Search For:

Displaying 1-24 out of 24 total
Towards Building a Personalized Online Web Spam Detector in Intelligent Web Browsers
Found in: 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)
By Cailing Dong,Bin Zhou,Lina Zhou
Issue Date:November 2013
pp. 585-590
Most of the extant studies about web spam detection either explicitly or implicitly assume that web spam detection is performed on the server side of a search engine. In this paper, we argue that in some scenarios, web spam detection is preferred to be con...
Social Network Based Recommendation Systems: A Short Survey
Found in: 2013 International Conference on Social Computing (SocialCom)
By Song Chen,Samuel Owusu,Lina Zhou
Issue Date:September 2013
pp. 882-885
This paper examines the background of the recommender systems and the state-of-art technologies in this current research area. We examined the needs for recommendation systems and the enhanced performance by using the additional social network information....
Trends & Controversies
Found in: IEEE Intelligent Systems
By Anton Nijholt,Ronald C. Arkin,Sébastien Brault,Richard Kulpa,Franck Multon,Benoit Bideau,David Traum,Hayley Hung,Eugene Santos Jr.,Deqing Li,Fei Yu,Lina Zhou,Dongsong Zhang
Issue Date:November 2012
pp. 60-75
Many applications require knowledge about how to deceive, including those related to safety, security, and warfare. Speech and text analysis can help detect deception, as can cameras, microphones, physiological sensors, and intelligent software. Models of ...
Complicated Logistics Network Redesign Considering Service Differentiation
Found in: 2012 16th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2012)
By Lina Zhou,Xiaofei Xu,Shengchun Deng,Xudong Liu
Issue Date:September 2012
pp. 93-102
Logistics network design is a strategic issue for nearly all companies. In the past, a logistics network once established was used for several periods. However, recent years have seen a rapidly changing economic environment. Trends in markets, shifts of cu...
Design of the Urban Public Logistics Information Platform
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Zhu Yanru, Mao Lina, Zhou Guiliang
Issue Date:April 2010
pp. 550-553
The urban public logistics information platform will integrate various logistics resources of the city effectively, improve the logistics operation efficiency, and reduce the cost, enhance the integral competitiveness, and thus further advance the integral...
A Control Flow Graph Reconstruction Method from Binaries Based on XML
Found in: Computer Science-Technology and Applications, International Forum on
By Wenjian Yin, Liehui Jiang, Qing Yin, Lina Zhou, Jizhong Li
Issue Date:December 2009
pp. 226-229
The first step of decompilation and other reverse analysis for binary codes is constructing control flow graph of program. Due to the loss of structure in compiled code, extracting a control flow graph from an executable is not simply a matter. The usual w...
Cues to Deception in Online Chinese Groups
Found in: Hawaii International Conference on System Sciences
By Lina Zhou, Yu-wei Sung
Issue Date:January 2008
pp. 146
Advancing our knowledge about cues to deception is crucial to successful deception detection. A lengthy list of cues to deception has been identified via a myriad of deception studies. Nonetheless, we identified two major limitations of existing cues to de...
An Exploratory Study on the Evolution of OSS Developer Communities
Found in: Hawaii International Conference on System Sciences
By Kawin Ngamkajornwiwat, Dongsong Zhang, A. Günes Koru, Lina Zhou, and Robert Nolker
Issue Date:January 2008
pp. 305
Software is developed in a dynamic context where team structure, requirements, and processes evolve together with the product. Although researchers have been studying the evolution of software systems since the early 70s, the study on the evolution of soft...
A Statistical Language Modeling Approach to Online Deception Detection
Found in: IEEE Transactions on Knowledge and Data Engineering
By Lina Zhou, Yongmei Shi, Dongsong Zhang
Issue Date:August 2008
pp. 1077-1081
<p><b>Abstract</b>—Online deception is disrupting our daily life, organizational process, and even national security. Existing approaches to online deception detection follow a traditional paradigm by using a set of cues as antecedents fo...
The Impact of National Culture and Social Pr esence on Trust and Communication Quality within Collabor ative Groups
Found in: Hawaii International Conference on System Sciences
By Paul Benjamin Lowry, Dongsong Zhang, Lina Zhou, Xiaolan Fu
Issue Date:January 2007
pp. 12a
In this empirical study we examine the impact of national culture and social presence on interpersonal trust in both culturally homogeneous and heterogeneous groups. Results demonstrate that interpersonal trust is higher in homogeneous, lowindividualism gr...
Robust L_2 L \infty Filtering for Uncertain Systems with Pole and Error Variance Constraints
Found in: Innovative Computing ,Information and Control, International Conference on
By Xiaohua Liu, Lina Zhou
Issue Date:September 2006
pp. 516-519
This paper is concerned with the problem of designing a robust L_2 L\infty filter for a class of uncertain systems subject to error variance and circular pole constraints. Specifically, we aim to design a filter such that the L_ L\infty norm of the filteri...
On Detecting Deception in Agent Societies
Found in: Intelligent Agent Technology, IEEE / WIC / ACM International Conference on
By Amrish Vyas, Lina Zhou
Issue Date:September 2005
pp. 491-494
<p>Driven by the advances in intelligent agent technologies, agent societies have taken on prominent roles in various sciences and applications. Research on risks posed to such societies such as deception by malicious agents has recently begun gainin...
Social Computing and Weighting to Identify Member Roles in Online Communities
Found in: Web Intelligence, IEEE / WIC / ACM International Conference on
By Robert D. Nolker, Lina Zhou
Issue Date:September 2005
pp. 87-93
As more and more people join online communities, the ability to better understand members? roles becomes critical to preserving and improving the health of those communities. We propose a novel approach to identifying key members and their roles by discove...
Applying the Na?ve Bayes Classifier to Assist Users in Detecting Speech Recognition Errors
Found in: Hawaii International Conference on System Sciences
By Lina Zhou, Jinjuan Feng, Andrew Sears, Yongmei Shi
Issue Date:January 2005
pp. 183b
Speech recognition (SR) is a technology that can improve accessibility to computer systems for people with physical disabilities or situation-introduced disabilities. The wide adoption of SR technology; however, is hampered by the difficulty in correcting ...
Modeling and Handling Uncertainty in Deception Detection
Found in: Hawaii International Conference on System Sciences
By Lina Zhou, Azene Zenebe
Issue Date:January 2005
pp. 23a
Deception detection (DD) is infused with uncertainty due to vagueness and imprecision. To address the above issue, we developed a Model of Uncertainty in Deception Detection (MUDD) and selected the Neuro-Fuzzy classifier to predict deception. A Neuro-fuzzy...
Movie Review Mining: a Comparison between Supervised and Unsupervised Classification Approaches
Found in: Hawaii International Conference on System Sciences
By Pimwadee Chaovalit, Lina Zhou
Issue Date:January 2005
pp. 112c
Web content mining is intended to help people discover valuable information from large amount of unstructured data on the web. Movie review mining classifies movie reviews into two polarities: positive and negative. As a type of sentiment-based classificat...
How the Semantic Web is Being Used: An Analysis of FOAF Documents
Found in: Hawaii International Conference on System Sciences
By Li Ding, Lina Zhou, Tim Finin, Anupam Joshi
Issue Date:January 2005
pp. 113c
Semantic Web researchers have initially focused on the representation, development and use of ontologies but paid less attention to the social and structural relationships involved. The past year has seen a dramatic increase in the amount of published RDF ...
Building a Misinformation Ontology
Found in: Web Intelligence, IEEE / WIC / ACM International Conference on
By Lina Zhou, Dongsong Zhang
Issue Date:September 2004
pp. 445-448
The importance of misinformation research has received wide recognition. However, one major challenge facing the research community is the lack of misinformation data and the difficulty in managing such data. Motivated by the role of ontology in informatio...
Can Online Behavior Unveil Deceivers? — An Exploratory Investigation of Deception in Instant Messaging
Found in: Hawaii International Conference on System Sciences
By Lina Zhou, Dongsong Zhang
Issue Date:January 2004
pp. 10022a
Deception has been extensively studied in many disciplines in social science. With the increasing use of instant messaging (IM) in both informal communication and performing tasks in work place, deception in IM is emerging as an important issue. In this st...
An Exploratory Study into Deception Detection in Text-Based Computer-Mediated Communication
Found in: Hawaii International Conference on System Sciences
By Lina Zhou, Douglas P. Twitchell, Tiantian Qin, Judee K. Burgoon, Jay F. Nunamaker, Jr.
Issue Date:January 2003
pp. 44b
Deception is an everyday occurrence across all communication media. The expansion of the Internet has significantly increased the amount of textual communication received and stored by individuals and organizations. Inundated with massive amounts of textua...
ColD SPA: A Tool For Collaborative Process Model Development
Found in: Hawaii International Conference on System Sciences
By James D. Lee, Dongsong Zhang, Eric Santanen, Lina Zhou, Ann M. Hickey
Issue Date:January 2000
pp. 1004
Awareness of the need for business analysis has grown faster than the evolution of tools to support collaborative development of business analysis models. Involvement of key personnel is important for model accuracy and buy-in, which is not trivial, especi...
Following linguistic footprints: automatic deception detection in online communication
Found in: Communications of the ACM
By Dongsong Zhang, Lina Zhou, Dongsong Zhang, Lina Zhou
Issue Date:September 2008
pp. 101-104
Last month (August 2008, p. 104) Peter Winkler posed a trio of brain teasers in his "Puzzled" column. Here, he offers some solutions. How well did you do?
Trust Based Knowledge Outsourcing for Semantic Web Agents
Found in: Web Intelligence, IEEE / WIC / ACM International Conference on
By Li Ding, Lina Zhou, Timothy Finin
Issue Date:October 2003
pp. 379
The Semantic Web enables intelligent agents to
Clustered service rank in support of web service discovery
Found in: Proceedings of the 2012 iConference (iConference '12)
By Aryya Gangopadhyay, Lina Zhou, Ali Azari
Issue Date:February 2012
pp. 508-509
Service registries are overwhelmed by the ever-increasing number of Web services. The scale of Web services pose challenges to Web service discovery and composition. To address the above challenges, we propose a method called Clustered Service Rank (CSR) t...