Advertisement

Factoid Mining Based Content Trust Model for Information Retrieval

  • Wei Wang
  • Guosun Zeng
  • Mingjun Sun
  • Huanan Gu
  • Quan Zhang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4819)

Abstract

Trust is an integral component in many kinds of human interactions and the need for trust spans all aspects of computer science. While most prior work focuses on entity-centered issues such as authentication and reputation, it does not model the information itself, which can be also regarded as quality of information. This paper discusses content trust as a factoid ranking problem. Factoid here refers to something which can reflect the truth of the content, such as the definition of one thing. We extracts factoid from documents’ content and then rank them according to their likehood as a trustworthy ones. Learning methods for performing factoid ranking are proposed in this paper. Trust features for judging the trustworthiness of a factoid is given, and features for constructing the Ranking SVM models are defined. Experimental results indicate the usefulness of this approach.

Keywords

Content trust factoid information quality ranking SVM text mining 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Resnick, P., Zeckhauser, R., Friedman, R., et al.: Reputation systems. Communications of the ACM 43(12), 45–48 (2000)CrossRefGoogle Scholar
  2. 2.
    Golbeck J., Hendler J.: Inferring reputation on the semantic web. In Proceedings of the 13th International World Wide Web Conference (2004) Google Scholar
  3. 3.
    Wang, W., Zeng, G.S., Yuan, L.L.: A Semantic Reputation Mechanism in P2P Semantic Web. In: Mizoguchi, R., Shi, Z., Giunchiglia, F. (eds.) ASWC 2006. LNCS, vol. 4185, pp. 682–688. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    Gil, Y., Artz, D.: Towards content trust of web resources. In: Proceedings of the 15th International World Wide Web Conference (2006)Google Scholar
  5. 5.
    Miller, S.P., Neuman, B.C., et al.: Kerberos authentication and authorization system. Tech. rep., MIT (1987) Google Scholar
  6. 6.
    Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine. In: Proceedings of the 7th International World Wide Web Conference (1998)Google Scholar
  7. 7.
    Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. Journal of the ACM 46(5), 604–632 (1999)zbMATHCrossRefMathSciNetGoogle Scholar
  8. 8.
    Wang, W., Zeng, G.S., Yuan, L.L.: A Reputation Multi-Agent System in Semantic Web. In: Shi, Z.-Z., Sadananda, R. (eds.) PRIMA 2006. LNCS (LNAI), vol. 4088, pp. 211–219. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  9. 9.
    Xu, J., Cao, Y.B., Li, H., et al.: Ranking Definitions with Supervised Learning Methods. In: Proceedings of the 14th International World Wide Web Conference (2005)Google Scholar
  10. 10.
    Herbrich, R., Graepel, T., Obermayer, K.: Large Margin Rank Boundaries for Ordinal Regression. Advances in Large Margin Classifiers, 115–132 (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Wei Wang
    • 1
  • Guosun Zeng
    • 1
  • Mingjun Sun
    • 1
  • Huanan Gu
    • 1
  • Quan Zhang
    • 1
  1. 1.Department of Computer Science and Technology, Tongji University, Shanghai 201804, China, Tongji Branch, National Engineering & Technology Center of High Performance Computer, Shanghai 201804China

Personalised recommendations