Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Authentication in outsourced databases (1)
- Artificial Intelligence (1)
- Collaboration (1)
- Computer Application in Social and Behavioral Sciences (1)
- Computer Communication Networks (1)
-
- Data Mining and Knowledge Discovery (1)
- Database Authentication (1)
- Defense strategies (1)
- Electromagnetic waves (1)
- Information Systems Applications (1)
- Link spam (1)
- Measurement study (1)
- Numerical modeling (1)
- Query result verification (1)
- Singapore (1)
- Soil (1)
- Spam attack model (1)
- User Interfaces and Human Computer Interaction (1)
- Wiki (1)
Articles 1 - 5 of 5
Full-Text Articles in Computer Sciences
Link Spamming Wikipedia For Profit, Andrew West, Jian Chang, Krishna Venkatasubramanian, Oleg Sokolsky, Insup Lee
Link Spamming Wikipedia For Profit, Andrew West, Jian Chang, Krishna Venkatasubramanian, Oleg Sokolsky, Insup Lee
Oleg Sokolsky
Collaborative functionality is an increasingly prevalent web technology. To encourage participation, these systems usually have low barriers-to-entry and permissive privileges. Unsurprisingly, ill-intentioned users try to leverage these characteristics for nefarious purposes. In this work, a particular abuse is examined -- link spamming -- the addition of promotional or otherwise inappropriate hyperlinks.
Our analysis focuses on the "wiki" model and the collaborative encyclopedia, Wikipedia, in particular. A principal goal of spammers is to maximize *exposure*, the quantity of people who view a link. Creating and analyzing the first Wikipedia link spam corpus, we find that existing spam strategies perform quite poorly …
Social Sensing For Urban Crisis Management: The Case Of Singapore Haze, Philips Kokoh Prasetyo, Ming Gao, Ee Peng Lim, Christie N. Scollon
Social Sensing For Urban Crisis Management: The Case Of Singapore Haze, Philips Kokoh Prasetyo, Ming Gao, Ee Peng Lim, Christie N. Scollon
Ming Gao
Sensing social media for trends and events has become possible as increasing number of users rely on social media to share information. In the event of a major disaster or social event, one can therefore study the event quickly by gathering and analyzing social media data. One can also design appropriate responses such as allocating resources to the affected areas, sharing event related information, and managing public anxiety. Past research on social event studies using social media often focused on one type of data analysis (e.g., hashtag clusters, diffusion of events, influential users, etc.) on a single social media data …
Electromagnetic Waves In Contaminated Soils, Arvin Farid, Akram Alshawabkeh, Carey Rappaport
Electromagnetic Waves In Contaminated Soils, Arvin Farid, Akram Alshawabkeh, Carey Rappaport
Akram N. Alshawabkeh
No abstract provided.
Mining And Ranking Generators Of Sequential Pattern, David Lo, Siau-Cheng Khoo, Jinyan Li
Mining And Ranking Generators Of Sequential Pattern, David Lo, Siau-Cheng Khoo, Jinyan Li
David LO
Sequential pattern mining ¯rst proposed by Agrawal and Srikant has received intensive research due to its wide range applicability in many real-life domains. Various improvements have been proposed which include mining a closed set of sequential patterns. Sequential patterns supported by the same sequences in the database can be considered as belonging to an equivalence class. Each equivalence class contains patterns partially-ordered by sub-sequence relationship and having the same support. Within an equivalence class, the set of maximal and minimal patterns are referred to as closed patterns and generators respectively. Generators used together with closed patterns can provide additional information …
Partially Materialized Digest Scheme: An Efficient Verification Method For Outsourced Databases, Kyriakos Mouratidis, Dimitris Sacharidis, Hwee Hwa Pang
Partially Materialized Digest Scheme: An Efficient Verification Method For Outsourced Databases, Kyriakos Mouratidis, Dimitris Sacharidis, Hwee Hwa Pang
Kyriakos MOURATIDIS
In the outsourced database model, a data owner publishes her database through a third-party server; i.e., the server hosts the data and answers user queries on behalf of the owner. Since the server may not be trusted, or may be compromised, users need a means to verify that answers received are both authentic and complete, i.e., that the returned data have not been tampered with, and that no qualifying results have been omitted. We propose a result verification approach for one-dimensional queries, called Partially Materialized Digest scheme (PMD), that applies to both static and dynamic databases. PMD uses separate indexes …