References

References

[1] Surowiecki J. The wisdom of crowds. Random House LLC; 2005.

[2] Sunstein CR. Infotopia: How many minds produce knowledge. Oxford University Press; 2006.

[3] Rajkumar RR, Lee I, Sha L, Stankovic J. Cyber-physical systems: the next computing revolution. In: Proceedings of the 47th Design Automation Conference; ACM; 2010:731–736.

[4] Sha L, Gopalakrishnan S, Liu X, Wang Q. Cyber-physical systems: A new frontier. In: Machine Learning in Cyber Trust. Springer; 2009:3–13.

[5] Lee EA. Cyber physical systems: Design challenges. In: Object Oriented Real-Time Distributed Computing (ISORC), 2008 11th IEEE International Symposium on; IEEE; 2008:363–369.

[6] Lane ND, Eisenman SB, Musolesi M, Miluzzo E, Campbell AT. Urban sensing systems: Opportunistic or participatory. In: Proc. ACM 9th Workshop on Mobile Computing Systems and Applications (HOTMOBILE ’08); 2008.

[7] Bar-Shalom Y, Li XR. Multisensor, Multitarget Tracking: Principles and Techniques. Storrs, CT: YBS Publishing; 1995.

[8] Chen H, Kirubarajan T, Bar-Shalom Y. Performance limits of track-to-track fusion versus centralized estimation: Theory and application. IEEE Transactions on Aerospace and Electronic Systems. Apr. 2003;39(2):386–400.

[9] Chong C-Y, Mori S, Chang K-C. Distributed multitarget multisensor tracking. In: Bar-Shalom Y, ed. Multitarget Multisensor Tracking: Advanced Applications. Norwood, MA: Artech House; 1990:247–295.

[10] Chong C-Y, Mori S, Barker WH, Chang K-C. Architectures and algorithms for track association and fusion. IEEE Aerospace and Electronic Systems Magazine. Jan. 2000;15(1):5–13.

[11] Rao BS, Durrant-Whyte HF. Fully decentralized algorithm for multisensor Kalman filtering. IEE Proceedings-D. 1991;138(5):413–420.

[12] Bar-Shalom Y, Chen H. Multisensor track-to-track association for tracks with dependent errors. In: Proc. of the 43rd IEEE Conf. on Decision and Control, Paradise Island, Bahamas; Dec. 2004.

[13] Kaplan LM, Bar-Shalom Y, Blair WD. Assignment costs for multiple sensor track-to-track association. IEEE Transactions on Aerospace and Electronic Systems. Apr. 2008;44(2):655–677.

[14] Shafer G. A Mathematical Theory of Evidence. Princeton University Press; 1976.

[15] Yager RR, Kacprzyk J, Fedrizzi M, eds. Advances in the Dempster-Shafer Theory of Evidence. New York: John Wiley & Sons, Inc; 1994.

[16] Smarandache F, Dezert J, eds. Advances and Applications of DSmT for Information Fusion: Collected Works. Infinite Study; 2004.

[17] Jøsang A, Marsh S, Pope S. Exploring different types of trust propagation. In: Proc. of the 4th International Conference on Trust Management (iTrust), Pisa, Italy; May 2006.

[18] Jøsang A, Ismail R, Boyd C. A survey of trust and reputation systems for online service provision. Decision Support Systems. Mar. 2007;vol. 43(no. 2):618–644 [Online]. Available: http://dx.doi.org/10.1016/j.dss.2005.05.019.

[19] Artz D, Gil Y. A survey of trust in computer science and the semantic web. Web Semantics: Science, Services and Agents on the World Wide Web. 2007;5(2):58–71.

[20] Wang Y, Vassileva J. A review on trust and reputation for web service selection. In: Distributed Computing Systems Workshops, 2007. ICDCSW’07. 27th International Conference on; IEEE; 2007:25 25.

[21] Cabral L, Hortacsu A. The dynamics of seller reputation: Evidence from eBay. The Journal of Industrial Economics. 2010;58(1):54–78.

[22] Huynh TD, Jennings NR, Shadbolt NR. An integrated trust and reputation model for open multi-agent systems. Autonomous Agents and Multi-Agent Systems. Sep. 2006;vol. 13(no. 2):119–154 [Online]. Available: http://dx.doi.org/10.1007/s10458-005-6825-4.

[23] Huynh TD. Trust and reputation in open multi-agent systems. Ph.D. dissertation: University of Southampton; 2006.

[24] Aberer K, Despotovic Z. Managing trust in a peer-2-peer information system. In: CIKM ’01: Proceedings of the tenth international conference on Information and knowledge management; New York, NY, USA: ACM; 2001 [Online]. Available: http://dx.doi.org/10.1145/502585.502638 pp. 310–317.

[25] Houser D, Wooders J. Reputation in auctions: Theory, and evidence from eBay. Journal of Economics & Management Strategy. 2006;vol. 15(no. 2):353–369 [Online]. Available: http://dx.doi.org/10.1111/j.1530-9134.2006.00103.x.

[26] Zheng W, Jin L. Online reputation systems in web 2.0 era. In: Value Creation in E-Business Management. Springer; 2009:296–306.

[27] Farmer R, Glass B. Building web reputation systems. O’Reilly Media, Inc; 2010.

[28] Yu B, Singh MP. Detecting deception in reputation management. In: Proceedings of the second international joint conference on Autonomous agents and multiagent systems; ACM; 2003:73–80.

[29] Teacy WT, Patel J, Jennings NR, Luck M. TRAVOS: Trust and reputation in the context of inaccurate information sources. Autonomous Agents and Multi-Agent Systems. Mar. 2006;vol. 12(no. 2):183–198 [Online]. Available: http://dx.doi.org/10.1007/s10458-006-5952-x.

[30] Xiong L, Liu L. Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering. 2004;16(7):843–857.

[31] Pinyol I, Sabater-Mir J. Computational trust and reputation models for open multi-agent systems: a review. Artificial Intelligence Review. 2013;40(1):1–25.

[32] Sensoy M, de Mel G, Kaplan L, Pham T, Norman TJ. Tribe: Trust revision for information based on evidence. In: Information Fusion (FUSION), 2013 16th International Conference on; IEEE; 2013:914–921.

[33] Kaplan L, Scensoy M, de Mel G. Trust estimation and fusion of uncertain information by exploiting consistency. In: Information Fusion (FUSION), 2014 17th International Conference on; IEEE; 2014:1–8.

[34] Brin S, Page L. The anatomy of a large-scale hypertextual web search engine. In: 7th international conference on World Wide Web (WWW’07); 1998:107–117. [Online]. Available: http://portal.acm.org/citation.cfm?id=297805.297827.

[35] Kleinberg JM. Authoritative sources in a hyperlinked environment. Journal of the ACM. 1999;46(5):604–632.

[36] Yin X, Han J, Yu PS. Truth discovery with multiple conflicting information providers on the web. IEEE Trans. on Knowl. and Data Eng. June 2008;vol. 20:796–808 [Online]. Available: http://portal.acm.org/citation.cfm?id=1399100.1399392.

[37] Pasternack J, Roth D. Knowing what to believe (when you already know something). In: International Conference on Computational Linguistics (COLING); 2010.

[38] Galland A, Abiteboul S, Marian A, Senellart P. Corroborating information from disagreeing views. In: WSDM. 2010:131–140.

[39] Wang D, Abdelzaher T, Ahmadi H, Pasternack J, Roth D, Gupta M, Han J, Fatemieh O, Le H. On Bayesian interpretation of fact-finding in information networks. In: 14th International Conference on Information Fusion (Fusion 2011); 2011.

[40] Berti-Equille L, Sarma AD, Dong X, Marian A, Srivastava D. Sailing the information ocean with awareness of currents: Discovery and application of source dependence. In: CIDR’09; 2009.

[41] Dong X, Berti-Equille L, Srivastava D. Truth discovery and copying detection in a dynamic world. VLDB. 2009. ;vol. 2(no. 1):562–573. [Online]. Available: http://portal.acm.org/citation.cfm?id=1687627.1687691.

[42] Dong X, Berti-Equille L, Hu Y, Srivastava D. Global detection of complex copying relationships between sources. PVLDB. 2010;3(1):1358–1369.

[43] Qi G-J, Aggarwal CC, Han J, Huang T. Mining collective intelligence in diverse groups. In: Proceedings of the 22nd international conference on World Wide Web; International World Wide Web Conferences Steering Committee; 2013:1041–1052.

[44] Pasternack J, Roth D. Making better informed trust decisions with generalized fact-finding. In: Proceedings of the Twenty-Second international joint conference on Artificial Intelligence - Volume Three, ser. IJCAI’11; AAAI Press; 2011:2324–2329. [Online]. Available: http://dx.doi.org/10.5591/978-1-57735-516-8/IJCAI11-387.

[45] Pasternack J, Roth D. Generalized fact-finding. In: Proceedings of the 20th international conference companion on World wide web; ACM; 2011:99–100.

[46] Zhao B, Rubinstein BIP, Gemmell J, Han J. A Bayesian approach to discovering truth from conflicting sources for data integration. Proc. VLDB Endow. Feb. 2012. ;vol. 5(no. 6):550–561. [Online]. Available: http://dl.acm.org/citation.cfm?id=2168651.2168656.

[47] Pasternack J, Roth D. Latent credibility analysis. In: Proceedings of the 22nd international conference on World Wide Web; International World Wide Web Conferences Steering Committee; 2013:1009–1020.

[48] Yu D, Huang H, Cassidy T, Ji H, Wang C, Zhi S, Han J, Voss C, Magdon-Ismail M. The wisdom of minority: Unsupervised slot filling validation based on multi-dimensional truth-finding. In: The 25th International Conference on Computational Linguistics (COLING); 2014.

[49] Gupta M, Han J. Heterogeneous network-based trust analysis: a survey. ACM SIGKDD Explorations Newsletter. 2011;13(1):54–71.

[50] Wang D. On quantifying the quality of information in social sensing. Ph.D. dissertation University of Illinois at Urbana-Champaign; 2013.

[51] Aggarwal C, Abdelzaher T. Social sensing. Managing and Mining Sensor Data. Kluwer Academic Publishers; 2013.

[52] Abdelzaher TF, Anokwa Y, Boda P, Burke J, Estrin D, Guibas LJ, Kansal A, Madden S, Reich J. Mobiscopes for human spaces. IEEE Pervasive Computing. 2007;6(2):20–29.

[53] Yan T, Kumar V, Ganesan D. Crowdsearch: Exploiting crowds for accurate real-time image search on mobile phones. In: 8th Annual International Conference on Mobile Systems, Applications and Services (MobiSys 2010); 2010.

[54] Hull B, Bychkovsky V, Zhang Y, Chen K, Goraczko M, Miu A, Shih E, Balakrishnan H, Madden S. Cartel: a distributed mobile sensor computing system. In: Proceedings of the 4th international conference on Embedded networked sensor systems, ser. SenSys ’06; New York, NY, USA: ACM; 2006:125–138 [Online]. Available: http://doi.acm.org/10.1145/1182807.1182821.

[55] Eisenman SB, Miluzzo E, Lane ND, Peterson RA, Ahn G-S, Campbell AT. The bikenet mobile sensing system for cyclist experience mapping. In: Proceedings of the 5th international conference on Embedded networked sensor systems, ser. SenSys ’07; New York, NY, USA: ACM; 2007:87–101 [Online]. Available: http://doi.acm.org/10.1145/1322263.1322273.

[56] Huang J-H, Amjad S, Mishra S. CenWits: a sensor-based loosely coupled search and rescue system using witnesse. In: SenSys’05; 2005:180–191.

[57] Abdelzaher T, Anokwa Y, Boda P, Burke J, Estrin D, Guibas L, Kansal A, Madden S, Reich J. Mobiscopes for human spaces. IEEE Pervasive Computing. 2007;6(2):20–29.

[58] Sense Networks, “Cab Sense”, http://www.cabsense.com.

[59] Thiagarajan A, Biagioni J, Gerlich T, Eriksson J. Cooperative transit tracking using smart-phones. In: SenSys’10; 2010:85–98.

[60] Longstaff B, Reddy S, Estrin D. Improving activity classification for health applications on mobile devices using active and semi-supervised learning. In: Pervasive Computing Technologies for Healthcare (PervasiveHealth), 2010 4th International Conference on-NO PERMISSIONS; IEEE; 2010:1–7.

[61] Helal A, Cook DJ, Schmalz M. Smart home-based health platform for behavioral monitoring and alteration of diabetes patients. Journal of diabetes science and technology. Jan. 2009;vol. 3(no. 1):141–148. [Online]. Available: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2769843/.

[62] Madan A, Cebrian M, Lazer D, Pentland A. Social sensing for epidemiological behavior change. In: Proceedings of the 12th ACM international conference on Ubiquitous computing, ser. Ubicomp ’10; New York, NY, USA: ACM; 2010:291–300 [Online]. Available: http://doi.acm.org/10.1145/1864349.1864394.

[63] Madan A, Moturu ST, Lazer D, Pentland AS. Social sensing: obesity, unhealthy eating and exercise in face-to-face networks. In: Wireless Health 2010. ACM; 2010:104–110.

[64] Cook DJ, Holder LB. Sensor selection to support practical use of health-monitoring smart environments. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery. 2011;vol. 1(no. 4):339–351 [Online]. Available: http://dx.doi.org/10.1002/widm.20.

[65] Ganti RK, Srinivasan S, Gacic A. Multisensor fusion in smartphones for lifestyle monitoring. In: Proceedings of the 2010 International Conference on Body Sensor Networks, ser. BSN ’10; Washington, DC, USA: IEEE Computer Society; 2010:36–43 [Online]. Available: http://dx.doi.org/10.1109/BSN.2010.10.

[66] Ahmadi H, Pham N, Ganti R, Abdelzaher T, Nath S, Han J. Privacy-aware regression modeling of participatory sensing data. In: Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems, ser. SenSys ’10; New York, NY, USA: ACM; 2010:99–112 [Online]. Available: http://doi.acm.org/10.1145/1869983.1869994.

[67] Pham N, Ganti RK, Uddin YS, Nath S, Abdelzaher T. Privacy-preserving reconstruction of multidimensional data maps in vehicular participatory sensing. In: Proceedings of the 7th European conference on Wireless Sensor Networks, ser. EWSN’10; Berlin, Heidelberg: Springer-Verlag; 2010:114–130.

[68] Nath S. Ace: Exploiting correlation for energy-efficient and continuous context sensing. In: Proceedings of the tenth international conference on Mobile systems, applications, and services (MobiSys’12); 2012.

[69] Park T, Lee J, Hwang I, Yoo C, Nachman L, Song J. E-gesture: a collaborative architecture for energy-efficient gesture recognition with hand-worn sensor and mobile devices. In: Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems, ser. SenSys ’11; New York, NY, USA: ACM; 2011:260–273 [Online]. Available: http://doi.acm.org/10.1145/2070942.2070969.

[70] Ahmadi H, Abdelzaher T, Han J, Pham N, Ganti R. The sparse regression cube: A reliable modeling technique for open cyber-physical systems. In: Proc. 2nd International Conference on Cyber-Physical Systems (ICCPS’11); 2011.

[71] Wang D, Ahmadi H, Abdelzaher T, Chenji H, Stoleru R, Aggarwal C. Optimizing quality-of-information in cost-sensitive sensor data fusion. In: IEEE 7th International Conference on Distributed Computing in Sensor Systems (DCoSS 11); June 2011.

[72] Reddy S, Shilton K, Denisov G, Cenizal C, Estrin D, Srivastava M. Biketastic: sensing and mapping for better biking. In: Proceedings of the 28th international conference on Human factors in computing systems, ser. CHI ’10; New York, NY, USA: ACM; 2010:1817–1820 [Online]. Available: http://doi.acm.org/10.1145/1753326.1753598.

[73] Mun M, Reddy S, Shilton K, Yau N, Burke J, Estrin D, Hansen M, Howard E, West R, Boda P. Peir, the personal environmental impact report, as a platform for participatory sensing systems research. In: Proceedings of the 7th international conference on Mobile systems, applications, and services, ser. MobiSys ’09; New York, NY, USA: ACM; 2009:55–68 [Online]. Available: http://doi.acm.org/10.1145/1555816.1555823.

[74] Reddy S, Estrin D, Srivastava M. Recruitment framework for participatory sensing data collections. In: Proceedings of the 8th International Conference on Pervasive Computing; Berlin Heidelberg: Springer; May 2010:138–155.

[75] Delre SA, Jager W, Janssen MA. Diffusion dynamics in small-world networks with heterogeneous consumers. Comput. Math. Organ. Theory. June 2007;vol. 13:185–202. [Online]. Available: http://portal.acm.org/citation.cfm?id=1210317.1210335.

[76] Hui C, Goldberg MK, Magdon-Ismail M, Wallace WA. Simulating the diffusion of information: An agent-based modeling approach. IJATS. 2010;31–46.

[77] Xie J, Sreenivasan S, Korniss G, Zhang W, Lim C, Szymanski BK. Social consensus through the influence of committed minorities. CoRR. 2011 vol. abs/1102.3931.

[78] Gilbert P, Cox LP, Jung J, Wetherall D. Toward trustworthy mobile sensing. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications; New York, NY, USA: ACM; 2010:31–36. ser. HotMobile ’10.

[79] Gilbert P, Jung J, Lee K, Qin H, Sharkey D, Sheth A, Cox LP. Youprove: authenticity and fidelity in mobile sensing. In: Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems; New York, NY, USA: ACM; 2011:176–189. ser. SenSys ’11. [Online]. Available: http://doi.acm.org/10.1145/2070942.2070961.

[80] Han J. Mining heterogeneous information networks by exploring the power of links. In: Discovery Science. Springer; 2009:13–30.

[81] Sun Y, Han J. Mining heterogeneous information networks: Principles and methodologies. Synthesis Lectures on Data Mining and Knowledge Discovery. 2012;3(2):1–159.

[82] Brin S, Page L. The anatomy of a large-scale hypertextual web search engine. Computer Networks and ISDN Systems. 1998;30(1–7):107–117.

[83] Fortunato S. Community detection in graphs. Physics Reports. 2010;486(3):75–174.

[84] Liben-Nowell D, Kleinberg J. The link-prediction problem for social networks. Journal of the American society for information science and technology. 2007;58(7):1019–1031.

[85] Tang J, Sun J, Wang C, Yang Z. Social influence analysis in large-scale networks. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining; ACM; 2009:807–816.

[86] Sun Y, Han J, Zhao P, Yin Z, Cheng H, Wu T. RankClus: integrating clustering with ranking for heterogeneous information network analysis. In: Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology; ACM; 2009:565–576.

[87] Sun Y, Han J, Aggarwal CC, Chawla NV. When will it happen? Relationship prediction in heterogeneous information networks. In: Proceedings of the fifth ACM international conference on Web search and data mining; ACM; 2012:663–672.

[88] Sun Y, Tang J, Han J, Gupta M, Zhao B. Community evolution detection in dynamic heterogeneous information networks. In: Proceedings of the Eighth Workshop on Mining and Learning with Graphs; ACM; 2010:137–146.

[89] Lynch SM. Basics of Bayesian statistics. In: Introduction to Applied Bayesian Statistics and Estimation for Social Scientists. Springer; 2007:47–75.

[90] Little RJA, Rubin DB. Statistical Analysis with Missing Data. New York, NY, USA: John Wiley & Sons, Inc; 1986.

[91] Titterington DM. Recursive parameter estimation using incomplete data. Journal of the Royal Statistical Society. Series B (Methodological). 1984;vol. 46(no. 2):257–267. [Online]. Available: http://www.jstor.org/stable/2345509.

[92] Papoulis A, Pillai SU. Probability, random variables, and stochastic processes. Tata McGraw-Hill Education; 2002.

[93] Dempster AP, Laird NM, Rubin DB. Maximum likelihood from incomplete data via the EM algorithm. Journal of The Royal Statistical Society, Series B. 1977;39(1):1–38.

[94] Moon TK, Stirling WC. Mathematical methods and algorithms for signal processing. Prentice hall New York. 2000;1.

[95] Cox DR, Hinkley DV. Theoretical statistics. CRC Press; 1979.

[96] Rao CR. Information and the accuracy attainable in the estimation of statistical parameters. Bulletin of the Calcutta Mathematical Society; 1945.

[97] Dong XL, Berti-Equille L, Hu Y, Srivastava D. SOLOMON: Seeking the truth via copying detection. Proceedings of the VLDB Endowment. 2010;3(1–2):1617–1620.

[98] Sikdar S, Kang B, ODonovan J, Hollerer T, Adah S. Understanding information credibility on twitter. In: Social Computing (SocialCom), 2013 International Conference on; IEEE; 2013:19–24.

[99] Sikdar S, Adah S, Amin T, Abdelzaher T, Chan K, Cho J-H, Kang B, ODonovan J. Finding true and credible information on twitter. In: 17th International Conference on Information Fusion (Fusion 2014); 2014.

[100] Wang D, Kaplan L, Le H, Abdelzaher T. On truth discovery in social sensing: A maximum likelihood estimation approach. In: The 11th ACM/IEEE Conference on Information Processing in Sensor Networks (IPSN 12); April 2012.

[101] Wang D, Kaplan L, Abdelzaher T. Maximum likelihood analysis of conflicting observations in social sensing. ACM Transactions on Sensor Networks (ToSN). January, 2014;Vol. 10(No. 2) Article 30.

[102] Wang D, Abdelzaher T, Kaplan L, Aggarwal CC. On quantifying the accuracy of maximum likelihood estimation of participant reliability in social sensing. In: DMSN11: 8th International Workshop on Data Management for Sensor Networks; August 2011.

[103] Wang D, Kaplan L, Abdelzaher T, Aggarwal CC. On scalability and robustness limitations of real and asymptotic confidence bounds in social sensing. In: The 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 12); June 2012.

[104] Wang D, Kaplan L, Abdelzaher T, Aggarwal CC. On credibility estimation tradeoffs in assured social sensing. IEEE Journal on Selected Areas in Communications. 2013;31(6):1026–1037.

[105] Wang D, Amin T, Li S, Abdelzaher T, Kaplan L, Gu S, Pan C, Liu H, Aggrawal C, Ganti R, Wang X, Mohapatra P, Szymanski B, Le H. Humans as sensors: An estimation theoretic perspective. In: The 13th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 14); April 2014.

[106] Wang D, Abdelzaher T, Kaplan L, Ganti R, Hu S, Liu H. Exploitation of physical constraints for reliable social sensing. In: The IEEE 34th Real-Time Systems Symposium (RTSS’13); 2013.

[107] Wang D, Abdelzaher T, Kaplan L, Aggarwal CC. Recursive fact-finding: A streaming approach to truth estimation in crowdsourcing applications. In: The 33rd International Conference on Distributed Computing Systems (ICDCS’13); July 2013.

[108] Wu CFJ. On the convergence properties of the EM algorithm. The Annals of Statistics. 1983;vol. 11(no. 1):95–103 [Online]. Available: http://dx.doi.org/10.2307/2240463.

[109] Cramer H. Mathematical Methods of Statistics. Princeton Univ. Press; 1946.

[110] Pang-Ning T, Steinbach M, Kumar V, et al. Introduction to data mining. In: Library of Congress; 2006.

[111] Hogg RV, Craig AT. Introduction to mathematical statistics. Prentice Hall; 1995.

[112] Casella G, Berger R. Statistical Inference. Duxbury Press; 2002.

[113] Ganti RK, Pham N, Ahmadi H, Nangia S, Abdelzaher TF. GreenGPS: a participatory sensing fuel-efficient maps application. In: MobiSys ’10: Proceedings of the 8th international conference on Mobile systems, applications, and services. New York, NY, USA: ACM; 2010:151–164.

[114] Hu S, Liu H, Su L, Wang H, Abdelzaher T. SmartRoad: A Mobile Phone Based Crowd-Sourced Road Sensing System. University of Illinois at Urbana-Champaign, Tech. Rep. 2013;08. https://www.ideals.illinois.edu/handle/2142/45699.

[115] Kalman RE. A New Approach to Linear Filtering and Prediction Problems. Transactions of the ASME Journal of Basic Engineering. 1960;82(Series D):35–45. [Online]. Available: http://www.cs.unc.edu/~welch/kalman/media/pdf/Kalman1960.pdf.

[116] Doucet A, De Freitas N, Gordon N, eds. Sequential Monte Carlo methods in practice. Springer; 2001. [Online]. Available: http://www.worldcatlibraries.org/wcpa/top3mset/839aaf32b6957a10a19afeb4da09e526.html.

[117] Netrapalli P, Sanghavi S. Learning the graph of epidemic cascades. In: Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems; New York, NY, USA: ACM; 2012:211–222. ser. SIGMETRICS ’12. [Online]. Available: http://doi.acm.org/10.1145/2254756.2254783.

[118] Galuba W, Aberer K, Chakraborty D, Despotovic Z, Kellerer W. Outtweeting the twitterers-predicting information cascades in microblogs. In: Proceedings of the 3rd conference on Online social networks; USENIX Association; 2010:3 3.

[119] Sun E, Rosenn I, Marlow C, Lento TM. Gesundheit! Modeling contagion through facebook news feed. In: ICWSM; 2009.

[120] Cha M, Mislove A, Adams B, Gummadi KP. Characterizing social cascades in Flickr. In: Proceedings of the first workshop on Online social networks; ACM; 2008:13–18.

[121] Szabo G, Huberman BA. Predicting the popularity of online content. Communications of the ACM. 2010;53(8):80–88.

[122] Susarla A, Oh J-H, Tan Y. Social networks and the diffusion of user-generated content: Evidence from YouTube. Information Systems Research. 2012;23(1):23–41.

[123] Hui C, Tyshchuk Y, Wallace WA, Magdon-Ismail M, Goldberg M. Information cascades in social media in response to a crisis: a preliminary model and a case study. In: Proceedings of the 21st international conference companion on World Wide Web; ACM; 2012:653–656.

[124] Le H, Wang D, Ahmadi H, Uddin MYS, Ko YH, Abdelzaher T, Fatemieh O, Pasternack J, Roth D, Han J, Wang H, Kaplan L, Szymanski B, Adali S, Aggarwal C, Ganti R. Apollo: A data distillation service for social sensing. University of Illinois Urbana-Champaign; 2012 Tech. Rep.

[125] “Apollo:towards fact-finding for human centric sensing”, http://apollo.cse.nd.edu/index.html.

[126] Dawid AP, Skene AM. Maximum likelihood estimation of observer Error-Rates using the EM algorithm. Journal of the Royal Statistical Society. Series C (Applied Statistics). 1979;vol. 28(no. 1):20–28 [Online]. Available: http://dx.doi.org/10.2307/2346806.

[127] Uddin M, Amin M, Le H, Abdelzaher T, Szymanski B, Nguyen T. On diversifying source selection in social sensing. In: 2012 Ninth International Conference on Networked Sensing Systems (INSS); June 2012:1–8.

[128] GasBuddy, http://gasbuddy.com/.

[129] NYC Gas Finder, https://github.com/hirefrank/nycgasfinder.

[130] He W, Liu X, Ren M. Location cheating: A security challenge to location-based social network services. In: 2011 31st International Conference on Distributed Computing Systems (ICDCS); 2011:740–749.

[131] de Valmaseda J. Martın, Ionescu G, Deriaz M. TrustPos model: Trusting in mobile users? location. In: Daniel F, Papadopoulos G, Thiran P, eds. Mobile Web Information Systems. Berlin Heidelberg: Springer; 79–89. ser. Lecture Notes in Computer Science. 2013;vol. 8093.

[132] Ouyang W, Srivastava MB, Toniolo A, Norman TJ. Truth discovery in crowdsourced detection of spatial events. In: In International conference on information and knowledge management (CIKM); ACM; 2014.

[133] Han J. Mining heterogeneous information networks by exploring the power of links. In: Proceedings of the 20th international conference on Algorithmic learning theory; Berlin, Heidelberg: Springer-Verlag; 2009:3. ser. ALT’09.. [Online]. Available: http://portal.acm.org/citation.cfm?id=1813231.1813235 3.

[134] L. Page, S. Brin, R. Motwani, and T. Winograd, “The pagerank citation ranking: Bringing order to the web”. Stanford InfoLab, Technical Report 1999–66, November 1999, previous number = SIDL-WP-1999-0120. [Online]. Available: http://ilpubs.stanford.edu:8090/422/.

[135] Wang S, Wang D, Su L, Abdelzaher T, Kaplan L. Towards cyber-physical systems in social spaces: The data reliability challenge. In: The IEEE 35th Real-Time Systems Symposium (RTSS’14); 2014.

[136] Shental N, Bar-Hillel A, Hertz T, Weinshall D. Computing gaussian mixture models with EM using equivalence constraints. Advances in neural information processing systems. 2004;16(8):465–472.

[137] Samdani R, Chang M-W, Roth D. Unified expectation maximization. In: Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies; Association for Computational Linguistics; 2012:688–698.

[138] Hofmann T. Probabilistic latent semantic indexing. In: Proceedings of the 22Nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval; New York, NY, USA: ACM; 1999:50–57. ser. SIGIR ’99. [Online]. Available: http://doi.acm.org/10.1145/312624.312649.

[139] Masseroli M, Chicco D, Pinoli P. Probabilistic latent semantic analysis for prediction of gene ontology annotations. In: Neural Networks (IJCNN), The 2012 International Joint Conference on; IEEE; 2012:1–8.

[140] Ball B, Karrer B, Newman M. Efficient and principled method for detecting communities in networks. Physical Review E. 2011;vol. 84(no. 3):036103.

[141] S. Bhattacharyya and P. J. Bickel, “Community detection in networks using graph distance”, arXiv, preprint arXiv:1401.3915, 2014.

[142] Bilmes J. A gentle tutorial on the EM algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models. Technical Report, University of Berkeley; 1997 ICSI-TR-97-021.

[143] McLachlan GJ, Krishnan T. The EM algorithm and extensions. John Wiley and Sons, Inc. 1997.

[144] Zhai C. A note on the expectation maximization (EM) algorithm. Department of Computer Science, University of Illinois at Urbana Champaign; 2007.

[145] Wang D, Fattouche M. OFDM transmission for time-based range estimation. Signal Processing Letters, IEEE. 2010;17(6):571–574.

[146] Qian F, Leung S, Zhu Y, Wong W, Pao D, Lau W. Damped sinusoidal signals parameter estimation in frequency domain. Signal Processing. 2012;92(2):381–391.

[147] Wang Z, Luo J-A, Zhang X-P. A novel location-penalized maximum likelihood estimator for bearing-only target localization. Signal Processing, IEEE Transactions on. 2012;60(12):6166–6181.

[148] Bickel P, Choi D, Chang X, Zhang H, et al. Asymptotic normality of maximum likelihood and its variational approximation for stochastic blockmodels. The Annals of Statistics. 2013;41(4):1922–1943.

[149] T. Yan, Y. Zhao, and H. Qin, “Asymptotic normality in the maximum entropy models on graphs with an increasing number of parameters”, arXiv, preprint arXiv:1308.1768, 2013.

[150] Kremer A, Weißbach R. “Asymptotic normality for discretely observed Markov jump processes with an absorbing state”, Statistics &amp. Probability Letters. 2014;90:136–139.

[151] H. D. Nguyen and I. A. Wood, “Asymptotic normality of the maximum pseudolikelihood estimator for fully visible Boltzmann machines”, arXiv, preprint arXiv:1409.8047, 2014.

[152] Hellerstein JM. Quantitative data cleaning for large databases. United Nations Economic Commission for Europe (UNECE); 2008.

[153] Hodge VJ, Austin J. A survey of outlier detection methodologies. Artificial Intelligence Review. 2004;22(no. 2):85–126.

[154] Elmagarmid AK, Ipeirotis PG, Verykios VS. Duplicate record detection: A survey. Knowledge and Data Engineering, IEEE Transactions on. 2007;19(no. 1):1–16.

[155] Köpcke H, Rahm E. Frameworks for entity matching: A comparison. Data & Knowledge Engineering. 2010;69(2):197–210.

[156] Arasu A, Garcia-Molina H. Extracting structured data from web pages. In: Proceedings of the 2003 ACM SIGMOD international conference on Management of data; ACM; 2003:337–348.

[157] Soderland S. Learning information extraction rules for semi-structured and free text. Machine learning. 1999;34(1–3):233–272.

[158] Fisher K, Gruber R. Pads: a domain-specific language for processing ad hoc data. In: ACM; 295–304. ACM Sigplan Notices. 2005;vol. 40 no. 6.

[159] Mandelbaum Y, Fisher K, Walker D, Fernandez M, Gleyzer A. Pads/ml: A functional data description language. In: ACM; 77–83. ACM SIGPLAN Notices. 2007;vol. 42 no. 1.

[160] Haas LM, Hernández MA, Ho H, Popa L, Roth M. Clio grows up: from research prototype to industrial tool. In: Proceedings of the 2005 ACM SIGMOD international conference on Management of data; ACM; 2005:805–810.

[161] Rahm E, Bernstein PA. A survey of approaches to automatic schema matching. the VLDB Journal. 2001;10(4):334–350.

[162] Stonebraker M, Bruckner D, Ilyas IF, Beskales G, Cherniack M, Zdonik SB, Pagan A, Xu S. Data curation at scale: The data tamer system. In: CIDR. 2013.

[163] Huynh DF, Miller RC, Karger DR. Potluck: semi-ontology alignment for casual users. In: The Semantic Web. Springer; 2007:903–910.

[164] Kandel S, Paepcke A, Hellerstein J, Heer J. Wrangler: Interactive visual specification of data transformation scripts. In: PART 5——–Proceedings of the 2011 annual conference on Human factors in computing systems; ACM; 2011:3363–3372.

[165] Lin J, Wong J, Nichols J, Cypher A, Lau TA. End-user programming of mashups with vegemite. In: Proceedings of the 14th international conference on Intelligent user interfaces; ACM; 2009:97–106.

[166] Sheng VS, Provost F, Ipeirotis PG. Get another label? Improving data quality and data mining using multiple, noisy labelers. In: Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining; New York, NY, USA: ACM; 2008:614–622. ser. KDD ’08. [Online]. Available: http://doi.acm.org/10.1145/1401890.1401965.

[167] Dekel O, Shamir O. Vox populi: Collecting high-quality labels from a crowd. In: In Proceedings of the 22nd Annual Conference on Learning Theory; 2009.

[168] Amin MTA, Abdelzaher T, Wang D, Szymanski B. Crowd-sensing with polarized sources. In: Distributed Computing in Sensor Systems (DCOSS), 2014 IEEE International Conference on; IEEE; 2014:67–74.

[169] Gupta M, Zhao P, Han J. Evaluating event credibility on twitter. In: SDM. SIAM; 2012:153–164.

[170] Vydiswaran V, Zhai C, Roth D. Content-driven trust propagation framework. In: Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining; ACM; 2011:974–982.

[171] Castillo C, Mendoza M, Poblete B. Information credibility on twitter. In: Proceedings of the 20th international conference on World wide web; ACM; 2011:675–684.

[172] O’Donovan J, Kang B, Meyer G, Hollerer T, Adalii S. Credibility in context: An analysis of feature distributions in twitter. In: Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Conference on Social Computing (SocialCom); IEEE; 2012:293–301.

[173] Duda RO, Hart PE, Stork DG. Pattern Classification (2nd Edition). 2nd ed. Wiley-Interscience; Nov. 2001. [Online]. Available: http://www.worldcat.org/isbn/0471056693.

[174] Inc UT, Staff UTI. Solving Data Mining Problems Using Pattern Recognition Software with Cdrom. 1st ed. Upper Saddle River, NJ, USA: Prentice Hall PTR; 1997.

[175] Johnson RA, Wichern DW. Applied multivariate statistical analysis. Upper Saddle River, NJ, USA: Prentice-Hall, Inc. 2002.

[176] Han J, Kamber M, Pei J. Data Mining: Concepts and Techniques. Third Edition Morgan Kaufman; 2011.

[177] Yaniv Z. Random sample consensus (ransac) algorithm, a generic implementation. Imaging. 2010.

[178] Whitman ME, Mattord HJ. Principles of Information Security. Boston, MA, United States: Course Technology Press; 2004.

[179] Lian Q, Zhang Z, Yang M, Zhao BY, Dai Y, Li X. An empirical study of collusion behavior in the Maze P2P file-sharing system. In: Proceedings of the 27th International Conference on Distributed Computing Systems; Washington, DC, USA: IEEE Computer Society; 2007:56. ser. ICDCS ’07.

[180] Yu H, Kaminsky M, Gibbons PB, Flaxman A. SybilGuard: defending against Sybil attacks via social networks. SIGCOMM Comput. Commun. Rev. August 2006;36:267–278.

[181] Zhang J, Blum RS. Distributed estimation in the presence of attacks for large scale sensor networks. In: Information Sciences and Systems (CISS), 2014 48th Annual Conference on; IEEE; 2014:1–6.

[182] Adomavicius G, Tuzhilin A. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Transactions on Knowledge and Data Engineering. 2005;17(6):734–749.

[183] Mustapha N, Jalali M, Jalali M. Expectation maximization clustering algorithm for user modeling in web usage mining systems. European Journal of Scientific Research. 2009;32(4):467–476.

[184] Pomerantz D, Dudek G. Context dependent movie recommendations using a hierarchical Bayesian model. In: Proceedings of the 22nd Canadian Conference on Artificial Intelligence: Advances in Artificial Intelligence; Berlin, Heidelberg: Springer-Verlag; 2009:98–109. ser. Canadian AI ’09.

[185] Adomavicius G, Kwon Y. New recommendation techniques for multicriteria rating systems. IEEE Intelligent Systems. May 2007;vol. 22(no. 3):48–55 [Online]. Available: http://dx.doi.org/10.1109/MIS.2007.58.

[186] Cano AE, Mazumdar S, Ciravegna F. Social influence analysis in microblogging platforms–a topic-sensitive based approach. Semantic Web; 2011.

[187] Fu K-w, Chan C-h. Analyzing online sentiment to predict telephone poll results. Cyberpsychology, Behavior, and Social Networking. 2013.

[188] Toch E, Wang Y, Cranor LF. Personalization and privacy: A survey of privacy risks and remedies in personalization-based systems. User Modeling and User-Adapted Interaction. 2012;22(1–2):203–220.

[189] Blair J, Czaja RF, Blair EA. Designing surveys: A guide to decisions and procedures. SAGE Publications, Incorporated; 2013.

[190] Lax JR, Phillips JH. How should we estimate public opinion in the states?”. American Journal of Political Science. 2009;vol. 53(no. 1):107–121 [Online]. Available: http://dx.doi.org/10.1111/j.1540-5907.2008.00360.x.

[191] Splichal S. Public opinion and opinion polling: Contradictions and controversies. In: Opinion Polls and the Media: Reflecting and Shaping Public Opinion. 2012:25.

[192] Zhu J, Wang H, Zhu M, Tsou BK, Ma M. Aspect-based opinion polling from customer reviews. IEEE Trans. Affect. Comput. Jan. 2011;vol. 2(no. 1):37–49 [Online]. Available: http://dx.doi.org/10.1109/T-AFFC.2011.2.

[193] Gardner RM, Brown DL, Boice R. Using Amazon’s Mechanical Turk website to measure accuracy of body size estimation and body dissatisfaction. Body Image. 2012.

[194] Wang D, Amin M, Abedlzaher T, Roth D, Voss C, Kaplan L, Tratz S, Laoudi J, Briesch D. Provenance-assisted classification in social networks. In: IEEE Journal of Selected Topics in Signal Processing (J-STSP); 2014.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset