Uncovering Plagiarism, Authorship, and Social Software Misuse

Size: px
Start display at page:

Download "Uncovering Plagiarism, Authorship, and Social Software Misuse"

Transcription

1 Uncovering Plagiarism, Authorship, and Social Software Misuse Bauhaus-Universität Weimar Universitat Politècnica de València University of Lugano Duquesne University Universitat Politècnica de Catalunya University of the Aegean Bar-Ilan University Illinois Institute of Technology Martin Potthast, Tim Gollub, Maik Anderka, Matthias Hagen, Jan Graßegger, Johannes Kiesel, Maximilian Michel, Arnd Oberländer, Martin Tippmann, and Benno Stein Parth Gupta and Paolo Rosso Giacomo Inches and Fabio Crestani Patrick Juola Alberto Barrón-Cedeño Efstathios Stamatatos Moshe Koppel Shlomo Argamon

2 Uncovering Plagiarism, Authorship, and Social Software Misuse Outline Plagiarism Detection Author Identification and Sexual Predator Identification Wikipedia Quality Flaw Prediction Summary

3 Plagiarism Detection To plagiarize means to reuse someone else s work, pretending it to be one s own. Suspicious document Plagiarism Detection Candidate retrieval Candidate documents Detailed comparison Knowledge-based post-processing Document collection Suspicious passages Contributions: q Manually written plagiarism from the ClueWeb q ChatNoir search engine for candidate retrieval q Software submissions for detailed comparison 3 [^] c pan.webis.de 2012

4 Plagiarism Detection Candidate retrieval (search for source documents): Total Time to Reported Downloaded Team Workload 1st Detection Sources Sources Queries Dwnlds Queries Dwnlds Precision Recall Precision Recall Jayapal Suchomel more... Detailed comparison (alignment of plagiarized passages): Team PlagDet Precision Recall Granularity Avg. Runtime (s) Kong Suchomel Grozea more... 4 [^] c pan.webis.de 2012

5 Lessons Learned Plagiarism detection: q Software submissions are manageable, provide repeatability. q Task-wise evaluation allows for more tailored evaluation. q Fully automatic plagiarism detection evaluation within reach. 5 [^] c pan.webis.de 2012

6 Author Identification and Sexual Predator Identification An author s personal traits are encoded in her writing. Task: A 11 A 12 A 1... q Given (part of) a document, who wrote it? A 10 A2 q The task covers 8 variants of this problem (closed vs. open class, author clustering, intrinsic plagiarism detection) A9 A8 A? A4 A3... A7 A5 A 6 6 [^] c pan.webis.de 2012

7 Author Identification and Sexual Predator Identification An author s personal traits are encoded in her writing. Task: A 11 A 12 A 1... q Given (part of) a document, who wrote it? A 10 A2 q The task covers 8 variants of this problem (closed vs. open class, author clustering, intrinsic plagiarism detection) A9 A8 A? A4 A3... A7 A5 A 6 Evaluation Results: Team Avg. Correct Decisions Team Overall Correct Decisions Grozea 86.37% Ryan 88.38% Akiva 83.40% Akiva 81.74% Ryan 82.41% Grozea 81.33% Tanguy 70.81% Tanguy 77.59% Castillo 62.13% Vartapetiance 75.93% more... 7 [^] c pan.webis.de 2012

8 Author Identification and Sexual Predator Identification 8 [^] c pan.webis.de 2012

9 Author Identification and Sexual Predator Identification Task: q Given a chat log, identify a sexual predator, if there is one. q Given chat logs, identify all lines coming from sexual predators. Corpus: 152k adult chats (8k of which predator/victim chats), 70k other chats. 9 [^] c pan.webis.de 2012

10 Author Identification and Sexual Predator Identification Task: q Given a chat log, identify a sexual predator, if there is one. q Given chat logs, identify all lines coming from sexual predators. Corpus: 152k adult chats (8k of which predator/victim chats), 70k other chats. Evaluation Results: Predator Identification Predator Line Flagging Team Precision Recall F 0.5 Team Precision Recall F 3 Villatoro-Tello Grozea Snider Kontostathis Parapar Peersman Morris Sitarz more [^] c pan.webis.de 2012

11 Lessons Learned Plagiarism detection: q Software submissions are manageable, provide repeatability. q Task-wise evaluation allows for more tailored evaluation. q Fully automatic plagiarism detection evaluation within reach. Author identification: q Lack of corpora is still a major obstacle to evaluation. q Performance measures are rudimentary; their weighting is not clear. q Large variety of problem classes adds to the difficulties. 11 [^] c pan.webis.de 2012

12 [citation needed] The PAN Competition Wikipedia Quality Flaw Prediction This presentation does not cite any references or sources. Please help improve this presentation by adding citations to reliable sources. Unsourced material may be challenged and removed. (September 2012) 12 [^] c pan.webis.de 2012

13 [citation needed] The PAN Competition Wikipedia Quality Flaw Prediction Task: This presentation does not cite any references or sources. Please help improve this presentation by adding citations to reliable sources. Unsourced material may be challenged and removed. (September 2012) q Given a sample of Wikipedia articles containing a specific quality flaw, decide whether or not a previously unseen article contains the same flaw. Corpus: q 170k Wikipedia articles, each tagged with one of 10 quality flaws. q 50k random untagged articles. 13 [^] c pan.webis.de 2012

14 [citation needed] The PAN Competition Wikipedia Quality Flaw Prediction Task: This presentation does not cite any references or sources. Please help improve this presentation by adding citations to reliable sources. Unsourced material may be challenged and removed. (September 2012) q Given a sample of Wikipedia articles containing a specific quality flaw, decide whether or not a previously unseen article contains the same flaw. Corpus: q 170k Wikipedia articles, each tagged with one of 10 quality flaws. q 50k random untagged articles. Evaluation Results: Team Precision Recall F 1 Ferretti Ferschke Pistol [^] c pan.webis.de 2012

15 [citation needed] The PAN Competition Wikipedia Quality Flaw Prediction Task: This presentation does not cite any references or sources. Please help improve this presentation by adding citations to reliable sources. Unsourced material may be challenged and removed. (September 2012) q Given a sample of Wikipedia articles containing a specific quality flaw, decide whether or not a previously unseen article contains the same flaw. Corpus: q 170k Wikipedia articles, each tagged with one of 10 quality flaws. q 50k random untagged articles. Evaluation Results: Team Precision Recall F 1 Ferretti Ferschke Pistol [^] c pan.webis.de 2012

16 Lessons Learned Plagiarism detection: q Software submissions are manageable, provide repeatability. q Task-wise evaluation allows for more tailored evaluation. q Fully automatic plagiarism detection evaluation within reach. Author identification: q Lack of corpora is still a major obstacle to evaluation. q Performance measures are rudimentary; their weighting is not clear. q Large variety of problem classes adds to the difficulties. Wikipedia quality flaw prediction: q This task subsumes the vandalism detection task of previous years. q Doznes of more flaw types need to be investigated. q Promising performance for some flaws; automatic tagging possible. 16 [^] c pan.webis.de 2012

17 Lessons Learned Plagiarism detection: q Software submissions are manageable, provide repeatability. q Task-wise evaluation allows for more tailored evaluation. q Fully automatic plagiarism detection evaluation within reach. Author identification: q Lack of corpora is still a major obstacle to evaluation. q Performance measures are rudimentary; their weighting is not clear. q Large variety of problem classes adds to the difficulties. Wikipedia quality flaw prediction: q This task subsumes the vandalism detection task of previous years. q Doznes of more flaw types need to be investigated. q Promising performance for some flaws; automatic tagging possible. A lot to accomplish for PAN 2013 and beyond! 17 [^] c pan.webis.de 2012

Approaches for Candidate Document Retrieval

Approaches for Candidate Document Retrieval Approaches for Candidate Document Retrieval Šimon Suchomel Faculty of Informatics Masaryk University Brno, Czech Republic Email: suchomel{at}fi.muni.cz Michal Brandejs Faculty of Informatics Masaryk University

More information

Towards Data Submissions for Shared Tasks: First Experiences for the Task of Text Alignment

Towards Data Submissions for Shared Tasks: First Experiences for the Task of Text Alignment Linda Cappellato and Nicola Ferro and Gareth Jones and Eric San Juan (eds.): CLEF 2015 Labs and Workshops, Notebook Papers, 8-11 September, Toulouse, France. CEUR Workshop Proceedings. ISSN 1613-0073,

More information

Plagiarism Detection Using Stopword n-grams

Plagiarism Detection Using Stopword n-grams Plagiarism Detection Using Stopword n-grams Efstathios Stamatatos Dept. of Information and Communication Systems Eng. University of the Aegean 83200 Karlovassi, Greece stamatatos@aegean.gr Abstract In

More information

Post-Doctoral Researcher Universitat Politècnica de Catalunya Barcelona (Spain) albarron@lsi.upc.edu

Post-Doctoral Researcher Universitat Politècnica de Catalunya Barcelona (Spain) albarron@lsi.upc.edu ALBERTO BARRÓN CEDEÑO Post-Doctoral Researcher Universitat Politècnica de Catalunya Barcelona (Spain) albarron@lsi.upc.edu Current Position - UNIVERSITAT POLITÈCNICA DE CATALUNYA - BARCELONATECH, SPAIN

More information

Improved implementation for finding text similarities in large collections of data

Improved implementation for finding text similarities in large collections of data Improved implementation for finding text similarities in large collections of data Notebook for PAN at CLEF 2011 Ján Grman and udolf avas SVOP Ltd., Bratislava, Slovak epublic {grman,ravas}@svop.sk Abstract.

More information

YouTube Comment Classifier. mandaku2, rethina2, vraghvn2

YouTube Comment Classifier. mandaku2, rethina2, vraghvn2 YouTube Comment Classifier mandaku2, rethina2, vraghvn2 Abstract Youtube is the most visited and popular video sharing site, where interesting videos are uploaded by people and corporations. People also

More information

Blogs and Twitter Feeds: A Stylometric Environmental Impact Study

Blogs and Twitter Feeds: A Stylometric Environmental Impact Study Blogs and Twitter Feeds: A Stylometric Environmental Impact Study Rebekah Overdorf, Travis Dutko, and Rachel Greenstadt Drexel University Philadelphia, PA {rjo43,tad82,greenie}@drexel.edu http://www.cs.drexel.edu/

More information

PAN Virtual Machine User Guide for Software Submissions

PAN Virtual Machine User Guide for Software Submissions PAN Virtual Machine User Guide for Software Submissions 1 Welcome Welcome to the PAN evaluation lab. PAN ist the first lab to switch from the submission of runs (say, the output of a piece of software)

More information

Report on the Evaluation-as-a-Service (EaaS) Expert Workshop

Report on the Evaluation-as-a-Service (EaaS) Expert Workshop WORKSHOP REPORT Report on the Evaluation-as-a-Service () Expert Workshop Frank Hopfgartner, Allan Hanbury, Henning Müller, Noriko Kando, Simon Mercer, Jayashree Kalpathy-Cramer, Martin Potthast, Tim Gollub,

More information

Instructor: See information provided in the Syllabus link in the classroom

Instructor: See information provided in the Syllabus link in the classroom Fire Science FSMT299 Fire Science Sophomore Seminar 3 Credit Hours 8 Week Course Prerequisite(s) This is the last course in the AS Fire Science degree path Instructor Information Course Description Course

More information

Identifying Online Sexual Predators by SVM Classification with Lexical and Behavioral Features 1

Identifying Online Sexual Predators by SVM Classification with Lexical and Behavioral Features 1 Identifying Online Sexual Predators by SVM Classification with Lexical and Behavioral Features 1 Master of Science paper, Department of Computer Science, University of Toronto Colin Morris January 30,

More information

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP)

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) YUKON PUBLIC SCHOOLS: DISTRICT POLICY BJ-R1 YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) To ensure that our students and employees become proficient in

More information

WHITE PAPER Plagiarism and the Web: Myths and Realities

WHITE PAPER Plagiarism and the Web: Myths and Realities WHITE PAPER Plagiarism and the Web: Myths and Realities An Analytical Study on Where Students Find Unoriginal Content on the Internet Prevent Plagiarism. Engage Students. www.turnitin.com Table of Contents

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

phase iv The Future of MediaWiki and the Wikimedia projects Erik Möller August 6, 2005

phase iv The Future of MediaWiki and the Wikimedia projects Erik Möller August 6, 2005 phase iv The Future of MediaWiki and the Wikimedia projects Erik Möller August 6, 2005 The Purpose of Technology Research Many (thousands) very active content producers Very few (less than 10) very active

More information

Determining if Two Documents are by the Same Author

Determining if Two Documents are by the Same Author DETERMINING IF TWO DOCUMENTS ARE BY THE SAME AUTHOR 1 Determining if Two Documents are by the Same Author Moshe Koppel (Corresponding Author) Dept. of Computer Science Bar-Ilan University Ramat-Gan, Israel

More information

Digital Detecting: New Resources for Determining Internet Authorship

Digital Detecting: New Resources for Determining Internet Authorship Digital Detecting: New Resources for Determining Internet Authorship Lynne Edwards Media and Communication Studies Ursinus College Collegeville, PA 19426 USA ledwards@ursinus.edu April Kontostathis Mathematics

More information

RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois

RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois 6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission

More information

Summer Term 2010. Prof. Dr. Roland Kirstein Economics of Business and Law Faculty of Economics and Management

Summer Term 2010. Prof. Dr. Roland Kirstein Economics of Business and Law Faculty of Economics and Management Master/Diplom Seminar: Intellectual Property Rights Summer Term 2010 Prof. Dr. Roland Kirstein Economics of Business and Law Faculty of Economics and Management Otto-von-Guericke University Magdeburg Today

More information

Project 2: Web Security Pitfalls

Project 2: Web Security Pitfalls EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course

More information

PAN 2013 User Guide for the Virtual Machines

PAN 2013 User Guide for the Virtual Machines PAN 2013 User Guide for the Virtual Machines 1 Welcome Welcome to the PAN 2013 evaluation lab. A novelty this year is that PAN switches from the submission of runs (say, the output of a piece of software)

More information

Plagiarism and Anti-Plagiarism Software

Plagiarism and Anti-Plagiarism Software EUROPEAN ACADEMIC RESEARCH Vol. I, Issue 10/ January 2014 ISSN 2286-4822 www.euacademic.org Impact Factor: 0.485 (GIF) DRJI Value: 5.9 (B+) Plagiarism and Anti-Plagiarism Software MUKTA GARG Moradabad

More information

Distributed Tuning of Machine Learning Algorithms using MapReduce Clusters

Distributed Tuning of Machine Learning Algorithms using MapReduce Clusters Distributed Tuning of Machine Learning Algorithms using MapReduce Clusters Yasser Ganjisaffar University of California, Irvine Irvine, CA, USA yganjisa@ics.uci.edu Rich Caruana Microsoft Research Redmond,

More information

Http://Troy.bncollege.com

Http://Troy.bncollege.com TROY UNIVERSITY Criminology SYLLABUS T1 2015 August 10, 2015 to October 9, 2015 For course syllabus posted prior to the beginning of the term, the instructor reserves the right to make minor changes prior

More information

Technology Acceptable Use Policy. Introduction

Technology Acceptable Use Policy. Introduction Technology Acceptable Use Policy Introduction Shiloh Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop skills

More information

9. Text & Documents. Visualizing and Searching Documents. Dr. Thorsten Büring, 20. Dezember 2007, Vorlesung Wintersemester 2007/08

9. Text & Documents. Visualizing and Searching Documents. Dr. Thorsten Büring, 20. Dezember 2007, Vorlesung Wintersemester 2007/08 9. Text & Documents Visualizing and Searching Documents Dr. Thorsten Büring, 20. Dezember 2007, Vorlesung Wintersemester 2007/08 Slide 1 / 37 Outline Characteristics of text data Detecting patterns SeeSoft

More information

Helpdesk Ticketing User Guide

Helpdesk Ticketing User Guide Helpdesk Ticketing User Guide University College of the North 1/5/2012 Table of Contents UCN Helpdesk Ticketing System Requirements... 1 Logging into Helpdesk Ticketing System... 1 Support Center Options...

More information

COMPSCI 760 S2 C 2014 Machine Learning and Data Mining Computer Science Department

COMPSCI 760 S2 C 2014 Machine Learning and Data Mining Computer Science Department COMPSCI 760 S2 C 2014 Machine Learning and Data Mining Computer Science Department Research Projects 2014 This year students will work in groups of 3 on projects. Each project will be a small research

More information

Understand the purpose of a writing sample 1. Understand the writing sample requirements for this job. Provide exactly what the posting requests.

Understand the purpose of a writing sample 1. Understand the writing sample requirements for this job. Provide exactly what the posting requests. Writing Sample Tips While cover letters and resumes are samples of your writing, many employers require the submission of a formal legal writing sample. A formal legal writing sample alone will not get

More information

TS3: an Improved Version of the Bilingual Concordancer TransSearch

TS3: an Improved Version of the Bilingual Concordancer TransSearch TS3: an Improved Version of the Bilingual Concordancer TransSearch Stéphane HUET, Julien BOURDAILLET and Philippe LANGLAIS EAMT 2009 - Barcelona June 14, 2009 Computer assisted translation Preferred by

More information

DEPARTMENTAL POLICIES

DEPARTMENTAL POLICIES DEPARTMENTAL POLICIES Adherence to Department s Technical Standards Any student registered for a Salisbury University social work course will be expected to meet and abide by the Social Work Department

More information

PSYC 1000A General Psychology 2014-15, 1 st Term Department of Psychology The Chinese University of Hong Kong

PSYC 1000A General Psychology 2014-15, 1 st Term Department of Psychology The Chinese University of Hong Kong PSYC 1000A General Psychology 2014-15, 1 st Term Department of Psychology The Chinese University of Hong Kong 1. Course Description: What is the course about? This is a course introducing psychology, the

More information

Evaluation of Authorship Attribution Software on a Chat Bot Corpus

Evaluation of Authorship Attribution Software on a Chat Bot Corpus Evaluation of Authorship Attribution Software on a Chat Bot Corpus Nawaf Ali Computer Engineering and Computer Science J. B. Speed School of Engineering University of Louisville Louisville, KY. USA ntali001@louisville.edu

More information

CRIM 200: Introduction to Criminal Justice

CRIM 200: Introduction to Criminal Justice CRIM 200: Introduction to Criminal Justice Catalog Description: This course will provide an overview of the criminal justice system, its history, its philosophical development, and its contemporary configurations.

More information

Real-Time Identification of MWE Candidates in Databases from the BNC and the Web

Real-Time Identification of MWE Candidates in Databases from the BNC and the Web Real-Time Identification of MWE Candidates in Databases from the BNC and the Web Identifying and Researching Multi-Word Units British Association for Applied Linguistics Corpus Linguistics SIG Oxford Text

More information

RISIS data platforms New opportunities for science and innovation studies Peter van den Besselaar VU University Amsterdam

RISIS data platforms New opportunities for science and innovation studies Peter van den Besselaar VU University Amsterdam RISIS data platforms New opportunities for science and innovation studies Peter van den Besselaar VU University Amsterdam Second generation science and innovation studies Existing: Restricted by external

More information

Search and Information Retrieval

Search and Information Retrieval Search and Information Retrieval Search on the Web 1 is a daily activity for many people throughout the world Search and communication are most popular uses of the computer Applications involving search

More information

Online Social Culture: Does it Foster Original Work or Encourage Plagiarism?

Online Social Culture: Does it Foster Original Work or Encourage Plagiarism? Online Social Culture: Does it Foster Original Work or Encourage Plagiarism? Janet Salmons, Ph.D. Vision2Lead, Inc. jsalmons@vision2lead.com For more on this model, see the chapter titled, "Expect Originality!

More information

WISE Online: An Internet and Mobile Phone Guide. http://esafety.ngfl-cymru.org.uk

WISE Online: An Internet and Mobile Phone Guide. http://esafety.ngfl-cymru.org.uk WISE Online: An Internet and Mobile Phone Guide http://esafety.ngfl-cymru.org.uk File sharing and Copyright Everyone loves to file share to get music files. But here are some points to take note of: Downloading

More information

DGT-TM: A freely Available Translation Memory in 22 Languages

DGT-TM: A freely Available Translation Memory in 22 Languages DGT-TM: A freely Available Translation Memory in 22 Languages Ralf Steinberger, Andreas Eisele, Szymon Klocek, Spyridon Pilos & Patrick Schlüter ( ) European Commission Joint Research Centre (JRC) Ispra

More information

Running head: SAMPLE APA 1

Running head: SAMPLE APA 1 Running head: SAMPLE APA 1 The upper heading should be created using the Headers & Footers function in Word, be ½ from the top of the page, and show up on every page of the paper. The content of the upper

More information

International Baccalaureate Diploma and DP Course Academic Honesty Policy 2014-2015

International Baccalaureate Diploma and DP Course Academic Honesty Policy 2014-2015 International Baccalaureate Diploma and DP Course Academic Honesty Policy 2014-2015 Principles of Academic Honesty Students enrolled in the IB Diploma and IB Certificate programs at International School

More information

An Institute- wide TDG project. Project aims (1) Project aims (2)

An Institute- wide TDG project. Project aims (1) Project aims (2) Supporting Field Experience in Teacher Education Course by using Cloud Services and Mobile Technology BACKGROUND Dr. Yiu Chi LAI & Dr. Tak Wah WONG yiuchi@ied.edu.hk twwong@ied.edu.hk Department of Mathematics

More information

University of Glasgow Terrier Team / Project Abacá at RepLab 2014: Reputation Dimensions Task

University of Glasgow Terrier Team / Project Abacá at RepLab 2014: Reputation Dimensions Task University of Glasgow Terrier Team / Project Abacá at RepLab 2014: Reputation Dimensions Task Graham McDonald, Romain Deveaud, Richard McCreadie, Timothy Gollins, Craig Macdonald and Iadh Ounis School

More information

Big Humanities Data: About the role of Automatic Natural Language Processing Techniques in the Digital Humanities

Big Humanities Data: About the role of Automatic Natural Language Processing Techniques in the Digital Humanities : About the role of Automatic Natural Language Processing Techniques in the Digital Humanities Marco Büchler etrap Research Group Göttingen Centre for Digital Humanities Institute of Computer Science Georg

More information

The effectiveness of plagiarism detection software as a learning tool in academic writing education

The effectiveness of plagiarism detection software as a learning tool in academic writing education The effectiveness of plagiarism detection software as a learning tool in academic writing education Brad Stappenbelt University of Wollongong, Australia Chris Rowles University of Western Australia Abstract

More information

Getting Started with SandStorm NoSQL Benchmark

Getting Started with SandStorm NoSQL Benchmark Getting Started with SandStorm NoSQL Benchmark SandStorm is an enterprise performance testing tool for web, mobile, cloud and big data applications. It provides a framework for benchmarking NoSQL, Hadoop,

More information

THE CHINESE UNIVERSITY OF HONG KONG DEPARTMENT OF TRANSLATION COURSE OUTLINE

THE CHINESE UNIVERSITY OF HONG KONG DEPARTMENT OF TRANSLATION COURSE OUTLINE THE CHINESE UNIVERSITY OF HONG KONG DEPARTMENT OF TRANSLATION 2015 16 COURSE OUTLINE COURSE CODE TRAN2610 ENGLISH TITLE Introduction to Computer aided Translation CHINESE TITLE 電 腦 輔 助 翻 譯 導 論 NUMBER OF

More information

Minnesota Virtual Academy Online Syllabus for AP Computer Science A

Minnesota Virtual Academy Online Syllabus for AP Computer Science A Minnesota Virtual Academy Online Syllabus for AP Computer Science A Course Instructor and Communications Name: Mr. Jon Peterson Phone #: 866-215-2292 Ext. 2129 Fax #: N/A Skype name: jon.peterson84 Kmail

More information

Knowledge Discovery using Text Mining: A Programmable Implementation on Information Extraction and Categorization

Knowledge Discovery using Text Mining: A Programmable Implementation on Information Extraction and Categorization Knowledge Discovery using Text Mining: A Programmable Implementation on Information Extraction and Categorization Atika Mustafa, Ali Akbar, and Ahmer Sultan National University of Computer and Emerging

More information

User (Student) Instruction Manual Local Document Archive Maintenance System (SOLAD)

User (Student) Instruction Manual Local Document Archive Maintenance System (SOLAD) User (Student) Instruction Manual Local Document Archive Maintenance System (SOLAD) Warsaw School of Economics 1/15 The Local Document Archive Maintenance System (SOLAD) is a programme that serves to submit,

More information

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,

More information

Running head: WRITING RESEARCH PAPERS 1. A Guide for Writing APA Style Research Papers. Susan B. Smith. Capital Community College

Running head: WRITING RESEARCH PAPERS 1. A Guide for Writing APA Style Research Papers. Susan B. Smith. Capital Community College PROVIDE A RUNNING HEAD OR SHORT TITLE OF YOUR PAPER IN ALL CAPS FOR EACH PAGE OF THE PAPER Based on the Sixth Ed. of the Publication Manual of the American Psychological Association. Updated September

More information

MGMT S-5033 Course Syllabus Supply Chain Management Online. Spring 2014. Harvard University Cambridge, MA. Zal Phiroz, MBA Instructor

MGMT S-5033 Course Syllabus Supply Chain Management Online. Spring 2014. Harvard University Cambridge, MA. Zal Phiroz, MBA Instructor MGMT S-5033 Course Syllabus Supply Chain Management Online Spring 2014 Harvard University Cambridge, MA Zal Phiroz, MBA Instructor Abstract This course introduces the concept of Supply Chain management

More information

Connecting with Students: our Personal Librarian Pilot for ENG 101. Denise A. Garofalo

Connecting with Students: our Personal Librarian Pilot for ENG 101. Denise A. Garofalo Connecting with Students: our Personal Librarian Pilot for ENG 101 Denise A. Garofalo Objectives Provide background Describe our Personal Librarian implementation Share successes and disappointments Plans

More information

Web-Scale Extraction of Structured Data Michael J. Cafarella, Jayant Madhavan & Alon Halevy

Web-Scale Extraction of Structured Data Michael J. Cafarella, Jayant Madhavan & Alon Halevy The Deep Web: Surfacing Hidden Value Michael K. Bergman Web-Scale Extraction of Structured Data Michael J. Cafarella, Jayant Madhavan & Alon Halevy Presented by Mat Kelly CS895 Web-based Information Retrieval

More information

Personality Psychology (PSYC 330) Summer 2015

Personality Psychology (PSYC 330) Summer 2015 Class Time and Location: July 6-28, 2015 Monday to Friday 4:30pm to 6:20pm David Turpin Building A102 Sessional Instructor: Eric Huang, PhD Candidate E-mail: huange@uvic.ca Office: Cornett B310 Office

More information

entigral whitepaper 10 Success Factors for RFID Asset Tracking Deployments www.entigral.com 877.822.0200

entigral whitepaper 10 Success Factors for RFID Asset Tracking Deployments www.entigral.com 877.822.0200 entigral whitepaper 10 Success Factors for RFID Asset Tracking Deployments www.entigral.com 877.822.0200 10 Success Factors for RFID Deployments How to maximize ROI on RFID asset tracking deployments RFID

More information

Pride Academy Charter School

Pride Academy Charter School 2010-2011 Computer and Internet Use Policy For Staff and Students General Computer and Network Use Pride Academy believes that the use of technology and computer-assisted communications is vital to our

More information

CHAT: A System for Stylistic Classification of Hebrew-Aramaic Texts

CHAT: A System for Stylistic Classification of Hebrew-Aramaic Texts CHAT: A System for Stylistic Classification of Hebrew-Aramaic Texts Moshe Koppel Dror Mughaz Navot Akiva Dept. of Computer Science Bar-Ilan University Ramat Gan, Israel 1. Objectives CHAT, is a fully self-sufficient

More information

HIT 240 HEALTHCARE QUALITY PERFORMANCE IMPROVEMENT AND MANAGEMENT SYLLABUS

HIT 240 HEALTHCARE QUALITY PERFORMANCE IMPROVEMENT AND MANAGEMENT SYLLABUS HIT 240 HEALTHCARE QUALITY PERFORMANCE IMPROVEMENT AND MANAGEMENT SYLLABUS Instructor Information and Availability Donna Thompson, RHIT has been an instructor for the SBCC HIT program and the Workforce

More information

Cyber Safety For Parents

Cyber Safety For Parents Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

More information

Minnesota Virtual Academy Online Syllabus for Eng403 British and World Literature Course Instructor and Communications Name: Mrs.

Minnesota Virtual Academy Online Syllabus for Eng403 British and World Literature Course Instructor and Communications Name: Mrs. Minnesota Virtual Academy Online Syllabus for Eng403 British and World Literature Course Instructor and Communications Name: Mrs. Sara Horne Phone #: 651-964-2370 or 866-215-292, option 4, ext. 2113 Fax

More information

A Performance Analysis of Distributed Indexing using Terrier

A Performance Analysis of Distributed Indexing using Terrier A Performance Analysis of Distributed Indexing using Terrier Amaury Couste Jakub Kozłowski William Martin Indexing Indexing Used by search

More information

Terminology Extraction from Log Files

Terminology Extraction from Log Files Terminology Extraction from Log Files Hassan Saneifar 1,2, Stéphane Bonniol 2, Anne Laurent 1, Pascal Poncelet 1, and Mathieu Roche 1 1 LIRMM - Université Montpellier 2 - CNRS 161 rue Ada, 34392 Montpellier

More information

STUDENT HANDBOOK. Policies and Procedures. 1 of 11

STUDENT HANDBOOK. Policies and Procedures. 1 of 11 STUDENT HANDBOOK Policies and Procedures 2012 2013 1 of 11 GENERAL INFORMATION K-12 schools arrange for Founders Education to deliver comprehensive virtual courses to the school s students. The virtual

More information

Students will know and be able to: 1.1. Basic Operations

Students will know and be able to: 1.1. Basic Operations Information Technology Grades 9-10 Basic Operations, Concepts, and Productivity Tools Basic Operations Word Processing Database Spreadsheet Identify the platform, version, properties, function, and interoperability

More information

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the

More information

National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide

National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide Overview During this presentation, you will: Learn about

More information

INTRODUCTION TO CRIMINAL JUSTICE 101- Hybrid

INTRODUCTION TO CRIMINAL JUSTICE 101- Hybrid INTRODUCTION TO CRIMINAL JUSTICE 101- Hybrid Instructor: Shawn Curtis, MSCJ, PsyD Candidate Quarter Dates: 04/06/15-06/19/15 Classroom: D-103 Days and Times: Tu and Th 12:30-2:20 (Friday on line) Office:

More information

<first name>.<last name>@uni-weimar.de. query log analysis, user interaction, search engine, query sessions, search missions,

<first name>.<last name>@uni-weimar.de. query log analysis, user interaction, search engine, query sessions, search missions, Title: Name: Affil./Addr.: Web Log Analysis Matthias Hagen, Benno Stein Bauhaus-Universität Weimar 99421 Weimar, Germany .@uni-weimar.de Web Log Analysis Synonyms query log analysis,

More information

Desire2Learn Learning Environment

Desire2Learn Learning Environment Desire2Learn Learning Environment Empower your organization to deliver engaging content, collaborate effectively, and achieve your elearning vision through a comprehensive and flexible suite of online

More information

Comparing Support Vector Machines, Recurrent Networks and Finite State Transducers for Classifying Spoken Utterances

Comparing Support Vector Machines, Recurrent Networks and Finite State Transducers for Classifying Spoken Utterances Comparing Support Vector Machines, Recurrent Networks and Finite State Transducers for Classifying Spoken Utterances Sheila Garfield and Stefan Wermter University of Sunderland, School of Computing and

More information

MIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts

MIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts MIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts Julio Villena-Román 1,3, Sara Lana-Serrano 2,3 1 Universidad Carlos III de Madrid 2 Universidad Politécnica de Madrid 3 DAEDALUS

More information

HIT 284 Coding Exam Prep Course Syllabus

HIT 284 Coding Exam Prep Course Syllabus HIT 284 Coding Exam Prep Course Syllabus Instructor Email address Instructor Office Hours Office hours location Course Introduction Lynette M. Williamson, MBA, RHIA, CCS, CPC Use Course Email (Internal

More information

How To Cluster Of Complex Systems

How To Cluster Of Complex Systems Entropy based Graph Clustering: Application to Biological and Social Networks Edward C Kenley Young-Rae Cho Department of Computer Science Baylor University Complex Systems Definition Dynamically evolving

More information

Collecting Polish German Parallel Corpora in the Internet

Collecting Polish German Parallel Corpora in the Internet Proceedings of the International Multiconference on ISSN 1896 7094 Computer Science and Information Technology, pp. 285 292 2007 PIPS Collecting Polish German Parallel Corpora in the Internet Monika Rosińska

More information

Identifying free text plagiarism based on semantic similarity

Identifying free text plagiarism based on semantic similarity Identifying free text plagiarism based on semantic similarity George Tsatsaronis Norwegian University of Science and Technology Department of Computer and Information Science Trondheim, Norway gbt@idi.ntnu.no

More information

Guide to Knowledge Elicitation Interviews

Guide to Knowledge Elicitation Interviews Guide to Knowledge Elicitation Interviews Purpose Gather knowledge from individuals in a manner that others will find useful. Description Knowledge interviews are conversations between people who have

More information

WWW.IPAMOA.CO.UK Deadline for entries Friday 3 rd July

WWW.IPAMOA.CO.UK Deadline for entries Friday 3 rd July WWW.IPAMOA.CO.UK Deadline Friday Category 1 Best Unfeatured Media Owner 2015 This category is open to any UK based online media owner who is not featured in the IPA Media Owner Survey for 2015. To check

More information

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating

More information

Kayako 4.0 Helpdesk Upgrade Questionnaire Form 1: Users. https://kayako-test.cv.nrao.edu/

Kayako 4.0 Helpdesk Upgrade Questionnaire Form 1: Users. https://kayako-test.cv.nrao.edu/ Kayako 4.0 Helpdesk Upgrade Questionnaire Form 1: Users NAME ROLE: USER To submit helpdesk tickets you can access the helpdesk directly at: https://kayako-test.cv.nrao.edu/ NOTE: Due diligence needs to

More information

Report on the embedding and evaluation of the second MT pilot

Report on the embedding and evaluation of the second MT pilot Report on the embedding and evaluation of the second MT pilot quality translation by deep language engineering approaches DELIVERABLE D3.10 VERSION 1.6 2015-11-02 P2 QTLeap Machine translation is a computational

More information

Realist A Quick Start Guide for New Users

Realist A Quick Start Guide for New Users Realist A Quick Start Guide for New Users Realist is a service from: First American Real Estate Solutions 4 First American Way Santa Ana, CA 92707 Contents 1. Welcome to Realist... 2 2. How to Access Realist...

More information

Course Materials Required Text:

Course Materials Required Text: Lamar University, a member of The Texas State University System, is accredited by the Commission on Colleges of the Southern Association of Colleges and Schools to award Associate, Baccalaureate, Masters,

More information

Minnesota Virtual Academy Online Syllabus for Web Design

Minnesota Virtual Academy Online Syllabus for Web Design Minnesota Virtual Academy Online Syllabus for Web Design Course Instructor and Communications Name: Jami Kruschke Phone #: Fax #: Skype name: 866-215-2292, option 3, x2181 NA jami.kruschke Kmail address:

More information

Data and Analysis. Informatics 1 School of Informatics, University of Edinburgh. Part III Unstructured Data. Ian Stark. Staff-Student Liaison Meeting

Data and Analysis. Informatics 1 School of Informatics, University of Edinburgh. Part III Unstructured Data. Ian Stark. Staff-Student Liaison Meeting Inf1-DA 2010 2011 III: 1 / 89 Informatics 1 School of Informatics, University of Edinburgh Data and Analysis Part III Unstructured Data Ian Stark February 2011 Inf1-DA 2010 2011 III: 2 / 89 Part III Unstructured

More information

Email Security 8.0 User Guide

Email Security 8.0 User Guide Email Security 8.0 User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage to

More information

The Slingshot Project

The Slingshot Project The Slingshot Project Measuring, analyzing, and defending against targeted attacks Stevens Le Blond Software security model Obscurity Reactivity Correctness Isolation 2 # users Skype enables large-scale

More information

Graduate School Resumes, Goals Statements, Recommendation Letters. Amy Patrick Mossman Western Illinois University

Graduate School Resumes, Goals Statements, Recommendation Letters. Amy Patrick Mossman Western Illinois University Graduate School Resumes, Goals Statements, Recommendation Letters Amy Patrick Mossman Western Illinois University What are they looking for in your application? Graduate programs look at your resume, goals

More information

CIRGIRDISCO at RepLab2014 Reputation Dimension Task: Using Wikipedia Graph Structure for Classifying the Reputation Dimension of a Tweet

CIRGIRDISCO at RepLab2014 Reputation Dimension Task: Using Wikipedia Graph Structure for Classifying the Reputation Dimension of a Tweet CIRGIRDISCO at RepLab2014 Reputation Dimension Task: Using Wikipedia Graph Structure for Classifying the Reputation Dimension of a Tweet Muhammad Atif Qureshi 1,2, Arjumand Younus 1,2, Colm O Riordan 1,

More information

Course Delivery Educational Program Development Onsite Blackboard Training

Course Delivery Educational Program Development Onsite Blackboard Training Overview Workshop Content The workshop for Blackboard Learn Course Delivery equips institutions with the knowledge, skills, and planning tools to effectively administer and teach with Blackboard Learn

More information

Performance evaluation of Web Information Retrieval Systems and its application to e-business

Performance evaluation of Web Information Retrieval Systems and its application to e-business Performance evaluation of Web Information Retrieval Systems and its application to e-business Fidel Cacheda, Angel Viña Departament of Information and Comunications Technologies Facultad de Informática,

More information

A Statistical Text Mining Method for Patent Analysis

A Statistical Text Mining Method for Patent Analysis A Statistical Text Mining Method for Patent Analysis Department of Statistics Cheongju University, shjun@cju.ac.kr Abstract Most text data from diverse document databases are unsuitable for analytical

More information

Security Testing with Selenium

Security Testing with Selenium with Selenium Vidar Kongsli Montréal, October 25th, 2007 Versjon 1.0 Page 1 whois 127.0.0.1? Vidar Kongsli System architect & developer Head of security group Bekk Consulting Technology and Management

More information

Accelerating Change & Transformation (ACT) TM Training

Accelerating Change & Transformation (ACT) TM Training Accelerating Change & Transformation (ACT) TM Training 80% of CEOs cite the ability to adapt to change as a source of competitive advantage. Emergent can help you develop your internal change capability

More information

MICROSOFT OUTLOOK TIPS AND TRICKS

MICROSOFT OUTLOOK TIPS AND TRICKS Materials Provided by Tim McCurdy MICROSOFT OUTLOOK TIPS AND TRICKS Tips for Outlook Mail 1. Set a reminder to reply to a message 2. Add your own words to a follow-up flag for a new message 3. Send a message

More information

Machine Learning Log File Analysis

Machine Learning Log File Analysis Machine Learning Log File Analysis Research Proposal Kieran Matherson ID: 1154908 Supervisor: Richard Nelson 13 March, 2015 Abstract The need for analysis of systems log files is increasing as systems

More information

Haddon Township School District Acceptable Use of Information and Communication Technology for Students

Haddon Township School District Acceptable Use of Information and Communication Technology for Students Haddon Township School District Acceptable Use of Information and Communication Technology for Students Please read the following carefully before signing the Acceptable Use Policy for Students Agreement.

More information

B2B opportunity predictiona Big Data and Advanced. Analytics Approach. Insert

B2B opportunity predictiona Big Data and Advanced. Analytics Approach. Insert B2B opportunity predictiona Big Data and Advanced Analytics Approach Vodafone Global Enterprise Manu Kumar, Head of Targeting, Optimization & Data Science Insert Agenda Why B2B opportunities are hard to

More information