Sciweavers

1691 search results - page 252 / 339
» Restricted subset selection
Sort
View
CIKM
2010
Springer
15 years 2 months ago
Detecting product review spammers using rating behaviors
This paper aims to detect users generating spam reviews or review spammers. We identify several characteristic behaviors of review spammers and model these behaviors so as to dete...
Ee-Peng Lim, Viet-An Nguyen, Nitin Jindal, Bing Li...
156
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Pressure Routing for Underwater Sensor Networks
—A SEA Swarm (Sensor Equipped Aquatic Swarm) is a sensor cloud that drifts with water currents and enables 4D (space and time) monitoring of local underwater events such as conta...
Uichin Lee, Paul Wang, Youngtae Noh, Luiz Filipe M...
133
Voted
ISVC
2010
Springer
15 years 2 months ago
Organizing and Browsing Image Search Results Based on Conceptual and Visual Similarities
This paper presents a novel approach for searching images online using textual queries and presenting the resulting images based on both conceptual and visual similarities. Given a...
Grant Strong, Enamul Hoque, Minglun Gong, Orland H...
142
Voted
KDD
2010
ACM
244views Data Mining» more  KDD 2010»
15 years 2 months ago
Finding effectors in social networks
Assume a network (V, E) where a subset of the nodes in V are active. We consider the problem of selecting a set of k active nodes that best explain the observed activation state, ...
Theodoros Lappas, Evimaria Terzi, Dimitrios Gunopu...
122
Voted
TIFS
2010
128views more  TIFS 2010»
15 years 1 months ago
Steganalysis by subtractive pixel adjacency matrix
This paper presents a novel method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which...
Tomás Pevný, Patrick Bas, Jessica J....