PAN 2008

From ConfIDent
Deadlines
2008-04-20
20
Apr
2008
Submission
Venue

Patras, Greece

Loading map...



----------------------------------------------------------
*PAN-08 - Uncovering Plagiarism, Authorship, and Social Software Misuse*
----------------------------------------------------------

In conjunction with the ECAI 2008
18th European Conference on Artificial Intelligence

Patras, Greece, 21-25 July 2008
http://www.aisearch.de/pan-08

----------------------------------------------------------
About this Workshop:
----------------------------------------------------------

The workshop shall bring together experts and researchers around the
exciting and future-oriented topics of plagiarism analysis, authorship
identification, and the detection of social software misuse. The
development of new solutions for these problems can benefit from the
combination of existing technologies, and in this sense the workshop
provides a platform that spans different views and approaches. The
following list gives examples from the outlined fields for which
contributions are welcome, but not restricted to:

Plagiarism analysis:

- plagiarism detection in general, in Web communities and social
networks, and cross-language plagiarism
- identifying near-duplicate and versioned documents of all kinds:
text, software, image, music, sound
- technology for high-similarity retrieval such as fingerprinting and
similarity hashing

Authorship identification:

- models for authorship identification, authorship attribution, and
writing style
- NLP- and knowledge-based retrieval models to capture personal traits
and sentiment
- Web forensics, community fraud, and new Web infringements

Social Software Misuse Detection:

- uncovering serial sharing and lobbying
- monitoring vandalism, trolling, or stalking
- trust, psychological and personality-based user studies, social
aspects of Web misuse

Some background:

Plagiarism analysis is a collective term for computer-based methods to
identify a plagiarism offense. In connection with text documents we
distinguish between corpus-based and intrinsic analysis: the former
compares suspicious documents against a set of potential original
documents, the latter identifies potentially plagiarized passages by
analyzing the suspicious document with respect to changes in writing
style.

Authorship identification divides into so-called attribution and
verification problems. In the authorship attribution problem, one is given
examples of the writing of a number of authors and is asked to determine
which of them authored given anonymous texts. In the authorship
verification problem, one is given examples of the writing of a single
author and is asked to determine if given texts were or were not
written by
this author. As a categorization problem, verification is significantly
more difficult than attribution. Authorship verification and intrinsic
plagiarism analysis represent two sides of the same coin.

Social software such as Web logs, sharing sites for photos and videos,
wikis and on-line forums contribute up to one third of new Web
content. "Social Software Misuse" is a collective term for anti-social
behavior in online communities; an example is the distribution of spam via
the e-mail infrastructure. Interestingly, spam is one of the few misuses
for which detection technology is developed at all, though various
forms of
misuse exist that threaten the different online communities. Our workshop
shall close this gap and invites contributions concerned with all kinds of
social software misuse.

----------------------------------------------------------
Important Dates:
----------------------------------------------------------

April 20, 2008 Deadline for paper submission
May 10, 2008 Notification to authors
May 26, 2008 Camera-ready copy due
July 21-22, 2008 Workshop opens

Contributions will be peer-reviewed by experts from the related field.

----------------------------------------------------------
Workshop Organization:
----------------------------------------------------------

Benno Stein, Bauhaus University Weimar
Efstathios Stamatatos, University of the Aegean
Moshe Koppel, Bar-Ilan University, Israel

Contact: pan-08@aisearch.de
Information about the workshop can be found at
http://www.aisearch.de/pan-08
	

This CfP was obtained from WikiCFP

Cookies help us deliver our services. By using our services, you agree to our use of cookies.