53,663 Hits in 6.8 sec

Assessing Online Media Content Trustworthiness, Relevance and Influence: an Introductory Survey

Eleonora Ciceri, Roman Fedorov, Eric Umuhoza, Marco Brambilla, Piero Fraternali
2015 International Workshop on Knowledge Discovery on the Web  
The increasing popularity of social media articles and microblogging systems is changing the way online information is produced: users are both content publishers and content consumers.  ...  In this paper we investigate the most relevant research works in this domain, highlighting their common characteristics and peculiarities in terms of content source type, trust-related content features  ...  Content is usually long, and sometimes authors are encouraged to review, edit, rate and discuss it, thus creating high quality, multi-authored information.  ... 
dblp:conf/kdweb/CiceriFU0F15 fatcat:sx6xmwvyz5ed7pvsgty2ypvmky

Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling

N Shravani
2013 IOSR Journal of Computer Engineering  
Tagging in online social networks is very popular these days as it facilitates search and retrieval of multimedia content .However, noisy and spam annotations often make it.  ...  In the past few years sharing photos, within social networks has become very popular .In order to make these huge collection easier to explore, images are usually tagged with representative keywords such  ...  At the same time, they have become a popular way to share and disseminate information.  ... 
doi:10.9790/0661-1261619 fatcat:hjkk2xeowvdizhtszlic33ypiy

Social network based security scheme in mobile information-centric network

You Lu, Zhiyang Wang, Yu-Ting Yu, Ruolin Fan, Mario Gerla
2013 2013 12th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET)  
In this paper, we propose a social network based security scheme to verify the public-key and producer identity binding.  ...  A Certificate Authority (CA) generally verifies the binding between public-key and the producer identity.  ...  So, the popular content producer in the social trust network will have a relatively higher node degree than other normal nodes.  ... 
doi:10.1109/medhocnet.2013.6767402 dblp:conf/medhocnet/LuWYFG13 fatcat:mf2ktsnwjrf57g757v3oul4kie

HealthTrust: A Social Network Approach for Retrieving Online Health Videos

Luis Fernandez-Luque, Randi Karlsen, Genevieve B Melton
2012 Journal of Medical Internet Research  
Joseph A Kostan from the GroupLens group in the Department of Computer Science and Engineering at the University of Minnesota.  ...  In addition, we would like to thank the Diabetes Hands Foundation for their support in the recruitment of people with diabetes.  ...  In the Web information retrieval domain, trust has normally been based on the analysis of link structures.  ... 
doi:10.2196/jmir.1985 pmid:22356723 pmcid:PMC3374533 fatcat:ks5s6pafmjgctf3ysgan5csh6y

Credibility in Information Retrieval

Alexandru L. Ginsca, Adrian Popescu, Mihai Lupu
2015 Foundations and Trends in Information Retrieval  
Detecting Spammers and Content Promoters in Online Video Social Networks. In Proc. of the Special Interest Group on Information Retrieval (SIGIR), 2009a.  ...  Editorial Scope Topics Foundations and Trends ® in Information Retrieval publishes survey and tutorial articles in the following topics: Information for Librarians Foundations and Trends ® in Information  ... 
doi:10.1561/1500000046 fatcat:fy4grdqnwbez5k4m2evmzni53y

In Tags We Trust: Trust modeling in social tagging of multimedia content

Ivan Ivanov, Peter Vajda, Jong-Seok Lee, Touradj Ebrahimi
2012 IEEE Signal Processing Magazine  
T agging in online social networks is very popular these days, as it facilitates search and retrieval of multimedia content.  ...  At the same time, they have become a popular way to share and disseminate information.  ... 
doi:10.1109/msp.2011.942345 fatcat:u57j6bwuvvekbfliwlckhtdyia

Discovering Influential Nodes for Viral Marketing

Yung-Ming Li, Cheng-Yang Lai, Chia-Hao Lin
2009 2009 42nd Hawaii International Conference on System Sciences  
Experiment result shows that our model outperforms "popular author" and "review rating" methods in selecting influential reviewers.  ...  The influence power indicator: trust is applied in the evaluation of our model and it considers thousands of human relationships among the real world.  ...  This vicious cycle will lead to a failure in popular author judgment in the end. As Table 5 .3 shows, "review rating" method has larger error rate than "popular author".  ... 
doi:10.1109/hicss.2009.163 dblp:conf/hicss/LiLL09 fatcat:x62rygrjjng4xg4j7y6yywbxsm

Report on the Models of Trust for the Web workshop (MTW'06)

Tim Finin, Lalana Kagal, Daniel Olmedilla
2006 SIGMOD record  
The authors proposed a twodimensional scheme by adopting both indexical bias (differences in the sets of URLs retrieved) and content bias (deviations of content).  ...  Session I : Trust Networks David Brondsema and Andrew Schamp described their work in using social trust networks to filter spam in "Konfidi: Trust Networks Using PGP and RDF".  ... 
doi:10.1145/1228268.1228282 fatcat:5i4b6xxyh5gsvc3jiymselx32e

A comparative study of heterogeneous item recommendations in social systems

Alejandro Bellogín, Iván Cantador, Pablo Castells
2013 Information Sciences  
In this paper we evaluate a number of tag-based recommendation approaches [15] that are adaptations of TF-IDF [3] and BM25 [53] Information Retrieval models, and are inspired on previous works on folksonomy-based  ...  Esta es la versión de autor del artículo publicado en: This is an author produced version of a paper published in: Information Sciences 221 (2013): 142 -169 El acceso a la versión del editor puede requerir  ...  Acknowledgments The work presented here was supported by the Spanish Ministry of Science and Innovation (TIN2011-28538-C02), and the Autonomous Community of Madrid (CCG10-UAM/TIC-5877).  ... 
doi:10.1016/j.ins.2012.09.039 fatcat:houxbiojzvc4pdtq3kjjllrexm


Amre Shakimov, Landon P. Cox
2013 Proceedings of the First ACM SIGOPS Conference on Timely Results in Operating Systems - TRIOS '13  
In this paper, we present the design and implementation of a Multi-User Taint Tracker (MUTT), which ensures that third-party applications adhere to access policies defined by service users.  ...  Services such as Facebook and Twitter host and disseminate data on behalf of billions of users.  ...  Our work was supported by the National Science Foundation under NSF awards CNS-0747283 and CNS-0916649.  ... 
doi:10.1145/2524211.2524215 dblp:conf/sosp/ShakimovC13 fatcat:sbvfjmysvjfhvkujcvi42f4way

Contributive Social Capital Extraction From Different Types of Online Data Sources [article]

Sebastian Schams, Georg Groh
2019 arXiv   pre-print
The findings are compared and set in context to contributive social capital extraction.  ...  In sociology the sum of (social) resources available to a person through their social network is often described as social capital. In this article, we look at social capital from a different angle.  ...  [49] For the analysis of the social influence of an author Li et al. were interested in a user's connections within the network and their ability to control information flow.  ... 
arXiv:1902.07636v1 fatcat:n34kktfxrvarfkfzx34z2ywfdm

Social Relations and Methods in Recommender Systems: A Systematic Review

Diego Medel, Carina González-González, Silvana V. Aciar
2021 International Journal of Interactive Multimedia and Artificial Intelligence  
Currently, authors consider the user's historical behavior and find contextual information about the user, such as social relationships, time information, and location.  ...  As the main findings, social relations were classified into three groups: trust, friend activities, and user interactions.  ...  Acknowledgment The authors thank CONICET (Consejo Nacional de Investigaciones Científicas y Técnicas de Argentina) and AUIP (Asociación Universitaria Iberoamericana de Postgrado) for their support to the  ... 
doi:10.9781/ijimai.2021.12.004 fatcat:jeh6xkovwrfk5k5l2oqnczxrqu


A. Famili
2017 Intelligent Data Analysis  
The authors study people's trust and rating behavior with the Epinions dataset, which is a popular product review website allowing users to rate various categories of products.  ...  Wan et al., in the next article of this issue, discuss that in the big data era, the efficient indexing of gradually increasing databases has become vitally important for information retrieval and to incrementally  ...  In order to address this drawback, the authors propose a new information fusion method that is based on the Dempster-Shafer theory of evidence.  ... 
doi:10.3233/ida-170867 fatcat:gbom33nxzngvxe5tdx4rsps344

To Trust, or not to Trust: Highlighting the Need for Data Provenance in Mobile Apps for Smart Cities

Mikel Emaldi, Oscar Peña, Jon Lázaro, Diego López-de-Ipiña, Sacha Vanhecke, Erik Mannens
2013 International Workshop on Information Management for Mobile Applications  
How can identify if a given user and, consequently, the data generated by him/her, can be trusted?  ...  On this paper, we present how the IES Cities' platform integrates the PROV Data Model and the related PROV-O ontology, allowing the exchange of provenance information about user-generated data in the context  ...  In [9] the authors identify 19 parameters that affect how users determine trust in content provided by web information sources, such as the authority of the creator of the information or the popularity  ... 
dblp:conf/immoa/EmaldiPLLVM13 fatcat:zupeqhwi4nflbiyhtqobzv6otq

SocialTrust++: Building community-based trust in Social Information Systems

James Caverlee, Zhiyuan Cheng, Brian Eoff, Chiao-Fang Hsu, Krishna Kamath, Said Kashoob, Jeremy Kelley, Elham Khabiri, Kyumin Lee
2010 Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing  
Social information systems -popularized by Facebook, Wikipedia, Twitter, and other social websites -are emerging as a powerful new paradigm for distributed socialpowered information management.  ...  The overall research goal of the SocialTrust++ project is to develop, analyze, deploy, and test algorithms for building, enabling, and leveraging communitybased trust in Social Information Systems.  ...  Even with effective social spam filtering, we still face the challenge of assessing the relative trust (or authority) of users and resources in the Social Information System.  ... 
doi:10.4108/icst.collaboratecom.2010.40 dblp:conf/colcom/CaverleeCEHKKKKL10 fatcat:t6dytjhuljb65gf43s2dtralze
« Previous Showing results 1 — 15 out of 53,663 results