Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Chun, Soon
City University of New York
Staten Island, New York
   Reviewer Selected
Follow this Reviewer
Date Reviewed  
- 10 of 20 reviews

  Detecting cooperative and organized spammer groups in micro-blogging community
Dang Q., Zhou Y., Gao F., Sun Q.  Data Mining and Knowledge Discovery 31(3): 573-605, 2017. Type: Article

Public relations (PR) companies hire and pay cooperative and organized spammer groups to post specific content on online microblogging sites, such as Twitter, to influence public opinion or trending topics (topic hijacking). Detecting such spammer...

Jan 4 2018  
  A taxonomy and survey of cloud resource orchestration techniques
Weerasiri D., Barukh M., Benatallah B., Sheng Q., Ranjan R.  ACM Computing Surveys 50(2): 1-41, 2017. Type: Article

Cloud services provide computing resources (for example, infrastructure, platform, and software) as services. Utilizing these cloud resources requires a complex life cycle process that involves select, describe, configure, deploy, and manage steps...

Aug 9 2017  
  Joint modeling of user check-in behaviors for real-time point-of-interest recommendation
Yin H., Cui B., Zhou X., Wang W., Huang Z., Sadiq S.  ACM Transactions on Information Systems 35(2): Article No. 11, 2016. Type: Article

In order to predict and recommend the points of interest (POIs) for a given combination of user, current location, and time, a joint probabilistic generative model called the topic region model (TRM) is presented. It combines user interests and us...

Apr 26 2017  
  Beyond entities: promoting explorative search with bundles
Bordino I., Lalmas M., Mejova Y., Van Laere O.  Information Retrieval 19(5): 447-486, 2016. Type: Article

Search results are usually ranked lists of documents relevant to query terms. In this paper, the entity search results are bundled with those beyond the query term, by constructing the entity network where extracted entities and pairwise entity re...

Jan 25 2017  
   Online social trust reinforced personalized recommendation
Cheng Y., Liu J., Yu X.  Personal and Ubiquitous Computing 20(3): 457-467, 2016. Type: Article

The authors propose an online social trust model that consists of public trust users and private trust users for use in a recommender algorithm. The public trust users are defined as users who have a large number of fans in the social network. The...

Dec 21 2016  
  Opinions matter: a general approach to user profile modeling for contextual suggestion
Yang P., Wang H., Fang H., Cai D.  Information Retrieval 18(6): 586-610, 2015. Type: Article

Recommender systems heavily rely on modeling accurate user profiles and preferences. For place recommender systems, the authors present the opinion-based user profile model. A user’s rating (like or dislike) groups the reviews of other users...

Feb 26 2016  
   Predictive analytics and data mining: concepts and practice with RapidMiner
Kotu V., Deshpande B.,  Morgan Kaufmann Publishers Inc., San Francisco, CA, 2014. 446 pp. Type: Book (978-0-128014-60-8)

As organizations are flooded with data, data analytics has emerged as an essential task for gaining insights for data-driven decision making. The popularity and importance of data analytics and data mining have been demonstrated by the establishme...

Nov 30 2015  
  User activity patterns during information search
Cole M., Hendahewa C., Belkin N., Shah C.  ACM Transactions on Information Systems 33(1): 1-39, 2015. Type: Article

The activity pattern analysis methodology is presented to detect different types of search tasks during information searches. The observable data from search task sessions include different page-related activities, such as seeing or revisiting a c...

Sep 28 2015  
  Content-based control of HTTPs mail for implementation of IT-convergence security environment
Hong Y., Kim D.  Journal of Intelligent Manufacturing 25(2): 231-239, 2014. Type: Article

Many organizations face the challenging task of balancing the confidentiality of their email messages with the enforcement of their security policies to prevent data loss, or to comply with legal email archiving obligations that mandate preserving...

Apr 15 2015  
  Practical Cassandra: a developer’s approach
Bradberry R., Lubow E.,  Addison-Wesley Professional, Upper Saddle River, NJ, 2014. 208 pp. Type: Book (978-0-321933-94-2)

The book aims to be a quick guide for developers, covering installation, management, and application development in Cassandra, a popular, massively scalable open-source NoSQL database. It describes all the steps to start a Cassandra cluster, inclu...

Feb 12 2015  
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy