ログイン
言語:

WEKO3

  • トップ
  • コミュニティ
  • ランキング
AND
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

{"_buckets": {"deposit": "2ca1b64b-3e7f-460a-9376-f50b3c37963c"}, "_deposit": {"id": "1894", "owners": [], "pid": {"revision_id": 0, "type": "depid", "value": "1894"}, "status": "published"}, "_oai": {"id": "oai:repository.dl.itc.u-tokyo.ac.jp:00001894"}, "item_7_alternative_title_1": {"attribute_name": "\u305d\u306e\u4ed6\u306e\u30bf\u30a4\u30c8\u30eb", "attribute_value_mlt": [{"subitem_alternative_title": "\u30a6\u30a7\u30d6\u30b9\u30d1\u30e0\u306e\u5883\u754c\u62bd\u51fa\u624b\u6cd5\u306b\u95a2\u3059\u308b\u7814\u7a76"}]}, "item_7_biblio_info_7": {"attribute_name": "\u66f8\u8a8c\u60c5\u5831", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2008-03", "bibliographicIssueDateType": "Issued"}, "bibliographic_titles": [{}]}]}, "item_7_date_granted_25": {"attribute_name": "\u5b66\u4f4d\u6388\u4e0e\u5e74\u6708\u65e5", "attribute_value_mlt": [{"subitem_dategranted": "2008-03-24"}]}, "item_7_degree_name_20": {"attribute_name": "\u5b66\u4f4d\u540d", "attribute_value_mlt": [{"subitem_degreename": "\u4fee\u58eb(\u60c5\u5831\u7406\u5de5\u5b66)"}]}, "item_7_description_5": {"attribute_name": "\u6284\u9332", "attribute_value_mlt": [{"subitem_description": "As the search result ranking is getting important for attracting visitors and yielding profits, more and more people are now trying to mislead search engines in order to get higher ranking. Since link-based ranking algorithms are important tools for current search engines, web spammers are making a significant effort to manipulate the link structure of the Web, namely, link spamming. Link hijacking is one technique of link spamming. By hijacking links from normal sites to target spam sites, spammers can make search engines believe that normal sites endorse spam sites. In this research, we propose link analysis techniques for finding out link-hijacked sites using modified PageRank algorithms. We tested our methods on a large scale Japanese web archive and evaluated the accuracy.", "subitem_description_type": "Abstract"}]}, "item_7_full_name_3": {"attribute_name": "\u8457\u8005\u5225\u540d", "attribute_value_mlt": [{"nameIdentifiers": [{"nameIdentifier": "5736", "nameIdentifierScheme": "WEKO"}], "names": [{"name": "\u912d, \u5bb9\u6731"}]}]}, "item_7_select_21": {"attribute_name": "\u5b66\u4f4d", "attribute_value_mlt": [{"subitem_select_item": "master"}]}, "item_7_subject_13": {"attribute_name": "\u65e5\u672c\u5341\u9032\u5206\u985e\u6cd5", "attribute_value_mlt": [{"subitem_subject": "548", "subitem_subject_scheme": "NDC"}]}, "item_7_text_24": {"attribute_name": "\u7814\u7a76\u79d1\u30fb\u5c02\u653b", "attribute_value_mlt": [{"subitem_text_value": "\u60c5\u5831\u7406\u5de5\u5b66\u7cfb\u7814\u7a76\u79d1\u96fb\u5b50\u60c5\u5831\u5b66\u5c02\u653b"}]}, "item_7_text_36": {"attribute_name": "\u8cc7\u6e90\u30bf\u30a4\u30d7", "attribute_value_mlt": [{"subitem_text_value": "Thesis"}]}, "item_7_text_4": {"attribute_name": "\u8457\u8005\u6240\u5c5e", "attribute_value_mlt": [{"subitem_text_value": "\u5927\u5b66\u9662\u60c5\u5831\u7406\u5de5\u5b66\u7cfb\u7814\u7a76\u79d1\u96fb\u5b50\u60c5\u5831\u5b66\u5c02\u653b"}, {"subitem_text_value": "Graduate School of Information Science and Technology Department of Information and Communication Engineering The University of Tokyo"}]}, "item_creator": {"attribute_name": "\u8457\u8005", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Chung, Young joo"}], "nameIdentifiers": [{"nameIdentifier": "5735", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "\u30d5\u30a1\u30a4\u30eb\u60c5\u5831", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2017-05-31"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "48066450.pdf", "filesize": [{"value": "2.8 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 2800000.0, "url": {"label": "48066450.pdf", "url": "https://repository.dl.itc.u-tokyo.ac.jp/record/1894/files/48066450.pdf"}, "version_id": "9d18b9f0-2d98-442d-bc35-62ee9ce2d65c"}]}, "item_keyword": {"attribute_name": "\u30ad\u30fc\u30ef\u30fc\u30c9", "attribute_value_mlt": [{"subitem_subject": "Web spam", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Link analysis", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Link hijacking", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Information retrieval", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "\u8a00\u8a9e", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "\u8cc7\u6e90\u30bf\u30a4\u30d7", "attribute_value_mlt": [{"resourcetype": "thesis", "resourceuri": "http://purl.org/coar/resource_type/c_46ec"}]}, "item_title": "A Study of Methods for Extracting the Boundaries of Web Spam", "item_titles": {"attribute_name": "\u30bf\u30a4\u30c8\u30eb", "attribute_value_mlt": [{"subitem_title": "A Study of Methods for Extracting the Boundaries of Web Spam"}]}, "item_type_id": "7", "owner": "1", "path": ["9/233/234", "34/105/262"], "permalink_uri": "http://hdl.handle.net/2261/28816", "pubdate": {"attribute_name": "\u516c\u958b\u65e5", "attribute_value": "2011-08-08"}, "publish_date": "2011-08-08", "publish_status": "0", "recid": "1894", "relation": {}, "relation_version_is_last": true, "title": ["A Study of Methods for Extracting the Boundaries of Web Spam"], "weko_shared_id": null}
  1. 124 情報理工学系研究科
  2. 40 電子情報学専攻
  3. 1244025 修士論文(電子情報学専攻)
  1. 0 資料タイプ別
  2. 20 学位論文
  3. 025 修士論文

A Study of Methods for Extracting the Boundaries of Web Spam

http://hdl.handle.net/2261/28816
bb8ab7d2-953a-45e3-b9c3-6e8560ce2048
名前 / ファイル ライセンス アクション
48066450.pdf 48066450.pdf (2.8 MB)
Item type 学位論文 / Thesis or Dissertation(1)
公開日 2011-08-08
タイトル
タイトル A Study of Methods for Extracting the Boundaries of Web Spam
言語
言語 eng
キーワード
主題 Web spam
主題Scheme Other
キーワード
主題 Link analysis
主題Scheme Other
キーワード
主題 Link hijacking
主題Scheme Other
キーワード
主題 Information retrieval
主題Scheme Other
資源タイプ
資源 http://purl.org/coar/resource_type/c_46ec
タイプ thesis
その他のタイトル
その他のタイトル ウェブスパムの境界抽出手法に関する研究
著者 Chung, Young joo

× Chung, Young joo

WEKO 5735

Chung, Young joo

Search repository
著者別名
識別子
識別子 5736
識別子Scheme WEKO
姓名
姓名 鄭, 容朱
著者所属
著者所属 大学院情報理工学系研究科電子情報学専攻
著者所属
著者所属 Graduate School of Information Science and Technology Department of Information and Communication Engineering The University of Tokyo
Abstract
内容記述タイプ Abstract
内容記述 As the search result ranking is getting important for attracting visitors and yielding profits, more and more people are now trying to mislead search engines in order to get higher ranking. Since link-based ranking algorithms are important tools for current search engines, web spammers are making a significant effort to manipulate the link structure of the Web, namely, link spamming. Link hijacking is one technique of link spamming. By hijacking links from normal sites to target spam sites, spammers can make search engines believe that normal sites endorse spam sites. In this research, we propose link analysis techniques for finding out link-hijacked sites using modified PageRank algorithms. We tested our methods on a large scale Japanese web archive and evaluated the accuracy.
書誌情報 発行日 2008-03
日本十進分類法
主題 548
主題Scheme NDC
学位名
学位名 修士(情報理工学)
学位
値 master
研究科・専攻
情報理工学系研究科電子情報学専攻
学位授与年月日
学位授与年月日 2008-03-24
戻る
0
views
See details
Views

Versions

Ver.1 2021-03-02 08:12:19.871938
Show All versions

Share

Mendeley CiteULike Twitter Facebook Print Addthis

Cite as

Export

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by CERN Data Centre & Invenio


Powered by CERN Data Centre & Invenio