Http://ebiquity.umbc.edu/ 16 February 2007.

Slides:



Advertisements
Similar presentations
BlogVox: Separating Blog Wheat from Blog Chaff Akshay Java, Pranam Kolari, Tim Finin, Aupam Joshi, Justin Martineau (UMBC) James Mayfield (JHU/APL) Akshay.
Advertisements

Our Digital World Second Edition
Social Media.
Mine Action Information Center
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
UMBC AN HONORS UNIVERSITY IN MARYLAND Future Research Challenges and Needed Resources for The Web, Semantics and Data Mining Tim Finin UMBC, Baltimore.
Search Engines and Information Retrieval
Social Media and Marketing Contemporary Issues in Marketing 420 MKT.
A Social Help Engine for Online Social Network Mobile Users Tam Vu, Akash Baid WINLAB, Rutgers University May 21,
Top Objectives: 1.Increase web traffic and exposure 2.Become definitive authority on Coffee 3.Increase sales to coffee centric Food Service Operators 4.Engage.
Business Driven Technology Unit 4
Comparing Internet Medias Kaitlyn Stahl CSC 101. Podcasts  A podcast is a digital media file that are shared over the web using syndication feeds, for.
Semantic Web outlook and trends May The Past 24 Odd Years 1984 Lenat’s Cyc vision 1989 TBL’s Web vision 1991 DARPA Knowledge Sharing Effort 1996.
Search Engines and Information Retrieval Chapter 1.
Content Strategy.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Pervasive software interoperability for the Operating Room of the Future May 10, 2005.
UMBC an Honors University in Maryland 1 Adding Semantics to Social Websites for Citizen Science Pranam Kolari University of Maryland, Baltimore County.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
UMBC an Honors University in Maryland Characterizing the Splogosphere Tim Finin Pranam Kolari, Akshay Java.
Future Learning Landscapes Yvan Peter – Université Lille 1 Serge Garlatti – Telecom Bretagne.
Online Advertising Distribution System 1. Why Digital Marketing? 2.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Spring 2007.
A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks Anand Patwardhan, Anupam Joshi, Tim Finin, and Yelena Yesha Anand Patwardhan.
Blog Track Open Task: Spam Blog Detection Tim Finin Pranam Kolari, Akshay Java, Tim Finin, Anupam Joshi, Justin.
UMBC an Honors University in Maryland 1 Information Integration and the Semantic Web Finding knowledge, data and answers Tim Finin 1, Anupam Joshi 1, Li.
Jesse English and Sandor Dornbush With help from: Dr. Zary Segall & Chad Eby.
WEB 2.0 PATTERNS Carolina Marin. Content  Introduction  The Participation-Collaboration Pattern  The Collaborative Tagging Pattern.
THE INTERNET. TABLE OF CONTENT CONNECTING TO THE INTERNET ELECTRONIC MAIL WORLD WIDE WEB INTERNET SERVICES.
Computer Science and Engineering 1 Mobile Computing and Security.
Opportunistic P2P Interactions in Mobile Pervasive Environments Olga Ratsimor Ph.D. Candidate Olga Ratsimor Ph.D. Candidate.
Blog Track Open Task: Spam Blog Detection Tim Finin Pranam Kolari, Akshay Java, Tim Finin, Anupam Joshi, Justin.
Selected Semantic Web UMBC CoBrA – Context Broker Architecture  Using OWL to define ontologies for context modeling and reasoning  Taking.
Building a Social Media Presence Participants will look at the BCPS social media outlets (Twitter, Facebook, Flickr, Vimeo, Instagram, blogs) and relevant.
SVMs for the Blogosphere: Blog Identification and Splog Detection Pranam Kolari, Tim Finin, Anupam Joshi Computational Approaches to Analyzing Weblogs,
Search Engine Optimization (SEO) Presentation By Celina Jonesi Small Business Seo – KG Tech.
Types and purposes of online communities. Types of websites within online communities blogs chat rooms forums social networking wikis.
Off-Site SEO to Improve Your Website’s Page Rank Straight Up Marketing.
Internet Business Associate v2.0
Search Engine Optimization
Information Retrieval in Practice
Technical Communication: Concepts and Features
Thotwaves Innovations Welcome To SMM & SMO Activity Plan
Modeling Influence Opinions and Structure in Social Media
Marking the Most of the Web’s Resources
The Spread of Media Content through the Blogosphere
Sentiment analysis algorithms and applications: A survey
The Internet Industry Week Two.
CCT356: Online Advertising and Marketing
A Machine Learning Approach
What does Google think of you?
What is Search Engine optimization
Video and Sensor Network Architecture and Displays
Feeds That Matter A study of Bloglines subscriptions
SEARCH ENGINE OPTIMIZATION SEO. What is SEO? It is the process of optimizing structure, design and content of your website in order to increase traffic.
Overview The promotion of products or brands via Digital media Digital Media  Search Engine Marketing Search Engine Marketing  Social Media Marketing.
Trust on Blogosphere using Link Polarity Anubhav Kale, Akshay Java, Pranam Kolari, Dr Anupam Joshi, Dr Tim Finin Motivation Link Polarity Computation.
Chapter 4 Online Consumer Behavior, Market Research, and Advertisement
Pervasive and wearable computing research 13 September 2006
CS & CS Capstone Project & Software Development Project

Lesson 2: Internet Communication
Web Mining Department of Computer Science and Engg.
Business Intelligence
RSS RSS is an acronymn for Really Simple Syndication or Rich Site Summary. RSS (noun) - an XML format for distributing news headlines on the Web. RSS.

Information Extraction from Social Media
Building Topic/Trend Detection System based on Slow Intelligence
Research Overview 23 August 2006
Cross-layer Analysis for detecting Wireless Misbehavior
Presentation transcript:

http://ebiquity.umbc.edu/ 16 February 2007

UMBC and Ebiquity UMBC is a research extensive University with a major focus on Information Technology Ebiquity is a large and active research group with the goal of “Building intelligent systems in open, heterogeneous, dynamic, distributed environments” Current research includes mobile and pervasive computing, security/trust/privacy, semantic web, multiagent systems, advanced databases, and high performance computing 5/1/2019

CSEE @ UMBC Computer Science & Electrical Engineering UMBC’s largest department with 45 faculty, ~1000 undergrad, ~200 grad students Degree programs (graduate and undergraduate) Computer Science, Computer Engineering, Electrical Engineering Among research universities, UMBC is #1 in BS CS production and #18 in PhD production Many institutes, centers and labs Institute for Language and Information Technology, Center for Information Security and Assurance, Center for Photonics, Lab For Advanced Information Technology, VLSI Lab, CADIP, … Breadth and focus in research areas ~ $5M/year in sponsored research from Government and Industry Pervasive computing, AI, security, information retrieval, graphics, databases, VLSI, … 5/1/2019

http://ebiquity.umbc.edu/ 5/1/2019

People and funding Faculty: Finin, Yesha, Joshi, Peng, Halem Colleagues: Pinkston, Segall, … Students: ~10 PhD, ~10 MS, ~5 undergrad Funding: Current: DARPA (Trauma Pod, STTRs), NSF (two ITRs, Cybertrust, NSG, …), Intelligence community, NASA, NIST, Industry (IBM, Fujitsu, …) Recent: DARPA (CoABS, GENOA II, DAML), NSF (CAREER) 5/1/2019

Ebiquity Research Space KR information extraction user modeling semantic web machine learning IR AI data mining Intelligent Information Systems web services/SOC DB knowledge management wearable computing mobility policies HPCC assurance Networking & Systems wireless Security trust context awareness DRM pervasive computing intrusion detection privacy 5/1/2019

Ebiquity Research Space language technology robotics HCI planning KR Building intelligent systems in open, heterogeneous, dynamic, distributed environments user modeling semantic web data mining machine learning AI DB Intelligent Information Systems knowledge management web services IR service oriented computing wearable computing policies Networking & Systems wireless Security mobility assurance context awareness pervasive computing intrusion detection privacy trust 5/1/2019

Some Current Projects Managing spam in social media Influence and opinions in social media Recognizing communities using opinionated links The Semantic Web Location based advertising Trustworthy data management in ad hoc networks 5/1/2019

Spam in the Blogosphere Pranam Kolari Ph.D. Candidate

Spam in the Blogosphere Types: comment spam, ping spam, spam blogs Akismet: “87% of all comments are spam” 75% of update pings are spam (ebiquity 2005) 20% of indexed blogs by popular blog search engines is spam (Umbria 2006, ebiquity 2006) “Spam blogs, sometimes referred to by the neologism splogs, are weblog sites which the author uses only for promoting affiliated websites” “Spings, or ping spam, are update pings sent from spam blogs” 1Wikipedia Filip Perich 5/1/2019

Plagiarized/Scraped Content Profitable Contexts Plagiarized/Scraped Content Filip Perich 5/1/2019

Spam Pings – Inlets to Search Index Filip Perich 5/1/2019

Source of Splogs “Honestly, Do you think people who make $10k/month from adsense make blogs manually? Come on, they need to make them as fast as possible. Save Time = More Money! It's Common SENSE! How much money do you think you will save if you can increase your work pace by a hundred times? Think about it…” “Discover The Amazing Stealth Traffic Secrets Insiders Use To Drive Thousands Of Targeted Visitors To Any Site They Desire!” “Holy Grail Of Advertising... “ $ 197 “Easily Dominate Any Market, Any Search Engine, Any Keyword.” Filip Perich 5/1/2019

Splog Detection – Home Page Based top features blogs splogs SVM based probabilistic splog detection (Kolari et al., 2006) Hand verified training set of blogs and splogs SVM Based Model Bag-of-words Binary Features Linear Kernel Precision/Recall of 87% Bag-of-words based feature using text on blog home-page Published at AAAI 2006 we what was my org flickr paper words weblog motion me thank go january trackback archives political find info news your another website best articles on perfect products uncategorized hot resources inc three copyright Filip Perich 5/1/2019

56% of all blogs are splogs! Silicon Valley and Splog Valley? 1. Mountain View, CA 2. Washington DC 3. San Francisco, CA 4. Orlando, FL 5. Lansing, MI High PPC contexts are primary spam drivers auto buy california cancer card casino cheap consolidation credit debt diet discount equipment estate finance florida forex free gift golf health hotel insurance jewelry lawyer loan loans medical money mortgage new online phone poker rental sale software texas trading travel used vacation video wedding Filip Perich 5/1/2019

Influence and Opinions in Social Media Akshay Java Ph.D. Candidate

Biz Intelligence from Social Media “Social media describes the online tools and platforms that people use to share opinions, insights, experiences, and perspectives with each other.” – Wikipedia, Feb 07 Social Media is a dynamic and growing area, that includes blogs, wikis, forums, photo and video sharing sites, etc. Goal: Building scalable, solutions and frameworks for analyzing high volumes of blog data to derive business intelligence Filip Perich 5/1/2019

Knowing & Influencing your Market Your goal is to market Apple’s iPod phone How can you track the buzz about it? What are the relevant communities and blogs? Which communities are fans, which are suspicious, which are put off by the hype? Is your advertising having an effect? The desired effect? Which bloggers are influential in this market? Of these, which are already onboard and which are lost causes? To whom should you send details or evaluation samples? Filip Perich 5/1/2019

Influence Detection Influence Detection Influence, bias in MSM Often buyers look for opinions and reviews on blogs Detecting influential nodes and their role in how people perceive a service is an important tool for marketing Using topic, social structure, opinions, biases and temporal information we can develop an accurate model for influence Influence, bias in MSM Top Democrat MSM Sources http://www.rawstory.com http://mediamatters.org http://www.truthout.org http://www.washingtonpost.com Top Republican MSM Sources http://www.foxnews.com http://apnews.myway.com http://www.townhall.com http://www.washingtontimes.com Filip Perich 5/1/2019

Opinions in Social Media TREC 06: Finding opinionated posts, either positive or negative, about a query 2006 TREC Blog corpus: 80K blogs 300K posts 50 test queries Challenges: open domain sentiment words, slangs, subject Reader’s Perspective “Starbucks Sandwiches are bad!” “I went to school early so I would have time to grab some lunch. Which ended up consisting of a crappy sandwich from starbucks and a chai latte. Lacey came into Starbucks while I was there so we chatted for a little bit and she thought that I might be in her class. After I finished eating I headed to school and checked the board……..”1 Narrative Expressed Opinions Opinions can effect buying decisions of customers [1] http://annamay13x.livejournal.com/7061.html Filip Perich 5/1/2019

Finding Feeds That Matter Analysis of Bloglines Feeds 83K publicly listed subscribers 2.8M feeds, 500K are unique 26K users (35%) use folders to organize subscriptions Data collected in May 2006 Before Merge Top Advertising Feeds 1. Adrants » Marketing and Advertising News With Attitude 2. Adverblog: advertising and new media marketing 3. http://ad-rag.com 4. adfreak 5. AdJab 6. MIT Advertising Lab: future of advertising and advertising technology 7. AdPulp: Daily Juice from the Ad Biz 8. Advertising/Design Goodness Related Tags: advertising  marketing  media  news  design  After Merge Filip Perich http://ftm.umbc.edu 5/1/2019

Anubhav Kale M.S Student Link Polarity Anubhav Kale M.S Student

Modeling Influence Using Link Polarity Motivation Growing interest in exploring role of communities in social media Community detection algorithms rely more on link structure and less on sentiment associated with links Convert a sparsely connected blog graph into a densely connected graph with sentiment weight attached to every link Approach Link Polarity : Analyze text surrounding html links in blog posts to determine bias of bloggers about each other Trust Propagation: Use trust propagation models to spread the polarity from a small subset of “connected” bloggers to all bloggers. Experiments Political blogosphere as a specific domain of study. Goal is to divide the dataset of political blogs into left and right leaning blogs. Detection of leaning based on positive/neural/negative score from influential bloggers (high in-link blogs) in both communities Validation with a hand-labeled dataset indicates around 60% correct classification Filip Perich 5/1/2019

Anubhav Kale M.S Student Semantic Web Anubhav Kale M.S Student

http://swoogle.umbc.edu/ Running since summer 2004 1.8M RDF docs, 320M triples, 10K ontologies, 15K namespaces, 1.3M classes, 175K properties, 43M instances, 600 registered users Filip Perich 5/1/2019 27

Applications and Use Cases 1 Supporting Semantic Web Developers Ontology designers, vocabulary discovery, who’s using my ontologies or data?, use analysis, errors, statistics, etc. Searching Specialized Collections Spire: aggregating observations and data from biologists InferenceWeb: searching over and enhancing proofs Supporting Semantic Web Tools Triple shop: finding data for SPARQL queries 2 3 Filip Perich 5/1/2019 28

What are body masses of fishes that eat fishes? Swoogle Triple Shop What are body masses of fishes that eat fishes? At UMBC we have designed a TripleShop, a workshop for semantic web data. We write a database query in a language called SPARQL Essentially, we are writing patterns that will match the kinds of triples I just showed you. Roughly, what we’re saying here is: Find actual foodweb links and consider the taxa that are predators and the taxa that are prey, and make sure that these predators and prey are both fish, and give me the maximum body sizes of these prey and their predators. IF you are familiar with relational database queries, you might notice that I haven’t specified what data tables the data should come from. . . . leaving out the FROM clause Filip Perich 5/1/2019 29

Location Based Advertising Olga Ratsimor Ph.D. Candidate

Intelligent Marketing in Mobile Peer-To-Peer Environments eNcentive MH2 MH1 MH3 Animated Slide Filip Perich 5/1/2019

eNcentive: Targeting Locations Filip Perich 5/1/2019

eNcentive + TrueBahn Trust based mobile shopping Mobile users are divided into two groups Kids and Adults Groups are interlined Kids have a circle of friends that can grow and shrink Adults have circle of other Adults that they trust. The circle can grow and shrink. Kids can shop for items that thy have been authorized to buy If there is a new item on the wish list then kids need to find an Adult from their trust network to give them authorization. Filip Perich 5/1/2019

Bartering of Digital Goods and Services in Pervasive Environments Context-based, continuous bartering with peers in pervasive environments Value in Use - is the value of the particular electronic good or service for the particular user. Value in Exchange - reflects the potential value of the service against any other service in value-for-value exchanges. Effects of collaborative strategies on the welfare of the network Effects of digital rights management restrictions on bartering collaborations Exploiting relationships between groups of devices Filip Perich 5/1/2019

Jesse English and Sandor Dornbush With help from: Dr. Tim Oates, Dr. Anupam Joshi, Dr. Zary Segall & Chad Eby. Filip Perich 5/1/2019

Activity Aware Music Feedback loop between the user and their music. Use the users physiological state to influence the music selection. The music influences the users mood and mindset. Filip Perich 5/1/2019

Current XPod Platform Nokia 5500 Sport Phone Embedded Accelerometers MP3 Player http://europe.nokia.com/A4213113 Filip Perich 5/1/2019

Current Projects Incorporate song metadata Human Generated, eg Last.fm Machine Generated Incorporate other meta information Location Information Recent Phone Calls Weather Filip Perich 5/1/2019

Advertising Potential “Cellphone Ads May Take Off Soon,” New York Times Febuary 14th, 2007 Target adds based on activity profiles. Send running adds to somebody who runs. Target adds based on musical tastes. Truck adds for somebody who listens to country. Filip Perich 5/1/2019

Trustworthy Data Management in Ad Hoc Networks Anand Patwardhan Ph.D Candidate Jim Parker Ph.D Candidate

Situation Awareness allows Adaptation GPS satellite Localized and distributed Wireless Access points Hazard warnings, Detours, Inclement weather, Road conditions, Traveler info. Localized Info-Stream Services Various forms of connectivity Location & directions GSM, GPRS, EDGE, E-VDO WiMax GPS VANET connectivity Update propagation Onboard Computer with various sensors: GPS location Cameras Engine Condition Tire pressure etc. Situation Awareness allows Adaptation Filip Perich 5/1/2019

Securing MANETs Security for resources Trust in other resources Malicious behavior (Activity monitoring) Misuse (Resource protection) Response/recourse (Accountability) Trust in other resources Dependence on recommendations (Identities and Reputations) Reliability of information Filip Perich 5/1/2019

Trust evolution, reputation management, Cross-layer Analysis Trust evolution, reputation management, recourse Intrusion Detection Application Commendations Accusations (to other devices) Packet dropping, Mangling, injection Transport Routing attacks, disruptions Link Unfair contention, Jamming MAC/PHY Response Filip Perich 5/1/2019

Simulation and Modeling Identity Cryptographic Addresses Mobility, congestion, radio interference Reduce false positives Scalability Large radio-ranges or dense networks Aggregation of data Communicate intrusions data to warn others Filip Perich 5/1/2019

Other Current and Recent Projects

Other Current and Recent Projects Pervasive and mobile computing (1) Trauma Pod (2) Context aware pervasive computing (3) Mogatu: Tivo for mobile computing Semantic Web (4) Swoogle: searching and indexing Semantic Web data (5) Semnews: text understanding and extraction (6) Agents and the Semantic Web (7) Spire: Semantic Web for data discovery and integration Security and trust (8) Semantic policy languages (9) Semdis: Discovering Semantic Links (10) Securing ad hoc networks (11) Privacy for passive RFID tags Information extraction and retrieval (12) Recognizing spam weblogs (13) Extracting opinions from weblogs (14) Modeling the Spread of Influence on the Blogosphere 5/1/2019

http://ebiquity.umbc.edu/ 5/1/2019

http://ebiquity.umbc.edu/ 5/1/2019