首页 > 最新文献

2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology最新文献

英文 中文
Comparison of Agent-Based and Population-Based Simulations of Displacement of Crime 基于主体和基于人口的犯罪转移模拟比较
T. Bosse, C. Gerritsen, M. Hoogendoorn, S. W. Jaffry, Jan Treur
Within criminology, the process of crime displacement is usually explained by referring to the interaction of three types of agents: criminals, passers-by, and guardians. Most existing simulation models of this process are agent-based. However, when the number of agents considered becomes large, population-based simulation has computational advantages over agent-based simulation. This paper presents both an agent-based and a population-based simulation model of crime displacement, and reports a comparative evaluation of the two models. In addition, an approach is put forward to analyse the behaviour of both models by means of formal techniques.
在犯罪学中,犯罪转移的过程通常通过参考三种类型的代理人的相互作用来解释:罪犯、路人和监护人。该过程的大多数现有仿真模型都是基于代理的。然而,当考虑的代理数量很大时,基于种群的仿真比基于代理的仿真具有计算优势。本文提出了基于主体和基于人口的犯罪迁移模拟模型,并对两种模型进行了比较评价。此外,本文还提出了一种利用形式化技术分析两种模型行为的方法。
{"title":"Comparison of Agent-Based and Population-Based Simulations of Displacement of Crime","authors":"T. Bosse, C. Gerritsen, M. Hoogendoorn, S. W. Jaffry, Jan Treur","doi":"10.1109/WIIAT.2008.333","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.333","url":null,"abstract":"Within criminology, the process of crime displacement is usually explained by referring to the interaction of three types of agents: criminals, passers-by, and guardians. Most existing simulation models of this process are agent-based. However, when the number of agents considered becomes large, population-based simulation has computational advantages over agent-based simulation. This paper presents both an agent-based and a population-based simulation model of crime displacement, and reports a comparative evaluation of the two models. In addition, an approach is put forward to analyse the behaviour of both models by means of formal techniques.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128022328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Co-occurrence Analysis Focused on Blogger Communities 关注博客社区的共现分析
Shin-ya Sato, K. Fukuda, Toshio Hirotsu, S. Kurihara, T. Sugawara
We studied the problem of finding a subspace of Web pages that is contextually consistent for co-occurrence analysis. We looked at blogs and proposed blogger-based co-occurrence analysis, which assumes that two items are relevant to each other if they appear in any of the blog entries posted by the same blogger. We show that (1) blogger-based analysis outperforms conventional page-based analysis in solving context-sensitive problems and that (2) analysis focused on bloggers forming a community yields better performance compared with that focused on isolated bloggers.
我们研究了为共现分析寻找上下文一致的网页子空间的问题。我们研究了博客,并提出了基于博客的共现分析,该分析假设如果两个条目出现在同一博客发布的任何博客条目中,则它们是相互相关的。我们表明:(1)基于博客的分析在解决上下文敏感问题方面优于传统的基于页面的分析;(2)专注于形成社区的博客的分析比专注于孤立的博客的分析产生更好的性能。
{"title":"Co-occurrence Analysis Focused on Blogger Communities","authors":"Shin-ya Sato, K. Fukuda, Toshio Hirotsu, S. Kurihara, T. Sugawara","doi":"10.1109/WIIAT.2008.28","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.28","url":null,"abstract":"We studied the problem of finding a subspace of Web pages that is contextually consistent for co-occurrence analysis. We looked at blogs and proposed blogger-based co-occurrence analysis, which assumes that two items are relevant to each other if they appear in any of the blog entries posted by the same blogger. We show that (1) blogger-based analysis outperforms conventional page-based analysis in solving context-sensitive problems and that (2) analysis focused on bloggers forming a community yields better performance compared with that focused on isolated bloggers.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125963023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intent-Driven Insider Threat Detection in Intelligence Analyses 情报分析中意图驱动的内部威胁检测
E. Santos, Hien Nguyen, Fei Yu, K. Kim, Deqing Li, J. T. Wilkinson, Adam Olson, Russell Jacob
When decisions need to be made in government, the intelligence community (IC) is tasked with analyzing the situation. This analysis is based on a huge amount of information and usually under severe time constraints. As such, it is particularly vulnerable to attacks from insiders with malicious intent. A malicious insider may alter, fabricate, or hide critical information in their analytical products, such as reports, in order to interfere with the decision making process. In this paper, we focus on detecting such malicious insiders. Malicious actions such as disinformation tend to be very subtle and thus difficult to detect. Therefore, we employ a user modeling technique to model an insider based on logged information and documents accessed while accomplishing an intelligence analysis task. We create a computational model for each insider and apply several detection metrics to analyze this model as it changes over time. If any deviation of behavior is detected, alerts can be issued. A pilot test revealed that the computed deviations had a high correlation with insiderspsila cognitive styles. Based on this finding, we designed a framework that minimized the impact of differences in cognitive styles. In our evaluation, we used data collected from intelligence analysts, and simulated malicious insiders based on this data. A high percentage of the simulated malicious insiders were successfully detected.
当政府需要做出决策时,情报机构(IC)的任务是分析形势。这种分析基于大量的信息,并且通常在严格的时间限制下进行。因此,它特别容易受到恶意内部人员的攻击。恶意的内部人员可能会改变、捏造或隐藏其分析产品(如报告)中的关键信息,以干扰决策过程。在本文中,我们专注于检测这些恶意内部人员。诸如虚假信息之类的恶意行为往往非常微妙,因此难以察觉。因此,我们采用用户建模技术,根据在完成情报分析任务时访问的记录信息和文档对内部人员进行建模。我们为每个内部人员创建一个计算模型,并应用几个检测指标来分析该模型随时间的变化。如果检测到任何行为偏差,则可以发出警报。一项初步测试显示,计算偏差与内部认知风格高度相关。基于这一发现,我们设计了一个框架,将认知风格差异的影响降到最低。在我们的评估中,我们使用了从情报分析师那里收集的数据,并基于这些数据模拟了恶意的内部人员。成功检测到很高比例的模拟恶意内部人员。
{"title":"Intent-Driven Insider Threat Detection in Intelligence Analyses","authors":"E. Santos, Hien Nguyen, Fei Yu, K. Kim, Deqing Li, J. T. Wilkinson, Adam Olson, Russell Jacob","doi":"10.1109/WIIAT.2008.376","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.376","url":null,"abstract":"When decisions need to be made in government, the intelligence community (IC) is tasked with analyzing the situation. This analysis is based on a huge amount of information and usually under severe time constraints. As such, it is particularly vulnerable to attacks from insiders with malicious intent. A malicious insider may alter, fabricate, or hide critical information in their analytical products, such as reports, in order to interfere with the decision making process. In this paper, we focus on detecting such malicious insiders. Malicious actions such as disinformation tend to be very subtle and thus difficult to detect. Therefore, we employ a user modeling technique to model an insider based on logged information and documents accessed while accomplishing an intelligence analysis task. We create a computational model for each insider and apply several detection metrics to analyze this model as it changes over time. If any deviation of behavior is detected, alerts can be issued. A pilot test revealed that the computed deviations had a high correlation with insiderspsila cognitive styles. Based on this finding, we designed a framework that minimized the impact of differences in cognitive styles. In our evaluation, we used data collected from intelligence analysts, and simulated malicious insiders based on this data. A high percentage of the simulated malicious insiders were successfully detected.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131447985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
An Analysis of Visual and Presentation Factors Influencing the Design of E-commerce Web Sites 影响电子商务网站设计的视觉与呈现因素分析
Banatus Soiraya, A. Mingkhwan, C. Haruechaiyasak
Two important factors which indirectly influence the Internet shoppers to make some online purchases are the visual layout and the presentation of web page. In this paper, we propose an approach of web page layout analysis in order to assess the design of e-commerce Web sites. Firstly, our proposed method segments each web page into five different blocks: top, left, center, right and bottom. We study three main feature types: spatial, location and presentation, which effect the design of each page. The spatial feature set includes the width-length ratio and relative area of each block while the location feature set is the appearance positions of e-commerce components such as navigation, product index and customer service. The presentation feature set represents page characteristic and navigation menu format that appear on the page or block such as navigator style, menu type, image alignment and text density. To perform the experiments, we consider the top 100 Internet retailers as ranked by the Internet Retailerpsilas Top 500 Guide. We adopt classification algorithms in order to construct a model from the top Web sites against other 100 randomly selected e-commerce Web sites. The experimental results showed that the model which is constructed based on the presentation feature set yields better performance than using the spatial and location feature sets.
间接影响网络购物者进行网上购物的两个重要因素是网页的视觉布局和呈现。本文提出了一种网页布局分析的方法来评估电子商务网站的设计。首先,我们提出的方法将每个网页分成五个不同的块:上、左、中、右和下。我们研究了三种主要的特征类型:空间、位置和呈现,它们影响着每个页面的设计。空间特征集包括每个区块的宽长比和相对面积,位置特征集是电子商务组件的外观位置,如导航、产品索引和客服。表示特性集表示出现在页面或块上的页面特征和导航菜单格式,例如导航器样式、菜单类型、图像对齐和文本密度。为了进行实验,我们考虑了互联网零售商500强指南中排名前100位的互联网零售商。我们采用分类算法,从顶级网站与其他100个随机选择的电子商务网站之间构建一个模型。实验结果表明,基于表示特征集构建的模型比使用空间和位置特征集构建的模型具有更好的性能。
{"title":"An Analysis of Visual and Presentation Factors Influencing the Design of E-commerce Web Sites","authors":"Banatus Soiraya, A. Mingkhwan, C. Haruechaiyasak","doi":"10.1109/WIIAT.2008.213","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.213","url":null,"abstract":"Two important factors which indirectly influence the Internet shoppers to make some online purchases are the visual layout and the presentation of web page. In this paper, we propose an approach of web page layout analysis in order to assess the design of e-commerce Web sites. Firstly, our proposed method segments each web page into five different blocks: top, left, center, right and bottom. We study three main feature types: spatial, location and presentation, which effect the design of each page. The spatial feature set includes the width-length ratio and relative area of each block while the location feature set is the appearance positions of e-commerce components such as navigation, product index and customer service. The presentation feature set represents page characteristic and navigation menu format that appear on the page or block such as navigator style, menu type, image alignment and text density. To perform the experiments, we consider the top 100 Internet retailers as ranked by the Internet Retailerpsilas Top 500 Guide. We adopt classification algorithms in order to construct a model from the top Web sites against other 100 randomly selected e-commerce Web sites. The experimental results showed that the model which is constructed based on the presentation feature set yields better performance than using the spatial and location feature sets.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134442278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Topic Detection and Tracking for Threaded Discussion Communities 线程讨论社区的主题检测和跟踪
Mingliang Zhu, Weiming Hu, Ou Wu
The threaded discussion communities are one of the most common forms of online communities, which are becoming more and more popular among web users. Everyday a huge amount of new discussions are added to these communities, which are difficult to summarize and search. In this paper, we propose a topic detection and tracking (TDT) method for the discussion threads. Most existing TDT methods deal with the news stories, but the language used in discussion data are much more casual, oral and informal compared with news data. To solve this problem, we design several extensions to the basic TDT framework, focusing on the very nature of discussion data, including a thread/post activity validation step, a term pos-weighting strategy, and a two-level decision framework considering not only the content similarity but also the user activity information. Experiment results show that our pro-posed method greatly improves current TDT methods in real discussion community environment. The discussion data can be better organized for searching and visualization with the help of TDT.
线程式讨论社区是网络社区中最常见的一种形式,越来越受到网络用户的欢迎。每天都有大量的新讨论被添加到这些社区中,这些讨论很难总结和搜索。本文提出了一种针对讨论线程的主题检测与跟踪方法。大多数现有的TDT方法处理的是新闻故事,但讨论数据中使用的语言与新闻数据相比更加随意、口头和非正式。为了解决这个问题,我们设计了几个基本TDT框架的扩展,重点关注讨论数据的本质,包括线程/帖子活动验证步骤,术语帖子权重策略,以及不仅考虑内容相似性而且考虑用户活动信息的两级决策框架。实验结果表明,在真实讨论社区环境下,我们提出的方法大大改进了现有的TDT方法。借助TDT,可以更好地组织讨论数据进行搜索和可视化。
{"title":"Topic Detection and Tracking for Threaded Discussion Communities","authors":"Mingliang Zhu, Weiming Hu, Ou Wu","doi":"10.1109/WIIAT.2008.50","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.50","url":null,"abstract":"The threaded discussion communities are one of the most common forms of online communities, which are becoming more and more popular among web users. Everyday a huge amount of new discussions are added to these communities, which are difficult to summarize and search. In this paper, we propose a topic detection and tracking (TDT) method for the discussion threads. Most existing TDT methods deal with the news stories, but the language used in discussion data are much more casual, oral and informal compared with news data. To solve this problem, we design several extensions to the basic TDT framework, focusing on the very nature of discussion data, including a thread/post activity validation step, a term pos-weighting strategy, and a two-level decision framework considering not only the content similarity but also the user activity information. Experiment results show that our pro-posed method greatly improves current TDT methods in real discussion community environment. The discussion data can be better organized for searching and visualization with the help of TDT.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134453123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Resource Planning Heuristics for Service-Oriented Workflows 面向服务工作流的资源规划启发式方法
J. Eckert, D. Ertogrul, André Miede, N. Repp, R. Steinmetz
Resource allocation and resource planning, especially in a SOA and grid environment, become crucial. Particularly, in an environment with a huge number of workflow consumers requesting a decentralized cross-organizational workflow, performance evaluation and execution-management of service-oriented workflows gain in importance. The need for an effective and efficient workflow management forces enterprises to use intelligent optimization models and heuristics to compose workflows out of several services under real-time conditions. This paper introduces the required architecture workflow performance extension - WPX.KOM for resource planning and workload prediction purposes. Furthermore, optimization approaches and a high-performance heuristic solving the addressed resource planning problem with low computational overhead are presented.
资源分配和资源规划,特别是在SOA和网格环境中,变得至关重要。特别是,在有大量工作流使用者要求分散的跨组织工作流的环境中,面向服务的工作流的性能评估和执行管理变得非常重要。对有效和高效工作流管理的需求迫使企业使用智能优化模型和启发式方法在实时条件下将多个服务组成工作流。本文介绍了所需的架构工作流性能扩展——WPX。KOM用于资源规划和工作负荷预测。在此基础上,提出了求解资源规划问题的优化方法和一种低计算量的高性能启发式算法。
{"title":"Resource Planning Heuristics for Service-Oriented Workflows","authors":"J. Eckert, D. Ertogrul, André Miede, N. Repp, R. Steinmetz","doi":"10.1109/WIIAT.2008.108","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.108","url":null,"abstract":"Resource allocation and resource planning, especially in a SOA and grid environment, become crucial. Particularly, in an environment with a huge number of workflow consumers requesting a decentralized cross-organizational workflow, performance evaluation and execution-management of service-oriented workflows gain in importance. The need for an effective and efficient workflow management forces enterprises to use intelligent optimization models and heuristics to compose workflows out of several services under real-time conditions. This paper introduces the required architecture workflow performance extension - WPX.KOM for resource planning and workload prediction purposes. Furthermore, optimization approaches and a high-performance heuristic solving the addressed resource planning problem with low computational overhead are presented.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131762041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
The Metadata Triumvirate: Social Annotations, Anchor Texts and Search Queries 元数据三巨头:社交注释、锚文本和搜索查询
Michael G. Noll, C. Meinel
In this paper, we study and compare three different but related types of metadata about Web documents: social annotations provided by readers of Web documents, hyperlink anchor text provided by authors of Web documents, and search queries of users trying to find Web documents. We introduce a large research data set called CABS120k, which we have created for this study from a variety of information sources such as AOL500k, the Open Directory Project, del.icio.us/Yahoo!, Google and the WWW in general. We use this data set to investigate several characteristics of said metadata including length, novelty, diversity, and similarity and discuss theoretical and practical implications.
在本文中,我们研究并比较了三种不同但相关的Web文档元数据类型:Web文档读者提供的社交注释,Web文档作者提供的超链接锚文本,以及试图查找Web文档的用户的搜索查询。我们介绍了一个名为CABS120k的大型研究数据集,它是我们为本研究从各种信息源(如AOL500k、开放目录项目、del.icio.us/Yahoo)创建的!b谷歌和一般的WWW。我们使用该数据集来研究所述元数据的几个特征,包括长度、新颖性、多样性和相似性,并讨论理论和实践意义。
{"title":"The Metadata Triumvirate: Social Annotations, Anchor Texts and Search Queries","authors":"Michael G. Noll, C. Meinel","doi":"10.1109/WIIAT.2008.341","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.341","url":null,"abstract":"In this paper, we study and compare three different but related types of metadata about Web documents: social annotations provided by readers of Web documents, hyperlink anchor text provided by authors of Web documents, and search queries of users trying to find Web documents. We introduce a large research data set called CABS120k, which we have created for this study from a variety of information sources such as AOL500k, the Open Directory Project, del.icio.us/Yahoo!, Google and the WWW in general. We use this data set to investigate several characteristics of said metadata including length, novelty, diversity, and similarity and discuss theoretical and practical implications.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130958538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Fostering Web Intelligence by Semi-automatic OWL Ontology Refinement 通过半自动OWL本体精化培养Web智能
Johanna Völker, S. Rudolph
In this paper, we propose a systematic, reasoner-aided approach to Web ontology acquisition and refinement. It complements methods for acquiring expressive ontology axioms from textual definitions with methodic knowledge exploration techniques based on formal concept analysis. We demonstrate the practical relevance of our approach by means of a real-world example.
在本文中,我们提出了一种系统的、推理辅助的方法来获取和改进Web本体。它补充了从文本定义中获取表达本体公理的方法和基于形式概念分析的有条理的知识探索技术。我们通过一个现实世界的例子来证明我们的方法的实际意义。
{"title":"Fostering Web Intelligence by Semi-automatic OWL Ontology Refinement","authors":"Johanna Völker, S. Rudolph","doi":"10.1109/WIIAT.2008.36","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.36","url":null,"abstract":"In this paper, we propose a systematic, reasoner-aided approach to Web ontology acquisition and refinement. It complements methods for acquiring expressive ontology axioms from textual definitions with methodic knowledge exploration techniques based on formal concept analysis. We demonstrate the practical relevance of our approach by means of a real-world example.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132823947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Nowhere to Hide: Finding Plagiarized Documents Based on Sentence Similarity 无处可藏:基于句子相似度查找剽窃文档
Nathaniel Gustafson, M. S. Pera, Yiu-Kai Ng
Plagiarism is a serious problem that infringes copyrighted documents/materials, which is an unethical practice and decreases the economic incentive received by authors (owners) of the original copies. Unfortunately, plagiarism is getting worse due to the increasing number of on-line publications on the Web, which facilitates locating and paraphrasing information. In solving this problem, we propose a novel plagiarism-detection method, called SimPaD, which (i) establishes the degree of resemblance between any two documents D1 and D2 based on their sentence-to-sentence similarity computed by using pre-defined word-correlation factors, and (ii) generates agraphical view of sentences that are similar (or the same) in D1 and D2. Experimental results verify that SimPaD is highly accurate in detecting (non-) plagiarized documents and outperforms existing plagiarism-detection approaches.
抄袭是一个严重的问题,它侵犯了受版权保护的文件/材料,这是一种不道德的做法,并减少了原始副本的作者(所有者)获得的经济激励。不幸的是,由于网络上的在线出版物越来越多,这使得定位和解释信息变得更加容易,剽窃现象越来越严重。为了解决这一问题,我们提出了一种名为SimPaD的新型剽窃检测方法,该方法(i)通过使用预定义的单词相关因子计算任意两个文档D1和D2之间的句子相似度,并(ii)生成D1和D2中相似(或相同)句子的图形视图。实验结果表明SimPaD在检测(非)剽窃文档方面具有很高的准确性,并且优于现有的剽窃检测方法。
{"title":"Nowhere to Hide: Finding Plagiarized Documents Based on Sentence Similarity","authors":"Nathaniel Gustafson, M. S. Pera, Yiu-Kai Ng","doi":"10.1109/WIIAT.2008.16","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.16","url":null,"abstract":"Plagiarism is a serious problem that infringes copyrighted documents/materials, which is an unethical practice and decreases the economic incentive received by authors (owners) of the original copies. Unfortunately, plagiarism is getting worse due to the increasing number of on-line publications on the Web, which facilitates locating and paraphrasing information. In solving this problem, we propose a novel plagiarism-detection method, called SimPaD, which (i) establishes the degree of resemblance between any two documents D1 and D2 based on their sentence-to-sentence similarity computed by using pre-defined word-correlation factors, and (ii) generates agraphical view of sentences that are similar (or the same) in D1 and D2. Experimental results verify that SimPaD is highly accurate in detecting (non-) plagiarized documents and outperforms existing plagiarism-detection approaches.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132824499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Pervasive Web News Recommendation for Visually Impaired People 针对视障人士的普遍网络新闻推荐
Wei Chen, Lijun Zhang, C. Wang, Chun Chen, Jiajun Bu
It is very difficult for blind and visually-impaired people getting information from the outside world. In this paper, we propose an adaptive Web news recommendation system named EagleRadio, designed for blind man and supports pervasive access using terminals. EagleRadio offers natural and user-friendly interface. News stories from different topics are read via a speech synthesizer to users and they can use commands to navigate inside the news space. Based on the analyzing of userpsilas listening history, adaptive topic navigation and news recommendation methods help users reaching relevant topics quickly and push the most relevant news to them. Finally, we evaluate the proposed algorithms and quantify the effect of EagleRadio from a userpsilas perspective.
盲人和视障人士很难从外界获取信息。本文提出了一种面向盲人的、支持终端普及访问的自适应Web新闻推荐系统EagleRadio。EagleRadio提供自然和用户友好的界面。来自不同主题的新闻故事通过语音合成器阅读给用户,用户可以使用命令在新闻空间中导航。自适应话题导航和新闻推荐方法基于对用户收听历史的分析,帮助用户快速到达相关话题,并向用户推送最相关的新闻。最后,我们评估了所提出的算法,并从用户的角度量化了EagleRadio的效果。
{"title":"Pervasive Web News Recommendation for Visually Impaired People","authors":"Wei Chen, Lijun Zhang, C. Wang, Chun Chen, Jiajun Bu","doi":"10.1109/WIIAT.2008.43","DOIUrl":"https://doi.org/10.1109/WIIAT.2008.43","url":null,"abstract":"It is very difficult for blind and visually-impaired people getting information from the outside world. In this paper, we propose an adaptive Web news recommendation system named EagleRadio, designed for blind man and supports pervasive access using terminals. EagleRadio offers natural and user-friendly interface. News stories from different topics are read via a speech synthesizer to users and they can use commands to navigate inside the news space. Based on the analyzing of userpsilas listening history, adaptive topic navigation and news recommendation methods help users reaching relevant topics quickly and push the most relevant news to them. Finally, we evaluate the proposed algorithms and quantify the effect of EagleRadio from a userpsilas perspective.","PeriodicalId":393772,"journal":{"name":"2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133572729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1