Veracity assessment of online data

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Process Mining Online Assessment Data

Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated through the use of different information systems. The results of data mining can be used for getting a better understanding of the underlying educational processes, for generating recommendations and advice to students, for...

متن کامل

assessment of the efficiency of s.p.g.c refineries using network dea

data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...

Towards Data Quality Assessment in Online Advertising

In online advertising, our aim is to match the advertisers with the most relevant users to optimize the campaign performance. In the pursuit of achieving this goal, multiple data sources provided by the advertisers or third-party data providers are utilized to choose the set of users according to the advertisers’ targeting criteria. In this paper, we present a framework that can be applied to a...

متن کامل

An Assessment of Online Reviews of Hand Surgeons

 Background: The purpose of this study is to evaluate the number of reviews and scores for active members of the American Society for Surgery of the Hand (ASSH) in popular physician rating websites (Healthgrades.com and Vitals.com). Methods: A total of 433 ASSH active members were searched in two popular rating websites for a total of 866 web searches. Demographic data, overall and subcategory ...

متن کامل

Veracity, Plausibility, and Reputation

The canonical IT security properties are geared towards infrastructure security. The task of an infrastructure security service is completed once data has been delivered to the application. When false data is submitted to the infrastructure, false data will be delivered securely. To secure an application, one thus may have to go beyond securing the infrastructure and in addition provide mechani...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Decision Support Systems

سال: 2020

ISSN: 0167-9236

DOI: 10.1016/j.dss.2019.113132