Review Graph based Online Store Review Spammer Detection
|
|
- Lisa Hicks
- 8 years ago
- Views:
Transcription
1 Review Gaph based Online Stoe Review Spamme Detection Guan Wang, Sihong Xie, Bing Liu, Philip S. Yu Univesity of Illinois at Chicago Chicago, USA Abstact Online eviews povide valuable infomation about poducts and sevices to consumes. Howeve, spammes ae joining the community tying to mislead eades by witing fake eviews. Pevious attempts fo spamme detection used eviewes behavios, text similaity, linguistics featues and ating pattens. Those studies ae able to identify cetain types of spammes, e.g., those who post many simila eviews about one taget entity. Howeve, in eality, thee ae othe kinds of spammes who can manipulate thei behavios to act just like genuine eviewes, and thus cannot be detected by the available techniques. In this pape, we popose a novel concept of a heteogeneous eview gaph to captue the elationships among eviewes, eviews and stoes that the eviewes have eviewed. We exploe how inteactions between nodes in this gaph can eveal the cause of spam and popose an iteative model to identify suspicious eviewes. This is the fist time such inticate elationships have been identified fo eview spam detection. We also develop an effective computation method to quantify the tustiness of eviewes, the honesty of eviews, and the eliability of stoes. Diffeent fom existing appoaches, we don t use eview text infomation. Ou model is thus complementay to existing appoaches and able to find moe difficult and subtle spamming activities, which ae ageed upon by human judges afte they evaluate ou esults. 1 Keywods- Spamme detection, eview gaph I. INTRODUCTION Online stoe eviews ae an impotant esouce to help people make wise choices fo thei puchases. Due to this eason, the eview system has become a taget of spammes who ae usually hied o enticed by companies to wite fake eviews to pomote thei poducts and sevices, and/o to distact customes fom thei competitos. Diven by pofits, thee ae moe and moe spam eviews in majo eview websites, such as PiceGabbe.com, Shopzilla.com, o Reselleatings.com. Spammes ae stating to coupt the online eview system and confuse the consumes. A. Challenges Automatically detecting spammes is an ugent yet unde exploed task. Unlike othe kinds of spam, e.g., Web spam o spam, eview spam is much hade to detect. The main eason is that spammes can easily disguise themselves. It is thus had fo a human use to ecognize them, while fo Web and spam, one can tell spam without much difficulty. 1 This wok is suppoted in pat by NSF though gants IIS , OISE , DBI , and IIS The task of detecting fake eviews and eviewes was fist poposed by Nitin and Liu in [3], which they call opinion spam detection. They built a classifie using cetain types of (nea) duplicates eviews as positive taining data and the est as the negative taining data. Thei appoach used featues about eviews, eviewes, and poducts. In [4], they also poposed anothe algoithm based on mining unexpected ules. They found that the top unexpected ules epesent abnomal eviews and eviewes. Howeve, thei method does not identify tue spammes. Using behavios of eviewes fo spamme detection was also studied in [8]. Howeve, this wok essentially also elies on duplications, i.e., multiple eviews fom the same eviewe tageting the same item o item goup. Thus, it is only suited fo a special kind of spamming. In [7, 9], eview contents wee also used fo spam detection, which we don t use. Although we also examine eviewes behavios, they ae only a small pat of ou solution. The novel eview gaph concept intoduced in this pape captues inte-elationships of eviewes, eviews, and stoes, which existing woks have not used. In this wok, we ae inteested in stoe eviews. Even if we can boow some ideas fom pevious studies, thei clues ae not sufficient to tell stoe eview spammes. Fo example, although it looks suspicious fo a peson to post multiple eviews to the same poduct, it may be nomal fo a peson to post moe than one eview to the same stoe due to multiple puchasing expeiences. Futhemoe, as one peson has the same witing style on eview witing, it may be nomal to have simila eviews fom one eviewe fo multiple stoes because unlike diffeent poducts, diffeent stoes basically povide the same types of sevices. Moeove, many odinay uses only wite eviews spoadically. It is easonable fo them to wite multiple eviews in a shot time peiod about diffeent shopping expeiences. Theefoe, eviewe behavios poposed in the existing appoaches fo poduct eviews ae insufficient fo catching spammes of stoe eviews. Thus thee is a need to look fo a moe sophisticated and complementay famewok. Howeve, the following challenges ae majo obstacles towads such a famewok. 1) Thee is no gound tuth whethe a eview is faked o not. By eading the eview text alone, we usually do not have enough clues to tell spam fom non-spam. 2) Spammes behavios may be had to captue. Fo example, in ode to successfully mislead customes, spammes can make thei witing styles and eview habits look vey simila to those of genuine eviewes 3) Spammes can also wite good and honest eviews,
2 because they could be eal customes of some online stoes themselves sometimes. Futhemoe, a cuent genuine eviewe could be a spamme befoe, and we do not know when a eviewe would wite a spam eview. These obstacles ae the coe challenges that we think make simple behavioal heuistics insufficient. To detect sophisticated spammes, we need to conside moe clues. B. Contibution Ou fist contibution is to popose a heteogeneous gaph model with thee types of nodes to captue spamming clues. We believe that clues fo telling if a eviewe is innocent include the eviewe s eviews, all the stoes (s)he commented on, and eviews fom othe eviewes who have shopping expeiences in the same stoes. Theefoe, we popose a novel heteogeneous gaph, efeed to as the eview gaph, to captue elations among eviewes, eviews, and stoes. These ae thee kinds of nodes in the eview gaph. A eviewe node has a link to a eview if (s)he wote it. A eview node has an edge to a stoe node if it is about that stoe. A stoe is connected to a eviewe via this eviewe s eview on the stoe. Each node is also attached with a set of featues. Fo example, a stoe node has featues about its aveage ating, its numbe of eviews, etc. Figue 1 illustates such a eview gaph. Fig. I Review Gaph Ou second contibution is the intoduction of thee fundamental concepts, i.e. the tustiness of eviewes, the honesty of eviews, and the eliability of stoes, and the identification of thei inteelationships: a eviewe is moe tustwothy if (s)he has witten moe honesty eviews, a stoe is moe eliable if it has moe positive eviews fom tustwothy eviewes, and a eview is moe honest if it is suppoted by many othe honest eviews. Futhemoe, if the honesty of a eview goes down, it affects the eviewe s tustiness, which has an impact on the stoe (s)he eviews. And depending on how this eviewe s opinion vaies with othe eviewes opinions about the same stoe, othe eviewes tustiness may change. These intetwined elations ae evealed fom the eview gaph. Ou thid contibution is the development of an iteative method to compute the thee concepts based on the gaph model. Stating fom the common senses that ae uniquely elated to the stoe eview system and its spamming scenaios, we deive how one concept impacts anothe. To the best of ou knowledge, we ae the fist to use this node einfocement method to analyze a eviewe s tustiness, a stoe s eliability, and a eview s honesty. Although the geneal idea of einfocement based on gaph links has been applied in many diffeent scenaios including authoity discovey [5] and tuth identification fom multiple conflicting souces [10], thei poblem settings and detailed techniques ae vey diffeent fom eview spam detection; theefoe they ae not applicable to ou wok. II. SPAM DETECTION MODEL A. Intuitive Assumptions and Obsevations We stat by exploing some possible easons fo spamming. Gounded on common sense, we fist make the following assumptions: Spammes ae usually fo pofits, so they have connections to stoes that would benefit spammes to pomote thei pominence o defame othe stoes. Spammes ae usually hied by low quality stoes. Such stoes have a stonge motivation to hie spammes to wite dishonest eviews. Stoes with good eputations and stable custome taffic may not hie spammes at all; since they lose much moe if they ae caught doing so. Even if good stoes eally entice spammes to say good things about them, it may not be vey hamful. Theefoe, we assume that less eliable stoes ae moe likely to be involved in eview spamming. Hamful spam eviews always deviate fom the tuth. Theefoe, they can be eithe positive eviews about lousy stoes, o negative eviews about good stoes. Not all eviews deviating fom mainsteam ae spam. People may feel diffeently o have diffeent expeiences about the same sevice. Based on these assumptions, we have the following obsevations: 1) We can judge the honesty of a eview given the eliability of the stoe it was posted to, plus the ageement (to be defined late) of the eview with its suounding eviews about the same stoe. 2) If we have the honesty scoes of all the eviews of a eviewe, we can infe his/he tustiness, because one is cetainly moe tustwothy if one wote moe eviews with high honesty scoes. 3) Now we go back to see how to depict a stoe s eliability. Again fom common sense again, a stoe is moe eliable if it is eviewed by moe tustwothy eviewes with positive eviews and less eliable if it is eviewed by moe tustwothy eviewes with negative eviews. Figue 2 shows the above influences among a stoe s eliability, a eview s honesty, and a eviewe s tustiness. They ae intetwined and affect each othe. These influences have some esemblance to the well-known authoity and hub elation [5], but the elations in ou case ae diffeent. Fist, a eviewe cannot gain moe tust by witing moe
3 eviews, no can we use the mean of eview honesty to captue a eviewe s tustiness. Second, eviews have impact on each othe. If a eview deviates fom most of the othes, it could be a clue of spamming. Fig. 2. Influences among diffeent types of nodes B. Basic Definitions Fom the above obsevations, we define vaiables that quantify the qualities of eviewes, eviews, and stoes. Definition 2.1 (Tustiness of eviewes): The tustiness of a eviewe (denoted by T()) is a scoe of how much we can tust. Fo ease of undestanding and computation, we limit the ange of T() to ( 1, 1). Definition 2.2 (Honesty of eviews): The honesty of a eview e (denoted by H(v)) is a scoe epesenting how honest the eview is, H(v) is within the ange ( 1, 1). Definition 2.3 (Reliability of stoes): The eliability of a stoe s (denoted by R(s)) is a scoe epesenting the quality of stoe s. R(s) is also within the ange ( 1, 1). Fo ease of pesentation, we give the notations of node featues that ae elated to the computation of the above definitions in Table I. Notation Definition a eviewe v a eview s a stoe i eviewe s i th eview s eviewe s eview on stoe s v eview v s autho id n the numbe of s eviews H honesty summation of all s eviews v eview v s ating v stoe id of v s t v eview v s posting time Us the set of eviews on stoe s TABLE I FEATURES ASSOCIATED WITH NODES AND THEIR NOTATIONS C. Reviewe Tustiness To model the tustiness, let s see how we can tell if a eviewe is tustwothy o not, based on which we can devise seveal computational ideas. 1) A eviewe s tustiness doesn t depend on the numbe of his/he eviews, but on the summation of thei honesty scoes. 2) A eviewe s tustiness scoe should be positive o negative if he/she wites moe eviews with positive o negative honesty scoes. 3) Fo a given eviewe, his/he tustiness does not gow/dop linealy with the numbe of high/low honesty eviews that (s)he wote. It gows/dops faste when the numbe of such eviews is smalle, and slows down when the numbe is lage. We define a eviewe s tustiness to be dependent on the summation of the honesty scoes of all s eviews, n = i H i = H(α 1 ) (1) whee n is the numbe of eviews fom. The poposed tustiness scoe of should be a function T satisfying the above intuitions, which ae fomally expessed with the following elations. T ( i) < T( j), if H i < H j (2) T ( ) < 0 if H < 0, T( ) > 0if H > 0 (3) dt( ) = T( )( K T( )) (4) dh Relation (2) epesents the fist idea: One eviewe is moe tustwothy than anothe if one has a lage honesty scoe. Relation (3) depicts the second idea: We don t tust a eviewe whose eviews tend to be dishonest, and we tust a eviewe whose eviews tend to be honest. Relation (4) epesents the gowing (o dopping) speed of tustiness is the poduct of cuent tustiness level and the oom of impovement. Suppose K is the uppe bound of the tustiness scoe, K T() is how much moe tustiness one can gain by witing moe honest eviews. It becomes smalle as T() gows. Solving these elations gives us the geneal fom of tustiness function K T( ) = (5) KH e Notice this geneal fom is in the ange (0, K). As we mentioned befoe, the uppe bound of the tustiness scoe is +1, and its ange should be ( 1, 1) to have moe pactical meanings. We then e-scale the tustiness scoe T fo a eviewe as 2 T ( ) 1 (6) = H e The geneal shape of the tustiness function is the wellknown logistic cuve and is shown in Figue 3. Fig. 3. Relation between tustiness and honesty In eality, eviews fom the same eviewe can have diffeent degees of honesty, due to many easons, e.g.,
4 subjective bias. A genuine eviewe p may post an uneasonable eview i with H(p(i)) < 0, while a spamme q may have a honest eview j with H(q(j)) > 0. Howeve, it is still possible to distinguish malicious eviewes fom benign ones, since the tustiness scoe is contolled by the summation of a eviewe s eview honesty, i.e., the geneal tend of a use s eviews. To calculate T(), we need the honesty values of s eviews, which we define next. D. Review Honesty How do we intepet a eview? When we ead a stoe eview, we usually have two things in mind. The fist one is the stoe we ae looking at. If the stoe is a good one such as Apple.com, we tend to tust the positive eviews. If we ae eading eviews about a stoe we have neve head of, o we knew it is a bad one, we tend to doubt the high ating eviews. The second facto is the suounding eviews, which ae othe eviews about the same stoe within a cetain time window t, e.g., 3 months befoe and afte the posting time of the taget eview. We ae likely to tust the mainsteam opinions held by most suounding eviews, athe than outlie opinions. Based on these obsevations, we model a eview s honesty with two factos. 1) The eliability of the stoe it eviews. 2) The ageement between this eview and othe eviews about the same stoe within a given time window. We will discuss eliability in the next subsection. We study ageement fist by intoducing the suounding set. Definition 2.4 (Suounding Set): The suounding set of eview v is the set of v s suounding eviews. S v ={i i = v, t i t v t} i, j S v agee with each othe when thei opinions about the same aspects of the stoe ae close. Howeve, opinion mining is too costly to let us assess opinion of a eviewe [2]. Fotunately, in addition to the eview text, eviews usually have ating infomation about a stoe. Even if two 5- sta atings may mean diffeent aspects of a stoe, such as custome sevice and delivey, they ae coelated with each othe. Theefoe, we make some assumptions hee. A eview s ating about a stoe eflects its opinion. Two eviews with simila ating scoes about the same stoe have simila opinions about the stoe. Fom the assumptions, i, j S agee with each othe if v i j < (7) whee is a given bound (we use 1 in a 5-sta ating system in this pape). Thus, we can patition the suounding set Sv = S S (8) S v v, a v, d S { i Ψ Ψ < } (9) v, a = i v δ S v, d Sv \ Sv, a = (10) We also take the eviewes tustiness scoes into consideation. One eview should be good even if it does not agee with any suounding eviews when it is witten by a tustwothy eviewe while the suounding eviews ae posted by untustwothy eviewes. Similaly, one eview may be bad even if it agees with the suounding eviews, since they may be all fom spammes. Theefoe, we define the ageement scoe of eview v within time window t as A( v, = T( κ i S i ) T( κ v a j S j ) (11), v, d Notice that tustiness scoe T could be eithe positive o negative. This equation means that if one eview agees with othe eviews by tustwothy eviewes, its ageement scoe inceases. On the othe hand, if it agees with untustwothy eviewes, its scoe deceases. This equation also pomotes a benign use s eview ageement scoe when it is suounded by spam eviews that it does not agee with, because if spammes tustiness scoes ae negative, a benign eview s ageement scoe gets pomoted by subtacting the negative numbes. A(v, t) can be positive o negative. Hee we nomalize it to ( 1, 1) to make late computation easie. 2 A n ( v, = 1 (12) A( v, e Review e s honesty H(v) is defined as follows: H( v) = R( Γ v ) A ( v, (13) n whee R( v ) is the eliability of stoe v, which we will define late. Hee we just want to note that, by definition, R( v ) can be positive (fo eliable stoes) o negative (fo poo quality stoes). We take its absolute value as an amplifie of A n (v, t). This is consistent with pevious discussions. If a stoe s R( v ) is lage, it is eithe quite good o quite bad. A eview on this stoe should have a high honesty scoe if it agees with many othe honest eviews. If R( v ) is small, the stoe s eliability is had to tell. And a eview s honesty gets diminished a little by that fact. E. Stoe Reliability To define eliability, we have simila intuitions to tustiness. A stoe is moe eliable if it has moe tustwothy eviewes saying good things about it, while it is moe uneliable if moe tustwothy eviewes complain about it. The inceasing/deceasing tend of eliability should also be a logistic cuve so as to be consistent with ou common sense. Theefoe, we define the eliability R of stoe s as 2 R ( s) = 1 (14) θ e whee θ = T( κ )( Ψ ) v Us, T ( κv ) > 0 v v μ (15) μ is the median value of the entie ating system, e.g., 3- sta in a 5-sta ating ange, and U s is all eviews of stoe s. Theefoe, a stoe s eliability depends on all tustable eviewes who post eviews on it, and thei atings. When consideing eliability, we only conside eviewes with positive tustiness scoe because thei atings eally eflect the stoe s quality. In contast, whateve a less tustwothy eviewe says about a stoe, it is less tustable. Fo example, we don t know the eal intention to ate a stoe as a good
5 one o bad one, if it comes fom a potential spamme. F. Iteative Computation Famewok Integating the pieces of infomation of the eview gaph togethe, we have an iteative computation famewok to compute eliability, tustiness, and honesty, by exploing the inte-dependencies among them. The algoithm is given in the figue below, which is self-explanatoy. The oveall time complexity of the algoithm is O(k(N + N v )), whee k is the numbe of iteations. k is small (usually 4 o 5) as the algoithm conveges quite fast in pactice. III. EVALUATION A. Data Set and Data Featues We use the stoe eview data fom a lagest host of stoe eviews, fo ou expeiments. The website povides a unique ul fo evey eviewe s pofile, containing meta-data such as eviewe id, all his/he eviews and atings with posting times about stoes, and links to those stoes. In each stoe page, thee is infomation about its aveage ating scoe, all eviewes with thei eviews. The data we cawled is a snapshot of all eviews fom the website on Oct. 6th, We clean the data by emoving uses and stoes with no eview. Afte that, we have eviewes who wote eviews on stoes. B. Spamme Detection Results Evaluation 1) Evaluation Citeia: We use IR-based evaluation stategy. Fist we let ou algoithm identify highly suspicious spamme candidates. Then we ecuit human judges to make the judgments on the candidates about whethe they seem to be eal spammes. Theefoe, we have pecision as ou pefomance measue. Simila evaluation appoaches have been used in pevious eview spam detection eseach [3, 8]. Theefoe this is a well-established way of pefomance evaluation. The details of ou evaluation stategy ae as follows. Human Judgments Consistency Citeion: Since thee is no spamme label in the eview data, human evaluation is necessay. A spamme detection algoithm is effective, if diffeent human evaluatos agee with each othe about thei judgments and concu with the system on the same set of esults. Theefoe, we use human judgment consistency as anothe evaluation citeion. Ou human evaluatos ae 3 compute science gaduate students who also have extensive online shopping expeiences. They wok independently on spamme identification. 2) Human Evaluation Pocess: Judging suspicious spammes is a complex task fo human and often involves intuition and seaching fo additional infomation, especially when we taget at moe subtle spamming activities. To decide if a candidate is a spamme equies human judges not only to ead his/he eviews and atings, but also to collect evidences fom elations with othe eviewes, stoes, and even the Intenet. To standadize the judgment pocess, ou human evaluatos agee upon thee conditions as ou evidence to claim that a eviewe is a potential spamme. A eviewe is suspicious if (s)he has a significant numbe of eviews giving opposite opinions to othes eviews about the same stoes. Fo example, if a eviewe gives high atings to all stoes he has eviewed, while othe eviewes ate these stoes low, the eviewe is poblematic. A eviewe is suspicious if (s)he has a significant numbe of eviews with opposite opinions about some stoes to the atings fom the Bette Business Bueaus (BBB) 2 Fo example, if a eviewe gives high atings to all the stoes (s)he eviewed, but BBB gives them Fs (the ating ange is fom A to F), the eviewe is clealy suspicious. A eviewe is suspicious if (s)he has a significant numbe of eviews saying opposite opinions about some stoes as compaed to evidences pesented by geneal web seach esults. Fo example, if a eviewe gives high atings to all stoes he/she eviewed, but Google seach esults about these stoes often contain infomation of them having fake eviews, this eviewe is poblematic. Note that each of the above steps involves human labo effot, intuition, and backgound knowledge, so the entie evaluation is vey had to be computeized. Fo example, fo the thid step, ou human judges actually need to go though seveal seach esult pages and undestand the content, in ode to make a judgment. Although evey single condition may not be convincing enough to pove spamming activities, all of them togethe can be a confident claim of spamming. We evaluate the top 100 suspicious eviewes identified by ou model. Note that no existing wok focused on such a lage scale and subtle individual cases. Ou human evaluatos gave thei independent judgments based only on infomation fom 2 Bette Business Bueau is a well-known copoation that endeavos to a fai and effective maketplace. It gathes epots on business eliability, alet the public to business o consume scams, and enfoce the mutual tustiness between consumes and companies
6 eselleatings, business honesty infomation fom BBB, and seach esults fom Google, and by eading eviews. 3) Pecision and Consistency: In ou evaluation, if moe than one evaluato egads a eviewe as a spamme, we label it as a suspicious spamme. Ou evaluatos identified 49 out of 100 suspicious candidates to be spammes. The pecision is 49%. Although ou pecision is not vey high, we ae dealing with much moe subtle and complex cases (not simple duplications), which existing studies could not handle. Besides, ou pecision is meaningful, since human evaluatos agee with each othe on thei judgments. Table II shows the ageement of human judges. Fo example, Evaluato 1 identified 49 suspicious eviewes, out of which 33 wee ecognized by Evaluato 2 and 37 wee caught by Evaluato 3. To study thei ageement, we used Fleiss kappa [1], which is an inte-evaluato ageement measue fo any numbe of evaluatos. The kappa among 3 evaluatos is 60.3%, which epesents almost substantial ageement [6]. It is also impotant to note that those eviewes who wee not identified as spammes ae not necessaily innocent. It is simply because ou judges did not found enough evidences to conclude they ae spammes. Evaluato 1 Evaluato 2 Evaluato 3 Evaluato Evaluato Evaluato 3 40 TABLE II: HUMAN EVALUATION RESULT 4) Compae with Baseline: Since ou wok is the fist to use a eview gaph and taget at subtle spamming activities, thee is no existing wok to compae. Given the diffeences between ou wok and pevious studies, we want to demonstate that suspicious eviewes found by ou method can hadly be identified by existing techniques. We choose to compae with the appoach in Lim et al. [8], because it is the state-of-at of behavio based spamme detection techniques. They use some types of duplicate eviews as a stong evidence of spamming. They fist look fo candidates who have multiple eviews about one taget (in ou case stoe), and then compute spamming scoes to captue spammes fom the candidates. In ou top 100 suspicious candidate list, only 3 candidates can be found based on the duplication citeion. Moeove, only 1 out of these 3 candidates is finally labeled as a spamme by ou human evaluatos. This esult means that ou wok detects diffeent types of spamming activities fom existing eseaches. They can seldom find the spamme types that we can find. By no means do we claim that the existing methods ae not useful. Instead, ou method aims to find those that cannot be found by pevious methods. 5) Suspicious Spamme Case Study: Hee we take a close look at eviewes anked highly suspicious. We pick two candidates: one often pomotes stoes while the othe demotes stoes. The fist case is the eviewe howcome 3, 3 whose eviews ae mostly positive. When we examined these eviews, we found many of them ae poblematic, such as those highly ated eviews fo UBid, OnRebate, ISquaed Inc, Batteies.com, and BigCazyStoe.com. Fo example, UBid is widely complained at diffeent eview websites like ConsumeAffais, epinions, CimesOfPesuasion, and ReselleRatings. OnRebate was sued fo failing to pay ebates to customes. ISquaed Inc was ated D by BBB. Batteies.com is geneally lowly ated at ReselleRatings. BigCazyStoe has vey few ecods about its quality on the Intenet. And this eviewe s eview is the only one about BigCazyStoe on ReselleRatings. All these evidences lead us to conclude that this eviewe is suspicious. The second case is shibbyjk 4. All eviews of this eviewe ae complaints. All stoes being complained ae high quality stoes accoding to BBB, e.g., 1SaleADay(A), StaMico(B+), 3B Tech(B), and Accstation(A ). Fom these unfai atings, one may ague that this eviewe may be still nomal but just picky. Howeve, afte eading all his/he negative eviews, we found that all complaints ae about tansaction poblems. It is fishy because the chance of all these quality companies having tansaction poblems and cedit cad fauds with this paticula custome is vey low. Besides, tansaction poblems ae a good excuse to make false complains, since the tuth is had to be veified. IV. CONCLUTION This pape poposed a novel eview gaph model and an iteative method utilizing influences among eviewes, eviews, and stoes to detect spammes. The method showed how the infomation in the eview gaph indicates the causes fo spamming and eveals impotant clues of diffeent types of spammes. Expeimental esults show that the poposed method can identify subtle spamming activities with good pecision and human evaluato ageement. REFERENCES [1] J.L. Fleiss and J. Cohen. The equivalence of weighted kappa and the intaclass coelation coefficient as measues of eliability. Educational and Psychological Measuement, [2] M. Hu and B. Liu. Mining and summaizing custome eviews. In KDD, [3] N. Jindal and B. Liu. Opinion spam and analysis. In WSDM 08, [4] N. Jindal, B. Liu, and E.P. Lim. Finding unusual eview pattens using unexpected ules. In CIKM, 2010 [5] J. Kleinbeg. Authoitative souces in a hypelinked envionment. In Jounal of the ACM (JACM), [6] J.R. Landis and G.G. Koch. The measuement of obseve ageement fo categoical data. Biometics, [7] F. Li, M. Huang, Y. Yang, X. Zhu. Leaning to identify eview Spam. In IJCAI, [8] E.P. Lim, V.A. Nguyen, N. Jindal, B. Liu, and H.W. Lauw. Detecting poduct eview spammes using ating behavios. In CIKM, [9] Ott, M., Y. Choi, C. Cadie, and J.T. Hancock. Finding deceptive opinion spam by any stetch of the imagination. In ACL, [10] X. Yin, J. Han, and P.S. Yu. Tuth discovey with multiple conflicting infomation povides on the web. In TKDE,
Chapter 3 Savings, Present Value and Ricardian Equivalence
Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,
More informationest using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.
9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,
More informationSTUDENT RESPONSE TO ANNUITY FORMULA DERIVATION
Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts
More informationThe transport performance evaluation system building of logistics enterprises
Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics
More informationChannel selection in e-commerce age: A strategic analysis of co-op advertising models
Jounal of Industial Engineeing and Management JIEM, 013 6(1):89-103 Online ISSN: 013-0953 Pint ISSN: 013-843 http://dx.doi.og/10.396/jiem.664 Channel selection in e-commece age: A stategic analysis of
More informationConverting knowledge Into Practice
Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading
More informationQuestions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing
M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow
More informationConcept and Experiences on using a Wiki-based System for Software-related Seminar Papers
Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,
More informationIlona V. Tregub, ScD., Professor
Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation
More informationUncertain Version Control in Open Collaborative Editing of Tree-Structured Documents
Uncetain Vesion Contol in Open Collaboative Editing of Tee-Stuctued Documents M. Lamine Ba Institut Mines Télécom; Télécom PaisTech; LTCI Pais, Fance mouhamadou.ba@ telecom-paistech.f Talel Abdessalem
More informationSemipartial (Part) and Partial Correlation
Semipatial (Pat) and Patial Coelation his discussion boows heavily fom Applied Multiple egession/coelation Analysis fo the Behavioal Sciences, by Jacob and Paticia Cohen (975 edition; thee is also an updated
More informationIgnorance is not bliss when it comes to knowing credit score
NET GAIN Scoing points fo you financial futue AS SEEN IN USA TODAY SEPTEMBER 28, 2004 Ignoance is not bliss when it comes to knowing cedit scoe By Sanda Block USA TODAY Fom Alabama comes eassuing news
More informationDatabase Management Systems
Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012
More informationAn Introduction to Omega
An Intoduction to Omega Con Keating and William F. Shadwick These distibutions have the same mean and vaiance. Ae you indiffeent to thei isk-ewad chaacteistics? The Finance Development Cente 2002 1 Fom
More informationON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS
ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy
More informationSoftware Engineering and Development
I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining
More informationComparing Availability of Various Rack Power Redundancy Configurations
Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability
More informationFinancing Terms in the EOQ Model
Financing Tems in the EOQ Model Habone W. Stuat, J. Columbia Business School New Yok, NY 1007 hws7@columbia.edu August 6, 004 1 Intoduction This note discusses two tems that ae often omitted fom the standad
More informationA framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods
A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd Omidgolshan87@yahoo.com
More information9:6.4 Sample Questions/Requests for Managing Underwriter Candidates
9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated
More informationSupplementary Material for EpiDiff
Supplementay Mateial fo EpiDiff Supplementay Text S1. Pocessing of aw chomatin modification data In ode to obtain the chomatin modification levels in each of the egions submitted by the use QDCMR module
More informationComparing Availability of Various Rack Power Redundancy Configurations
Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance
More informationAn Analysis of Manufacturer Benefits under Vendor Managed Systems
An Analysis of Manufactue Benefits unde Vendo Managed Systems Seçil Savaşaneil Depatment of Industial Engineeing, Middle East Technical Univesity, 06531, Ankaa, TURKEY secil@ie.metu.edu.t Nesim Ekip 1
More informationCONCEPT OF TIME AND VALUE OFMONEY. Simple and Compound interest
CONCEPT OF TIME AND VALUE OFMONEY Simple and Compound inteest What is the futue value of shs 10,000 invested today to ean an inteest of 12% pe annum inteest payable fo 10 yeas and is compounded; a. Annually
More informationOffice of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs
Office of Family Assistance Evaluation Resouce Guide fo Responsible Fathehood Pogams Contents Intoduction........................................................ 4 Backgound..........................................................
More informationAN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM
AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,
More informationPRICING MODEL FOR COMPETING ONLINE AND RETAIL CHANNEL WITH ONLINE BUYING RISK
PRICING MODEL FOR COMPETING ONLINE AND RETAIL CHANNEL WITH ONLINE BUYING RISK Vaanya Vaanyuwatana Chutikan Anunyavanit Manoat Pinthong Puthapon Jaupash Aussaavut Dumongsii Siinhon Intenational Institute
More informationEfficient Redundancy Techniques for Latency Reduction in Cloud Systems
Efficient Redundancy Techniques fo Latency Reduction in Cloud Systems 1 Gaui Joshi, Emina Soljanin, and Gegoy Wonell Abstact In cloud computing systems, assigning a task to multiple seves and waiting fo
More informationModeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN
Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,
More informationTiming Synchronization in High Mobility OFDM Systems
Timing Synchonization in High Mobility OFDM Systems Yasamin Mostofi Depatment of Electical Engineeing Stanfod Univesity Stanfod, CA 94305, USA Email: yasi@wieless.stanfod.edu Donald C. Cox Depatment of
More informationAn Epidemic Model of Mobile Phone Virus
An Epidemic Model of Mobile Phone Vius Hui Zheng, Dong Li, Zhuo Gao 3 Netwok Reseach Cente, Tsinghua Univesity, P. R. China zh@tsinghua.edu.cn School of Compute Science and Technology, Huazhong Univesity
More informationOver-encryption: Management of Access Control Evolution on Outsourced Data
Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità
More informationMETHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION
ETHODOOGICA APPOACH TO STATEGIC PEFOANCE OPTIIZATION ao Hell * Stjepan Vidačić ** Željo Gaača *** eceived: 4. 07. 2009 Peliminay communication Accepted: 5. 0. 2009 UDC 65.02.4 This pape pesents a matix
More informationMining Relatedness Graphs for Data Integration
Mining Relatedness Gaphs fo Data Integation Jeemy T. Engle (jtengle@indiana.edu) Ying Feng (yingfeng@indiana.edu) Robet L. Goldstone (goldsto@indiana.edu) Indiana Univesity Bloomington, IN. 47405 USA Abstact
More informationDefine What Type of Trader Are you?
Define What Type of Tade Ae you? Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 1 Disclaime and Risk Wanings Tading any financial maket involves isk. The content of this
More informationDefinitions and terminology
I love the Case & Fai textbook but it is out of date with how monetay policy woks today. Please use this handout to supplement the chapte on monetay policy. The textbook assumes that the Fedeal Reseve
More informationEffect of Contention Window on the Performance of IEEE 802.11 WLANs
Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,
More informationThe impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011
The impact of migation on the povision of UK public sevices (SRG.10.039.4) Final Repot Decembe 2011 The obustness The obustness of the analysis of the is analysis the esponsibility is the esponsibility
More informationHEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING
U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available
More informationINITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS
INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in
More informationReferral service and customer incentive in online retail supply Chain
Refeal sevice and custome incentive in online etail supply Chain Y. G. Chen 1, W. Y. Zhang, S. Q. Yang 3, Z. J. Wang 4 and S. F. Chen 5 1,,3,4 School of Infomation Zhejiang Univesity of Finance and Economics
More informationThe Role of Gravity in Orbital Motion
! The Role of Gavity in Obital Motion Pat of: Inquiy Science with Datmouth Developed by: Chistophe Caoll, Depatment of Physics & Astonomy, Datmouth College Adapted fom: How Gavity Affects Obits (Ohio State
More informationAn application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty
An application of stochastic pogamming in solving capacity allocation and migation planning poblem unde uncetainty Yin-Yann Chen * and Hsiao-Yao Fan Depatment of Industial Management, National Fomosa Univesity,
More informationAdaptive Queue Management with Restraint on Non-Responsive Flows
Adaptive Queue Management wi Restaint on Non-Responsive Flows Lan Li and Gyungho Lee Depatment of Electical and Compute Engineeing Univesity of Illinois at Chicago 85 S. Mogan Steet Chicago, IL 667 {lli,
More informationTracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors
Tacking/Fusion and Deghosting with Dopple Fequency fom Two Passive Acoustic Sensos Rong Yang, Gee Wah Ng DSO National Laboatoies 2 Science Pak Dive Singapoe 11823 Emails: yong@dso.og.sg, ngeewah@dso.og.sg
More informationAutomatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*
Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:
More informationSkills Needed for Success in Calculus 1
Skills Needed fo Success in Calculus Thee is much appehension fom students taking Calculus. It seems that fo man people, "Calculus" is snonmous with "difficult." Howeve, an teache of Calculus will tell
More informationPromised Lead-Time Contracts Under Asymmetric Information
OPERATIONS RESEARCH Vol. 56, No. 4, July August 28, pp. 898 915 issn 3-364X eissn 1526-5463 8 564 898 infoms doi 1.1287/ope.18.514 28 INFORMS Pomised Lead-Time Contacts Unde Asymmetic Infomation Holly
More informationFaithful Comptroller s Handbook
Faithful Comptolle s Handbook Faithful Comptolle s Handbook Selection of Faithful Comptolle The Laws govening the Fouth Degee povide that the faithful comptolle be elected, along with the othe offices
More informationNBER WORKING PAPER SERIES FISCAL ZONING AND SALES TAXES: DO HIGHER SALES TAXES LEAD TO MORE RETAILING AND LESS MANUFACTURING?
NBER WORKING PAPER SERIES FISCAL ZONING AND SALES TAXES: DO HIGHER SALES TAXES LEAD TO MORE RETAILING AND LESS MANUFACTURING? Daia Bunes David Neumak Michelle J. White Woking Pape 16932 http://www.nbe.og/papes/w16932
More informationSpirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project
Spiotechnics! Septembe 7, 2011 Amanda Zeingue, Michael Spannuth and Amanda Zeingue Dieential Geomety Poject 1 The Beginning The geneal consensus of ou goup began with one thought: Spiogaphs ae awesome.
More informationContinuous Compounding and Annualization
Continuous Compounding and Annualization Philip A. Viton Januay 11, 2006 Contents 1 Intoduction 1 2 Continuous Compounding 2 3 Pesent Value with Continuous Compounding 4 4 Annualization 5 5 A Special Poblem
More informationChris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment
Chis J. Skinne The pobability of identification: applying ideas fom foensic statistics to disclosue isk assessment Aticle (Accepted vesion) (Refeeed) Oiginal citation: Skinne, Chis J. (2007) The pobability
More informationQuestions for Review. By buying bonds This period you save s, next period you get s(1+r)
MACROECONOMICS 2006 Week 5 Semina Questions Questions fo Review 1. How do consumes save in the two-peiod model? By buying bonds This peiod you save s, next peiod you get s() 2. What is the slope of a consume
More informationCarter-Penrose diagrams and black holes
Cate-Penose diagams and black holes Ewa Felinska The basic intoduction to the method of building Penose diagams has been pesented, stating with obtaining a Penose diagam fom Minkowski space. An example
More informationA Capacitated Commodity Trading Model with Market Power
A Capacitated Commodity Tading Model with Maket Powe Victo Matínez-de-Albéniz Josep Maia Vendell Simón IESE Business School, Univesity of Navaa, Av. Peason 1, 08034 Bacelona, Spain VAlbeniz@iese.edu JMVendell@iese.edu
More informationTop K Nearest Keyword Search on Large Graphs
Top K Neaest Keywod Seach on Lage Gaphs Miao Qiao, Lu Qin, Hong Cheng, Jeffey Xu Yu, Wentao Tian The Chinese Univesity of Hong Kong, Hong Kong, China {mqiao,lqin,hcheng,yu,wttian}@se.cuhk.edu.hk ABSTRACT
More informationIBM Research Smarter Transportation Analytics
IBM Reseach Smate Tanspotation Analytics Laua Wynte PhD, Senio Reseach Scientist, IBM Watson Reseach Cente lwynte@us.ibm.com INSTRUMENTED We now have the ability to measue, sense and see the exact condition
More informationFirstmark Credit Union Commercial Loan Department
Fistmak Cedit Union Commecial Loan Depatment Thank you fo consideing Fistmak Cedit Union as a tusted souce to meet the needs of you business. Fistmak Cedit Union offes a wide aay of business loans and
More informationChapter 11: Aggregate Demand II, Applying the IS-LM Model Th LM t
Equilibium in the - model The cuve epesents equilibium in the goods maket. Chapte :, Applying the - Model Th t C ( T) I( ) G The cuve epesents money maket equilibium. M L(, ) The intesection detemines
More informationENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM
Computing and Infomatics, Vol. 29, 2010, 537 555 ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM Gaia Tecaichi, Veonica Rizzi, Mauizio Machese Depatment of
More informationVISCOSITY OF BIO-DIESEL FUELS
VISCOSITY OF BIO-DIESEL FUELS One of the key assumptions fo ideal gases is that the motion of a given paticle is independent of any othe paticles in the system. With this assumption in place, one can use
More informationExperiment 6: Centripetal Force
Name Section Date Intoduction Expeiment 6: Centipetal oce This expeiment is concened with the foce necessay to keep an object moving in a constant cicula path. Accoding to Newton s fist law of motion thee
More informationReduced Pattern Training Based on Task Decomposition Using Pattern Distributor
> PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task
More informationFuzzy Evaluation Method of Virtual Reality for Urban Landscape Design
Fuzzy Evaluation Method of Vitual Reality fo Uban Landscape Design Hsiaolin Wang 1, Yufeng Ho 2 and Kuochin Chen 2 1 Depatment of Landscape, Tunghai Univesity, Taichung, Taiwan, whl1435@hotmail.com 2 Gaduate
More informationLoyalty Rewards and Gift Card Programs: Basic Actuarial Estimation Techniques
Loyalty Rewads and Gift Cad Pogams: Basic Actuaial Estimation Techniques Tim A. Gault, ACAS, MAAA, Len Llaguno, FCAS, MAAA and Matin Ménad, FCAS, MAAA Abstact In this pape we establish an actuaial famewok
More informationFinancial Planning and Risk-return profiles
Financial Planning and Risk-etun pofiles Stefan Gaf, Alexande Kling und Jochen Russ Pepint Seies: 2010-16 Fakultät fü Mathematik und Witschaftswissenschaften UNIERSITÄT ULM Financial Planning and Risk-etun
More informationThe Predictive Power of Dividend Yields for Stock Returns: Risk Pricing or Mispricing?
The Pedictive Powe of Dividend Yields fo Stock Retuns: Risk Picing o Mispicing? Glenn Boyle Depatment of Economics and Finance Univesity of Cantebuy Yanhui Li Depatment of Economics and Finance Univesity
More informationRisk Sensitive Portfolio Management With Cox-Ingersoll-Ross Interest Rates: the HJB Equation
Risk Sensitive Potfolio Management With Cox-Ingesoll-Ross Inteest Rates: the HJB Equation Tomasz R. Bielecki Depatment of Mathematics, The Notheasten Illinois Univesity 55 Noth St. Louis Avenue, Chicago,
More informationAn Efficient Group Key Agreement Protocol for Ad hoc Networks
An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,
More informationThe Detection of Obstacles Using Features by the Horizon View Camera
The Detection of Obstacles Using Featues b the Hoizon View Camea Aami Iwata, Kunihito Kato, Kazuhiko Yamamoto Depatment of Infomation Science, Facult of Engineeing, Gifu Univesit aa@am.info.gifu-u.ac.jp
More information2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses,
3.4. KEPLER S LAWS 145 3.4 Keple s laws You ae familia with the idea that one can solve some mechanics poblems using only consevation of enegy and (linea) momentum. Thus, some of what we see as objects
More informationGravitational Mechanics of the Mars-Phobos System: Comparing Methods of Orbital Dynamics Modeling for Exploratory Mission Planning
Gavitational Mechanics of the Mas-Phobos System: Compaing Methods of Obital Dynamics Modeling fo Exploatoy Mission Planning Alfedo C. Itualde The Pennsylvania State Univesity, Univesity Pak, PA, 6802 This
More informationElectricity transmission network optimization model of supply and demand the case in Taiwan electricity transmission system
Electicity tansmission netwok optimization model of supply and demand the case in Taiwan electicity tansmission system Miao-Sheng Chen a Chien-Liang Wang b,c, Sheng-Chuan Wang d,e a Taichung Banch Gaduate
More informationSelf-Adaptive and Resource-Efficient SLA Enactment for Cloud Computing Infrastructures
2012 IEEE Fifth Intenational Confeence on Cloud Computing Self-Adaptive and Resouce-Efficient SLA Enactment fo Cloud Computing Infastuctues Michael Maue, Ivona Bandic Distibuted Systems Goup Vienna Univesity
More informationYARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH
nd INTERNATIONAL TEXTILE, CLOTHING & ESIGN CONFERENCE Magic Wold of Textiles Octobe 03 d to 06 th 004, UBROVNIK, CROATIA YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH Jana VOBOROVA; Ashish GARG; Bohuslav
More informationExam #1 Review Answers
xam #1 Review Answes 1. Given the following pobability distibution, calculate the expected etun, vaiance and standad deviation fo Secuity J. State Pob (R) 1 0.2 10% 2 0.6 15 3 0.2 20 xpected etun = 0.2*10%
More informationUnveiling the MPLS Structure on Internet Topology
Unveiling the MPLS Stuctue on Intenet Topology Gabiel Davila Revelo, Mauicio Andeson Ricci, Benoit Donnet, José Ignacio Alvaez-Hamelin INTECIN, Facultad de Ingenieía, Univesidad de Buenos Aies Agentina
More informationData Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation
(213) 1 28 Data Cente Demand Response: Avoiding the Coincident Peak via Wokload Shifting and Local Geneation Zhenhua Liu 1, Adam Wieman 1, Yuan Chen 2, Benjamin Razon 1, Niangjun Chen 1 1 Califonia Institute
More informationResearch on Risk Assessment of the Transformer Based on Life Cycle Cost
ntenational Jounal of Smat Gid and lean Enegy eseach on isk Assessment of the Tansfome Based on Life ycle ost Hui Zhou a, Guowei Wu a, Weiwei Pan a, Yunhe Hou b, hong Wang b * a Zhejiang Electic Powe opoation,
More informationHow to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database
AnswesThatWok TM Recoveing Emails and Mailboxes fom a PRIV1.EDB Exchange 2003 IS database How to ecove you Exchange 2003/2007 mailboxes and emails if all you have available ae you PRIV1.EDB and PRIV1.STM
More informationNontrivial lower bounds for the least common multiple of some finite sequences of integers
J. Numbe Theoy, 15 (007), p. 393-411. Nontivial lowe bounds fo the least common multiple of some finite sequences of integes Bai FARHI bai.fahi@gmail.com Abstact We pesent hee a method which allows to
More informationarxiv:1110.2612v1 [q-fin.st] 12 Oct 2011
Maket inefficiency identified by both single and multiple cuency tends T.Toká 1, and D. Hováth 1, 1 Sos Reseach a.s., Stojáenská 3, 040 01 Košice, Slovak Republic Abstact axiv:1110.2612v1 [q-fin.st] 12
More informationAn Infrastructure Cost Evaluation of Single- and Multi-Access Networks with Heterogeneous Traffic Density
An Infastuctue Cost Evaluation of Single- and Multi-Access Netwoks with Heteogeneous Taffic Density Andes Fuuskä and Magnus Almgen Wieless Access Netwoks Eicsson Reseach Kista, Sweden [andes.fuuska, magnus.almgen]@eicsson.com
More informationLeft- and Right-Brain Preferences Profile
Left- and Right-Bain Pefeences Pofile God gave man a total bain, and He expects us to pesent both sides of ou bains back to Him so that He can use them unde the diection of His Holy Spiit as He so desies
More informationHigh Availability Replication Strategy for Deduplication Storage System
Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, zhouzd@smail.hust.edu.cn jlzhou@mail.hust.edu.cn Abstact As the amount of digital data
More informationAn Approach to Optimized Resource Allocation for Cloud Simulation Platform
An Appoach to Optimized Resouce Allocation fo Cloud Simulation Platfom Haitao Yuan 1, Jing Bi 2, Bo Hu Li 1,3, Xudong Chai 3 1 School of Automation Science and Electical Engineeing, Beihang Univesity,
More informationCollege Enrollment, Dropouts and Option Value of Education
College Enollment, Dopouts and Option Value of Education Ozdagli, Ali Tachte, Nicholas y Febuay 5, 2008 Abstact Psychic costs ae the most impotant component of the papes that ae tying to match empiical
More informationSupply chain information sharing in a macro prediction market
Decision Suppot Systems 42 (2006) 944 958 www.elsevie.com/locate/dss Supply chain infomation shaing in a maco pediction maket Zhiling Guo a,, Fang Fang b, Andew B. Whinston c a Depatment of Infomation
More informationMULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION
MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION K.C. CHANG AND TAN ZHANG In memoy of Pofesso S.S. Chen Abstact. We combine heat flow method with Mose theoy, supe- and subsolution method with
More informationEpisode 401: Newton s law of universal gravitation
Episode 401: Newton s law of univesal gavitation This episode intoduces Newton s law of univesal gavitation fo point masses, and fo spheical masses, and gets students pactising calculations of the foce
More informationCONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS
CONCEPUAL FAMEOK FO DEVELOPING AND VEIFICAION OF AIBUION MODELS. AIHMEIC AIBUION MODELS Yui K. Shestopaloff, is Diecto of eseach & Deelopment at SegmentSoft Inc. He is a Docto of Sciences and has a Ph.D.
More informationHow Much Should a Firm Borrow. Effect of tax shields. Capital Structure Theory. Capital Structure & Corporate Taxes
How Much Should a Fim Boow Chapte 19 Capital Stuctue & Copoate Taxes Financial Risk - Risk to shaeholdes esulting fom the use of debt. Financial Leveage - Incease in the vaiability of shaeholde etuns that
More informationChoosing the best hedonic product represents a challenging
Thosten Hennig-Thuau, Andé Machand, & Paul Max Can Automated Systems Help Consumes Make Bette Choices? Because hedonic poducts consist pedominantly of expeience attibutes, often with many available altenatives,
More informationFigure 2. So it is very likely that the Babylonians attributed 60 units to each side of the hexagon. Its resulting perimeter would then be 360!
1. What ae angles? Last time, we looked at how the Geeks intepeted measument of lengths. Howeve, as fascinated as they wee with geomety, thee was a shape that was much moe enticing than any othe : the
More informationResearch and the Approval Process
Reseach and the Appoval Pocess Emeic Heny y Maco Ottaviani z Febuay 2014 Abstact An agent sequentially collects infomation to obtain a pincipal s appoval, such as a phamaceutical company seeking FDA appoval
More informationHow To Find The Optimal Stategy For Buying Life Insuance
Life Insuance Puchasing to Reach a Bequest Ehan Bayakta Depatment of Mathematics, Univesity of Michigan Ann Abo, Michigan, USA, 48109 S. David Pomislow Depatment of Mathematics, Yok Univesity Toonto, Ontaio,
More informationSupporting Efficient Top-k Queries in Type-Ahead Search
Suppoting Efficient Top-k Queies in Type-Ahead Seach Guoliang Li Jiannan Wang Chen Li Jianhua Feng Depatment of Compute Science, Tsinghua National Laboatoy fo Infomation Science and Technology (TNList),
More informationModel-Driven Engineering of Adaptation Engines for Self-Adaptive Software: Executable Runtime Megamodels
Model-Diven Engineeing of Adaptation Engines fo Self-Adaptive Softwae: Executable Runtime Megamodels Thomas Vogel, Holge Giese Technische Beichte N. 66 des Hasso-Plattne-Instituts fü Softwaesystemtechnik
More information883 Brochure A5 GENE ss vernis.indd 1-2
ess x a eu / u e a. p o.eu c e / :/ http EURAXESS Reseaches in Motion is the gateway to attactive eseach caees in Euope and to a pool of wold-class eseach talent. By suppoting the mobility of eseaches,
More information