Sciweavers

61 search results - page 10 / 13
» Blog Spam: A Review
Sort
View
NETWORK
2008
94views more  NETWORK 2008»
13 years 7 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo
21
Voted
WSDM
2009
ACM
138views Data Mining» more  WSDM 2009»
14 years 2 months ago
Adaptive subjective triggers for opinionated document retrieval
This paper proposes a novel application of a statistical language model to opinionated document retrieval targeting weblogs (blogs). In particular, we explore the use of the trigg...
Kazuhiro Seki, Kuniaki Uehara
WWW
2005
ACM
14 years 8 months ago
Opinion observer: analyzing and comparing opinions on the Web
The Web has become an excellent source for gathering consumer opinions. There are now numerous Web sites containing such opinions, e.g., customer reviews of products, forums, disc...
Bing Liu, Minqing Hu, Junsheng Cheng
SGAI
2007
Springer
14 years 1 months ago
Selecting Bi-Tags for Sentiment Analysis of Text
Sentiment Analysis aims to determine the overall sentiment orientation of a given input text. One motivation for research in this area is the need for consumer related industries t...
Rahman Mukras, Nirmalie Wiratunga, Robert Lothian
CSE
2009
IEEE
13 years 8 months ago
Social Relationship Identification: An Example of Social Query
Every moment, millions of people worldwide are communicating and sharing content online. We express ourselves online to enrich existing relationships and establish new relationship...
Christopher P. Diehl, Jaime Montemayor, Michael Pe...