A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Assessing Online Media Content Trustworthiness, Relevance and Influence: an Introductory Survey
2015
International Workshop on Knowledge Discovery on the Web
The increasing popularity of social media articles and microblogging systems is changing the way online information is produced: users are both content publishers and content consumers. ...
In this paper we investigate the most relevant research works in this domain, highlighting their common characteristics and peculiarities in terms of content source type, trust-related content features ...
Content is usually long, and sometimes authors are encouraged to review, edit, rate and discuss it, thus creating high quality, multi-authored information. ...
dblp:conf/kdweb/CiceriFU0F15
fatcat:sx6xmwvyz5ed7pvsgty2ypvmky
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
2013
IOSR Journal of Computer Engineering
Tagging in online social networks is very popular these days as it facilitates search and retrieval of multimedia content .However, noisy and spam annotations often make it. ...
In the past few years sharing photos, within social networks has become very popular .In order to make these huge collection easier to explore, images are usually tagged with representative keywords such ...
At the same time, they have become a popular way to share and disseminate information. ...
doi:10.9790/0661-1261619
fatcat:hjkk2xeowvdizhtszlic33ypiy
Social network based security scheme in mobile information-centric network
2013
2013 12th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET)
In this paper, we propose a social network based security scheme to verify the public-key and producer identity binding. ...
A Certificate Authority (CA) generally verifies the binding between public-key and the producer identity. ...
So, the popular content producer in the social trust network will have a relatively higher node degree than other normal nodes. ...
doi:10.1109/medhocnet.2013.6767402
dblp:conf/medhocnet/LuWYFG13
fatcat:mf2ktsnwjrf57g757v3oul4kie
HealthTrust: A Social Network Approach for Retrieving Online Health Videos
2012
Journal of Medical Internet Research
Joseph A Kostan from the GroupLens group in the Department of Computer Science and Engineering at the University of Minnesota. ...
In addition, we would like to thank the Diabetes Hands Foundation for their support in the recruitment of people with diabetes. ...
In the Web information retrieval domain, trust has normally been based on the analysis of link structures. ...
doi:10.2196/jmir.1985
pmid:22356723
pmcid:PMC3374533
fatcat:ks5s6pafmjgctf3ysgan5csh6y
Credibility in Information Retrieval
2015
Foundations and Trends in Information Retrieval
Detecting Spammers and Content Promoters in Online Video Social Networks. In Proc. of the Special Interest Group on Information Retrieval (SIGIR), 2009a. ...
Editorial Scope Topics Foundations and Trends ® in Information Retrieval publishes survey and tutorial articles in the following topics:
Information for Librarians Foundations and Trends ® in Information ...
doi:10.1561/1500000046
fatcat:fy4grdqnwbez5k4m2evmzni53y
In Tags We Trust: Trust modeling in social tagging of multimedia content
2012
IEEE Signal Processing Magazine
T agging in online social networks is very popular these days, as it facilitates search and retrieval of multimedia content. ...
At the same time, they have become a popular way to share and disseminate information. ...
doi:10.1109/msp.2011.942345
fatcat:u57j6bwuvvekbfliwlckhtdyia
Discovering Influential Nodes for Viral Marketing
2009
2009 42nd Hawaii International Conference on System Sciences
Experiment result shows that our model outperforms "popular author" and "review rating" methods in selecting influential reviewers. ...
The influence power indicator: trust is applied in the evaluation of our model and it considers thousands of human relationships among the real world. ...
This vicious cycle will lead to a failure in popular author judgment in the end. As Table 5 .3 shows, "review rating" method has larger error rate than "popular author". ...
doi:10.1109/hicss.2009.163
dblp:conf/hicss/LiLL09
fatcat:x62rygrjjng4xg4j7y6yywbxsm
Report on the Models of Trust for the Web workshop (MTW'06)
2006
SIGMOD record
The authors proposed a twodimensional scheme by adopting both indexical bias (differences in the sets of URLs retrieved) and content bias (deviations of content). ...
Session I : Trust Networks David Brondsema and Andrew Schamp described their work in using social trust networks to filter spam in "Konfidi: Trust Networks Using PGP and RDF". ...
doi:10.1145/1228268.1228282
fatcat:5i4b6xxyh5gsvc3jiymselx32e
A comparative study of heterogeneous item recommendations in social systems
2013
Information Sciences
In this paper we evaluate a number of tag-based recommendation approaches [15] that are adaptations of TF-IDF [3] and BM25 [53] Information Retrieval models, and are inspired on previous works on folksonomy-based ...
Esta es la versión de autor del artículo publicado en: This is an author produced version of a paper published in: Information Sciences 221 (2013): 142 -169 El acceso a la versión del editor puede requerir ...
Acknowledgments The work presented here was supported by the Spanish Ministry of Science and Innovation (TIN2011-28538-C02), and the Autonomous Community of Madrid (CCG10-UAM/TIC-5877). ...
doi:10.1016/j.ins.2012.09.039
fatcat:houxbiojzvc4pdtq3kjjllrexm
MUTT
2013
Proceedings of the First ACM SIGOPS Conference on Timely Results in Operating Systems - TRIOS '13
In this paper, we present the design and implementation of a Multi-User Taint Tracker (MUTT), which ensures that third-party applications adhere to access policies defined by service users. ...
Services such as Facebook and Twitter host and disseminate data on behalf of billions of users. ...
Our work was supported by the National Science Foundation under NSF awards CNS-0747283 and CNS-0916649. ...
doi:10.1145/2524211.2524215
dblp:conf/sosp/ShakimovC13
fatcat:sbvfjmysvjfhvkujcvi42f4way
Contributive Social Capital Extraction From Different Types of Online Data Sources
[article]
2019
arXiv
pre-print
The findings are compared and set in context to contributive social capital extraction. ...
In sociology the sum of (social) resources available to a person through their social network is often described as social capital. In this article, we look at social capital from a different angle. ...
[49] For the analysis of the social influence of an author Li et al. were interested in a user's connections within the network and their ability to control information flow. ...
arXiv:1902.07636v1
fatcat:n34kktfxrvarfkfzx34z2ywfdm
Social Relations and Methods in Recommender Systems: A Systematic Review
2021
International Journal of Interactive Multimedia and Artificial Intelligence
Currently, authors consider the user's historical behavior and find contextual information about the user, such as social relationships, time information, and location. ...
As the main findings, social relations were classified into three groups: trust, friend activities, and user interactions. ...
Acknowledgment The authors thank CONICET (Consejo Nacional de Investigaciones Científicas y Técnicas de Argentina) and AUIP (Asociación Universitaria Iberoamericana de Postgrado) for their support to the ...
doi:10.9781/ijimai.2021.12.004
fatcat:jeh6xkovwrfk5k5l2oqnczxrqu
Editorial
2017
Intelligent Data Analysis
The authors study people's trust and rating behavior with the Epinions dataset, which is a popular product review website allowing users to rate various categories of products. ...
Wan et al., in the next article of this issue, discuss that in the big data era, the efficient indexing of gradually increasing databases has become vitally important for information retrieval and to incrementally ...
In order to address this drawback, the authors propose a new information fusion method that is based on the Dempster-Shafer theory of evidence. ...
doi:10.3233/ida-170867
fatcat:gbom33nxzngvxe5tdx4rsps344
To Trust, or not to Trust: Highlighting the Need for Data Provenance in Mobile Apps for Smart Cities
2013
International Workshop on Information Management for Mobile Applications
How can identify if a given user and, consequently, the data generated by him/her, can be trusted? ...
On this paper, we present how the IES Cities' platform integrates the PROV Data Model and the related PROV-O ontology, allowing the exchange of provenance information about user-generated data in the context ...
In [9] the authors identify 19 parameters that affect how users determine trust in content provided by web information sources, such as the authority of the creator of the information or the popularity ...
dblp:conf/immoa/EmaldiPLLVM13
fatcat:zupeqhwi4nflbiyhtqobzv6otq
SocialTrust++: Building community-based trust in Social Information Systems
2010
Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing
Social information systems -popularized by Facebook, Wikipedia, Twitter, and other social websites -are emerging as a powerful new paradigm for distributed socialpowered information management. ...
The overall research goal of the SocialTrust++ project is to develop, analyze, deploy, and test algorithms for building, enabling, and leveraging communitybased trust in Social Information Systems. ...
Even with effective social spam filtering, we still face the challenge of assessing the relative trust (or authority) of users and resources in the Social Information System. ...
doi:10.4108/icst.collaboratecom.2010.40
dblp:conf/colcom/CaverleeCEHKKKKL10
fatcat:t6dytjhuljb65gf43s2dtralze
« Previous
Showing results 1 — 15 out of 53,663 results