How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort)

  • Jonathan Anderson
  • Frank Stajano
  • Robert N. M. Watson
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7114)


Reviewing conference submissions is both labour-intensive and diffuse. A lack of focus leads to reviewers spending much of their scarce time on papers which will not be accepted, which can prevent them from identifying several classes of problems with papers that will be. We identify opportunities for automation in the review process and propose protocols which allow human reviewers to better focus their limited time and attention, making it easier to select only the best “genetic” material to incorporate into their conference’s “DNA.” Some of the protocols that we propose are difficult to “game” without uneconomic investment on the part of the attacker, and successfully attacking others requires attackers to provide a positive social benefit to the wider research community.


Program Committee Threat Model Signalling Protocol Bibliographic Coupling Mechanical Assistance 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Geer, D.J.: Monopoly considered harmful. IEEE Security & Privacy 1(6), 14–17 (2003)CrossRefGoogle Scholar
  2. 2.
    Kessler, M.: An experimental study of bibliographic coupling between technical papers. IEEE Transactions on Information Theory 9(1), 49–51 (1963)CrossRefGoogle Scholar
  3. 3.
    Pearson, K.: On lines and planes of closest fit to systems of space. Philosophical Magazine 2(11), 559–572 (1901)CrossRefzbMATHGoogle Scholar
  4. 4.
    Simkin, M.V., Roychowdhury, V.P.: A Mathematical Theory of Citing. Journal of the American Society for Information Science and Technology 58(11) (2007)Google Scholar
  5. 5.
    Stamp, M.: Risks of monoculture. Communications of the ACM 47(3) ( March 2004)Google Scholar
  6. 6.
    Tang, J., Zhang, D., Yao, L.: Social Network Extraction of Academic Researchers. In: Seventh IEEE International Conference on Data Mining (ICDM), pp. 292–301 (2007)Google Scholar
  7. 7.
    Tang, J., Zhang, J., Yao, L., Li, J., Zhang, L., Su, Z.: ArnetMiner: extraction and mining of academic social networks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD). ACM (August 2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Jonathan Anderson
    • 1
  • Frank Stajano
    • 1
  • Robert N. M. Watson
    • 1
  1. 1.Computer LaboratoryUniversity of CambridgeCambridgeUK

Personalised recommendations