Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Engineering

A Framework For Recommendation Of Highly Popular News Lacking Social Feedback, Nuno Moniz, Luís Torgo, Magdalini Eirinaki, Paula Branco Oct 2017

A Framework For Recommendation Of Highly Popular News Lacking Social Feedback, Nuno Moniz, Luís Torgo, Magdalini Eirinaki, Paula Branco

Faculty Publications

Social media is rapidly becoming the main source of news consumption for users, raising significant challenges to news aggregation and recommendation tasks. One of these challenges concerns the recommendation of very recent news. To tackle this problem, approaches to the prediction of news popularity have been proposed. In this paper, we study the task of predicting news popularity upon their publication, when social feedback is unavailable or scarce, and to use such predictions to produce news rankings. Unlike previous work, we focus on accurately predicting highly popular news. Such cases are rare, causing known issues for standard prediction models and …


Multi-Valued Sequences Generated By Power Residue Symbols Over Odd Characteristic Fields, Begum Nasima, Yasuyuki Nogami, Satoshi Uehara, Robert Morelos-Zaragoza Apr 2017

Multi-Valued Sequences Generated By Power Residue Symbols Over Odd Characteristic Fields, Begum Nasima, Yasuyuki Nogami, Satoshi Uehara, Robert Morelos-Zaragoza

Faculty Publications

This paper proposes a new approach for generating pseudo random multi-valued (including binary-valued) sequences. The approach uses a primitive polynomial over an odd characteristic prime field $\f{p}$, where p is an odd prime number. Then, for the maximum length sequence of vectors generated by the primitive polynomial, the trace function is used for mapping these vectors to scalars as elements in the prime field. Power residue symbol (Legendre symbol in binary case) is applied to translate the scalars to k-value scalars, where k is a prime factor of p-1. Finally, a pseudo random k-value sequence is obtained. Some important properties …


Robust And Agile System Against Fault And Anomaly Traffic In Software Defined Networks, Mihui Kim, Younghee Park, Rohit Kotalwar Jan 2017

Robust And Agile System Against Fault And Anomaly Traffic In Software Defined Networks, Mihui Kim, Younghee Park, Rohit Kotalwar

Faculty Publications

The main advantage of software defined networking (SDN) is that it allows intelligent control and management of networking though programmability in real time. It enables efficient utilization of network resources through traffic engineering, and offers potential attack defense methods when abnormalities arise. However, previous studies have only identified individual solutions for respective problems, instead of finding a more global solution in real time that is capable of addressing multiple situations in network status. To cover diverse network conditions, this paper presents a comprehensive reactive system for simultaneously monitoring failures, anomalies, and attacks for high availability and reliability. We design three …


Impact Of Reviewer Social Interaction On Online Consumer Review Fraud Detection, Kunal Goswami, Younghee Park, Chungsik Song Jan 2017

Impact Of Reviewer Social Interaction On Online Consumer Review Fraud Detection, Kunal Goswami, Younghee Park, Chungsik Song

Faculty Publications

Background Online consumer reviews have become a baseline for new consumers to try out a business or a new product. The reviews provide a quick look into the application and experience of the business/product and market it to new customers. However, some businesses or reviewers use these reviews to spread fake information about the business/product. The fake information can be used to promote a relatively average product/business or can be used to malign their competition. This activity is known as reviewer fraud or opinion spam. The paper proposes a feature set, capturing the user social interaction behavior to identify fraud. …