نتایج جستجو برای: vandalism
تعداد نتایج: 520 فیلتر نتایج به سال:
In this paper, we analyze a novel set of features for the task of automatic edit category classification. Edit category classification assigns categories such as spelling error correction, paraphrase or vandalism to edits in a document. Our features are based on differences between two versions of a document including meta data, textual and language properties and markup. In a supervised machin...
The authors estimate the relationship between trees and three crime aggre gates (all crime, violent crime, and property crime) and two individual crimes (burglary and vandalism) in Portland, Oregon. During the study period (20052007), 431 crimes were reported at the 2,813 singlefamily homes in our sample. In general, the authors find that trees in the public right of way are associated with ...
We have been using BG-Sentinel (BGS) traps to monitor populations of Aedes albopictus as part of an area-wide project for management of this species. Although BGS traps are very effective for collecting adult Ae. albopictus, the device is expensive and must be properly maintained to be effective. The trap also poses a challenge for mosquito control personnel because secure locations free from t...
This paper documents a study of the real-time Wikipedia edit stream containing over 6 million edits on 1.5 million English Wikipedia articles, during 2015. We focus on answering questions related to identification and use of information cascades between Wikipedia articles, based on author editing activity. Our findings show that by constructing information cascades between Wikipedia articles us...
Scientists have been long investigating procedures, models and tools for the risk analysis in several domains, from economics to computer networks. This paper presents a quantitative method and a tool for the security risk assessment and management specifically tailored to the context of railway transportation systems, which are exposed to threats ranging from vandalism to terrorism. The method...
Many online applications, such as online social networks or knowledge bases, are often attacked bymalicious users who commit different types of actions such as vandalism on Wikipedia or fraudulent reviews on eBay. Currently, most of the fraud detection approaches require a training dataset that contains records of both benign and malicious users. However, in practice, there are often no or very...
This paper presents a genetic algorithm based approach for reducing the set of attributes for detecting vandalism in Wikipedia. Our experimental results show that the proposed approach is able to reduce the set of attribute in 83% with no significant impact in detection effectiveness. Moreover, our approach is able to select a number of attributes that leads to better results if compared to a s...
Armed conflicts frequently result in the damage or destruction of archaeological heritage. The occupation by ISIS parts Iraq and Syria is no exception. Here, authors present results work focused on Nineveh, as part a wider research initiative to monitor inflicted at sites northern Iraq. Combining satellite imagery, low-level aerial photography ground-based reconnaissance, project presents condi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید