This paper presents FraMark, a blockchain-based framework for 5G network management that utilizes Hyperledger Fabric and fractional Non-Fungible Tokens (NFTs) to optimize resource allocation. We introduce a comprehens...
详细信息
With the advent and rapid spread of microblogging services, web information management finds a new research topic. Although classical information retrieval methods and techniques help search engines and services to pr...
详细信息
In this paper we review and compare focused crawling strategies, studied and published during the past decade. Despite giant leaps in communication, storage and computing power in recent years, crawlers have always st...
详细信息
Documents and web pages share many similarities. Thus classification methods used in documents can be applied to advanced web content, with or even without modifications. Algorithms for document and web classification...
详细信息
This paper describes a methodology for rating the influence of a Twitter account in this famous microblogging service. Then it is evaluated over real accounts, under the belief that influence is not only a matter of q...
详细信息
Clone detection can be used to achieve diverse objectives such as refactoring, program understanding, bug localization, and plagiarism detection, etc. Each goal takes a different perspective on clone information needs...
详细信息
Clone detection can be used to achieve diverse objectives such as refactoring, program understanding, bug localization, and plagiarism detection, etc. Each goal takes a different perspective on clone information needs. Different clone detection tools report different information about clones. To gauge the suitability of a given clone detector for a particular user objective, we need to determine which information needs implied by the objective a clone detector addresses. In this paper, we make a first step toward gathering clone information needs from the description of user goals. The results of our analysis are useful for various stakeholders such as programmers, managers, tool developers, and researchers.
Researchers often come under pressure when facing the ever-increasing demand to produce a progressive number of publications, resorting to hiring the services of paper mills. These are unofficial, and often illegitima...
Researchers often come under pressure when facing the ever-increasing demand to produce a progressive number of publications, resorting to hiring the services of paper mills. These are unofficial, and often illegitimate, organizations providing ready-made questionable research components and services, posing a threat to the research integrity, scientific ecosystem, and publishers. Identifying paper mill material is a challenging and laborious process, while the increasing number of Artificial Intelligence services generating human-like text obstructs this process. The purpose of this paper is to contribute to the research integrity domain by proposing the PaperMill Detection manuscript screening framework. By leveraging contextual signals, it measures the probability of a document being the result of a paper mill organization or generated by Artificial Intelligence. The combination of these signals can facilitate the detection of questionable scientific content. Our evaluation has revealed that the proposed approach outperforms other open-source and commercial solutions in all examined evaluation metrics, achieving an F1 score of 0.97.
In this paper, we propose an iterative algorithm towards the automatic labeling of Twitter accounts in respect to thematic categories derived from DBpedia properties. We describe the rationale behind the selection of ...
详细信息
ISBN:
(纸本)9781509052479
In this paper, we propose an iterative algorithm towards the automatic labeling of Twitter accounts in respect to thematic categories derived from DBpedia properties. We describe the rationale behind the selection of these thematic categories, and discuss their evaluation assessment. Finally, we propose and analyze two generic and adaptable methodologies for discovering the necessary linked data resources for further enhancing the thematic description of Twitter accounts.
In this paper, we propose an ontology schema towards linking semantified Twitter social analytics with the Linked Open Data cloud. The ontology is deployed over a publicly available service that measures how influenti...
详细信息
ISBN:
(纸本)9781467383967
In this paper, we propose an ontology schema towards linking semantified Twitter social analytics with the Linked Open Data cloud. The ontology is deployed over a publicly available service that measures how influential a Twitter account is by combining its social activity in Twitter. According to our knowledge this is the first work that combines social analytics with the Linked Open Data (LOD) cloud.
In this paper, we propose a framework that uses latent information from Twitter images by employing the Google Cloud Vision API platform aiming at enriching social analytics with semantics and textual information. Our...
详细信息
ISBN:
(数字)9781728159195
ISBN:
(纸本)9781728159201
In this paper, we propose a framework that uses latent information from Twitter images by employing the Google Cloud Vision API platform aiming at enriching social analytics with semantics and textual information. Our study reveals that user-generated content, linked data as well as hidden concepts and textual information from social images can be highly considered for enriching social analytics. Finally, we publish our annotated dataset for further use and evaluation from our research community.
暂无评论