Sciweavers

27 search results - page 3 / 6
» Fighting Censorship with Algorithms
Sort
View
COOPIS
2002
IEEE
13 years 10 months ago
A Decentralized Algorithm for Coordinating Independent Peers: An Initial Examination
Abstract. Peer-to-peer (P2P) applications are composed of a distributed collection of peers that cooperate in order to perform some common task. Though P2P applications have attrac...
Girish Suryanarayana, Richard N. Taylor
TITS
2010
286views Education» more  TITS 2010»
13 years 15 days ago
Understanding Transit Scenes: A Survey on Human Behavior-Recognition Algorithms
Visual surveillance is an active research topic in image processing. Transit systems are actively seeking new or improved ways to use technology to deter and respond to accidents, ...
Joshua Candamo, Matthew Shreve, Dmitry B. Goldgof,...
WWW
2009
ACM
14 years 6 months ago
Detecting image spam using local invariant features and pyramid match kernel
Image spam is a new obfuscating method which spammers invented to more effectively bypass conventional text based spam filters. In this paper, we extract local invariant features ...
Haiqiang Zuo, Weiming Hu, Ou Wu, Yunfei Chen, Guan...
WWW
2006
ACM
14 years 6 months ago
Detecting nepotistic links by language model disagreement
In this short note we demonstrate the applicability of hyperlink downweighting by means of language model disagreement. The method filters out hyperlinks with no relevance to the ...
András A. Benczúr, István B&i...
WWW
2010
ACM
14 years 21 days ago
Measurement and analysis of an online content voting network: a case study of Digg
In online content voting networks, aggregate user activities (e.g., submitting and rating content) make high-quality content thrive through the unprecedented scale, high dynamics ...
Yingwu Zhu