2010
DOI: 10.1007/s11042-010-0570-7
|View full text |Cite
|
Sign up to set email alerts
|

Geotag propagation in social networks based on user trust model

Abstract: In the past few years sharing photos within social networks has become very popular. In order to make these huge collections easier to explore, images are usually tagged with representative keywords such as persons, events, objects, and locations. In order to speed up the time consuming tag annotation process, tags can be propagated based on the similarity between image content and context. In this paper, we present a system for efficient geotag propagation based on a combination of object duplicate detection … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
40
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 22 publications
(41 citation statements)
references
References 20 publications
(22 reference statements)
0
40
0
Order By: Relevance
“…In centralized trust systems, users' trust models are maintained by one central authority, i.e., manager, while in distributed trust systems each user maintains his/her own trust manager based on the previous interactions with other users. Distributed trust models are mainly used in P2P networks [15], while social networks usually use centralized systems (e.g., [18], [27], [24], and [30]). …”
Section: User Trust Modelingmentioning
confidence: 99%
See 3 more Smart Citations
“…In centralized trust systems, users' trust models are maintained by one central authority, i.e., manager, while in distributed trust systems each user maintains his/her own trust manager based on the previous interactions with other users. Distributed trust models are mainly used in P2P networks [15], while social networks usually use centralized systems (e.g., [18], [27], [24], and [30]). …”
Section: User Trust Modelingmentioning
confidence: 99%
“…The DomFp feature (likelihood that a content is spam based on its structure) also appeared important but may not be available since it relies on an infrastructure to enable access to the content, and therefore its feasibility depends on the circumstances of a particular social tagging system. Recently, Ivanov et al [24] explored features extracted from the knowledge accumulated in photo sharing social networks such as Panoramio [44]. They proposed an approach to model the user trust by making use of the feedback from other users who agree or disagree with a tag associated with an image.…”
Section: Most Of User Trust Modeling Techniques Use Machine Learning mentioning
confidence: 99%
See 2 more Smart Citations
“…For example, tag recommendation approaches suggest appropriate tags to resources (e.g., videos) in order to make it easy for users to search and access information in social systems [11]. In order to speed up the time-consuming manual tagging process, tags can be automatically assigned to images by making use of tag propagation techniques based on the similarity between image content (e.g., famous landmarks) and its context (e.g., associated geotags) [7]. Since user-contributed tags are known to be uncontrolled, ambiguous and personalized, one of the fundamental issues in tagging is how to reliably determine the relevance of a tag with respect to the content it is describing [1].…”
Section: Introductionmentioning
confidence: 99%