Sciweavers

219 search results - page 37 / 44
» Detecting spammers on social networks
Sort
View
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
16 years 5 days ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau
MEDIAFORENSICS
2010
15 years 1 months ago
Forensic hash for multimedia information
Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social netw...
Wenjun Lu, Avinash L. Varna, Min Wu
KDD
2012
ACM
271views Data Mining» more  KDD 2012»
13 years 2 months ago
GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the Web g...
U. Kang, Evangelos E. Papalexakis, Abhay Harpale, ...
84
Voted
UM
2010
Springer
15 years 4 months ago
Twitter, Sensors and UI: Robust Context Modeling for Interruption Management
In this paper, we present the results of a two-month field study of fifteen people using a software tool designed to model changes in a user’s availability. The software uses s...
Justin Tang, Donald J. Patterson
AAIM
2007
Springer
118views Algorithms» more  AAIM 2007»
15 years 3 months ago
Significance-Driven Graph Clustering
Abstract. Modularity, the recently defined quality measure for clusterings, has attained instant popularity in the fields of social and natural sciences. We revisit the rationale b...
Marco Gaertler, Robert Görke, Dorothea Wagner