry 10:33 - Context and Time 11:40 - Measuring Trust 11:55 - The Investment Game 13:20 - Trustworthiness 15:21 - Trust in Social Media 16:17 - Trust Inference 16:51 - Trust Inference Algorithms 17:33 - Inferring over many paths 19:14 - Applications of Trust 22:01 - Conclusions 22:28 - Conclusions
Views: 4195 jengolbeck
The Weka Explorer Interface
 
17:42
The Weka Explorer Interface
Views: 1833 jengolbeck
Twecoll command line tutorial
 
06:01
How to set up twecoll to collect your twitter network. Uses instructions at http://www.cs.umd.edu/~golbeck/INST633o/vizHW.shtml
Views: 1092 jengolbeck
Formatting Forms with Tables in HTML
 
07:08
How to use tables to format forms in html
Views: 6392 jengolbeck
Tie Strength
 
22:03
An introduction to the concept of tie strength in social network analysis. Table of Contents: 00:17 - Strong vs. Weak Ties 01:23 - Mark Granovetter 02:11 - Getting a Job 03:11 - Getting a Job 03:55 - Getting a Job 04:49 - Replicating Milgram's Six Degrees 05:46 - Weak Ties in Use 06:09 - The benefits of weak ties 06:44 - The network of strong ties 09:21 - Measuring Tie Strength 12:57 - Measuring Tie Strength 14:46 - Marker 16:31 - Measurement Overlaps 19:04 - Network Structure -- Forbidden Triad 19:33 - Marker 21:23 - Tie Strength and Propagation
Views: 5566 jengolbeck
Importing Files in Gephi 0.9.2
 
03:19
Importing adjacency lists in gephi 0.9.2 changed a bit. You might get an error that says "impossible to find a compatible importer" or notice new options. This is a quick tutorial on how to deal with the new import functions.
Views: 1787 jengolbeck
Inferential Statistics Basics
 
21:05
What is a statistical question What are variables Scales Hypotheses Samples and inferences Developed as part of INST627 at UMD
Views: 3543 jengolbeck
Visual Analysis of Social Networks
 
35:19
An introduction to information visualization, specifically network visualization techniques. Table of Contents: 00:10 - Information Visualization 01:06 - Challenger 02:56 - 04:44 - 05:37 - 05:49 - 06:08 - Main Idea 06:34 - Information Visualization 07:45 - Key Attributes 09:07 - Tasks in Info Vis 09:45 - Tasks in Info Vis 10:07 - How Vis Amplifies Cognition 12:50 - Network Visualization 13:15 - What is interesting about this network? 21:49 - What makes a good visualization? 23:15 - Is this a good visualization? 23:56 - What about this one? 24:56 - And this one? 25:29 - And finally, this one? 26:06 - Node Size and Color 28:33 - Node Size and Color 29:40 - Edge Weight 30:04 - Visualization Issues 31:05 - Example: Senate Voting Records 31:48 - Filtering 32:38 - Example: Senate Voting Records 32:43 - Filtering 32:46 - Examples 32:51 - Visualization Tools 34:19 - In Class Exercise
Views: 7922 jengolbeck
Recommender Systems
 
28:29
A quick introduction to recommender systems
Views: 8786 jengolbeck
3.2 Validation and Evaluation in Visualization
 
53:24
Qualitative and quantitative evaluation in visualization
Views: 174 jengolbeck
Editing Data In Weka
 
02:03
A quick tutorial on how to edit values in your dataset from within Weka
Views: 888 jengolbeck
Weka Applications Chooser
 
07:31
A look at all the applications in the Weka GUI Chooser
Views: 805 jengolbeck
INST326 Object Oriented Programming 1: Classes
 
12:44
INST326 Object Oriented Programming 1: Classes
Views: 171 jengolbeck
INST326 Python Basics Review
 
24:16
INST326 Python Basics Review
Views: 330 jengolbeck
Propagation Models
 
25:50
Introduction to disease models and network structure. Includes the firefighter problem, SIR models, k-thresholds. Table of Contents: 00:00 - Propagation in Networks 00:37 - Network Structure and Propagation 02:19 - 04:54 - Firefighter Problem 06:01 - 06:08 - 06:15 - 06:17 - 06:21 - 06:27 - 06:39 - 06:43 - 06:54 - Firefighter Problem Strategies 08:01 - Disease Models 09:20 - Disease Models 10:18 - Disease Models 11:50 - How Diseases Track Information 12:04 - Discuss 12:51 - k-threshold Models 13:40 - k-threshold Models 13:55 - Application to Information - Discuss 14:40 - Apply S/I/R Models and k-thresholds 19:06 - Exercise 21:07 - 23:06 - Exercise 23:37 - Exercise 24:45 - Exercise 25:14 - Exercise
Views: 5166 jengolbeck
Propagation Probability
 
23:52
An introduction to probability used in network propagation. Table of Contents: 00:04 - Transmission Rates 01:16 - Example 02:13 - Example 04:33 - Multiple Neighbors 09:17 - A closer look at the possibilities 12:54 - All the possibilities! 16:32 - When we need simulation 17:57 - Simulations 19:04 - Simulation Exercise 19:56 - Simulation Example 21:40 - Now you try
Views: 2163 jengolbeck
INST36: OO Programming a game
 
27:16
An in depth game program to practice classes and objects
Views: 159 jengolbeck
Rotating a Tic Tac Toe board
 
01:19
Rotating a Tic Tac Toe board
Views: 273 jengolbeck
1 Intro To Data Visualization
 
27:41
Intro to data visualization
Views: 751 jengolbeck
Online Harassment: Networks, Psychology, Interventions
 
18:47
An overview of a range of research into the online harassment phenomenon. Papers mentioned: Aghazadeh, Sarah A., Alison Burns, Jun Chu, Hazel Feigenblatt, Elizabeth Laribee, Lucy Maynard, Amy LM Meyers, Jessica L. O’Brien, and Leah Rufus. "GamerGate: A Case Study in Online Harassment." In Online Harassment, pp. 179-207. Springer, Cham, 2018. Buckels et al. "Trolls just want to have fun." Personality and individual Differences 67 (2014) http://newspaper23.com/ripped/2014/12/http-_____-___-_scottbarrykaufman___-com__-_wp-content__-_uploads__-_2014__-_02__-_trolls-just-want-to-have-fun.pdf Munger "Tweetment effects on the tweeted: Experimentally reducing racist harassment." Political Behavior-2016 http://download.xuebalib.com/xuebalib.com.12365.pdf Golbeck, J., Gerhard, J., O’Colman, F., & O’Colman, R. (2017). Scaling Up Integrated Structural and Content-Based Network Analysis. Information Systems Frontiers, 1-12. Golbeck+28 coauthors. A Large Human-Labeled Corpus for Online Harassment Research. Proc of WebSci'17. http://www.cs.umd.edu/~golbeck/papers/trolling.pdf
Views: 181 jengolbeck
Document Level and External Style Sheets
 
11:05
CSS tutorial on Document Level and External Style Sheets
Views: 310 jengolbeck
5 Color in Visualization
 
22:03
How color goes from being a wavelength of energy to how we perceive and name it. Slides by Niklas Elmqvist
Views: 244 jengolbeck
INST326: Web Scraping with Python
 
24:55
Working the 4 Minute Web Scraping with Python tutorial from https://towardsdatascience.com/how-to-web-scrape-with-python-in-4-minutes-bc49186a8460
Views: 369 jengolbeck
11. Temporal Data Visualization
 
23:58
11. Temporal Data Visualization slides by niklas elmqvist
Views: 432 jengolbeck
Accessibility in HCI
 
24:04
A high level overview of accessibility in HCI. This is a lecture for a class I teach at the University of Maryland, and you can see the related details at https://www.cs.umd.edu/~golbeck/INST631/accessibility.shtml
Views: 542 jengolbeck