A Bipartite Graph Model and Mutually Reinforcing Analysis for Review Sites

A number of methods have been proposed for detecting spam reviews in order to obtain credible summaries. These methods, however, could not be uniformly applied to various forms of reviews and are not suitable for a product or service which has been evaluated by few reviewers. In this paper, we propo...

Full description

Saved in:
Bibliographic Details
Published inDatabase and Expert Systems Applications pp. 341 - 348
Main Authors Tawaramoto, Kazuki, Kawamoto, Junpei, Asano, Yasuhito, Yoshikawa, Masatoshi
Format Book Chapter
LanguageEnglish
Japanese
Published Berlin, Heidelberg Springer Berlin Heidelberg 2011
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783642230875
3642230873
ISSN0302-9743
1611-3349
DOI10.1007/978-3-642-23088-2_25

Cover

Abstract A number of methods have been proposed for detecting spam reviews in order to obtain credible summaries. These methods, however, could not be uniformly applied to various forms of reviews and are not suitable for a product or service which has been evaluated by few reviewers. In this paper, we propose a bipartite graph model of review sites and a mutually reinforcing method of summarizing evaluations and detecting anomalous reviewers. Our model and method can be applied to reviews of various forms, and is suitable for a subject with few reviewers. We ascertain the effectiveness of our method using reviews of three forms on Yahoo! Movie web site.
AbstractList A number of methods have been proposed for detecting spam reviews in order to obtain credible summaries. These methods, however, could not be uniformly applied to various forms of reviews and are not suitable for a product or service which has been evaluated by few reviewers. In this paper, we propose a bipartite graph model of review sites and a mutually reinforcing method of summarizing evaluations and detecting anomalous reviewers. Our model and method can be applied to reviews of various forms, and is suitable for a subject with few reviewers. We ascertain the effectiveness of our method using reviews of three forms on Yahoo! Movie web site.
Author Kawamoto, Junpei
Tawaramoto, Kazuki
Yoshikawa, Masatoshi
Asano, Yasuhito
Author_xml – sequence: 1
  givenname: Kazuki
  surname: Tawaramoto
  fullname: Tawaramoto, Kazuki
  email: tawara@db.soc.i.kyoto-u.ac.jp
  organization: Graduate School of Informatics, Kyoto University, Japan
– sequence: 2
  givenname: Junpei
  surname: Kawamoto
  fullname: Kawamoto, Junpei
  email: j.kawamoto@db.soc.i.kyoto-u.ac.jp
  organization: Graduate School of Informatics, Kyoto University, Japan
– sequence: 3
  givenname: Yasuhito
  surname: Asano
  fullname: Asano, Yasuhito
  email: asano@i.kyoto-u.ac.jp
  organization: Graduate School of Informatics, Kyoto University, Japan
– sequence: 4
  givenname: Masatoshi
  surname: Yoshikawa
  fullname: Yoshikawa, Masatoshi
  email: yoshikawa@i.kyoto-u.ac.jp
  organization: Graduate School of Informatics, Kyoto University, Japan
BookMark eNpVkMtOwzAQRQ0Uibb0D1j4Bwz2jF9ZlooWUCskHmvLSRxIiZIqbkH9e9zChtVI52pGc8-IDNquDYRcCX4tODc3mbEMmZbAALm1DByoEzJJGBM8MjglQ6GFYIgyO_uXGTUgQ44cWGYkXpBRjGvOOZgMhuRxSm_rje-39TbQRe83H3TVlaGhvi3parfd-abZ0-dQt1XXF3X7Tqetb_axjjSBFHzV4Zu-pO14Sc4r38Qw-Ztj8ja_e53ds-XT4mE2XbK1MJli3giba88RSmvAFtIUleQZ5kbakmtvcqGw0gFyMEUoQ6mUyrXVUqIFlXkcE_i9Gzd9eij0Lu-6z-gEdwdbLlV36FJ5dzTjDrbwB2Y6WPg
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2011
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2011
DOI 10.1007/978-3-642-23088-2_25
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9783642230882
3642230881
EISSN 1611-3349
Editor Schewe, Klaus-Dieter
Liddle, Stephen W.
Hameurlain, Abdelkader
Zhou, Xiaofang
Editor_xml – sequence: 1
  givenname: Abdelkader
  surname: Hameurlain
  fullname: Hameurlain, Abdelkader
  email: hameur@irit.fr
– sequence: 2
  givenname: Stephen W.
  surname: Liddle
  fullname: Liddle, Stephen W.
  email: liddle@byu.edu
– sequence: 3
  givenname: Klaus-Dieter
  surname: Schewe
  fullname: Schewe, Klaus-Dieter
  email: kd.schewe@scch.at
– sequence: 4
  givenname: Xiaofang
  surname: Zhou
  fullname: Zhou, Xiaofang
  email: zxf@uq.edu.au
EndPage 348
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-j1795-a718b6a032d8728c47cf4093b748d06a7b153f6e2b27ceded555b6864438259a3
ISBN 9783642230875
3642230873
ISSN 0302-9743
IngestDate Wed Sep 17 03:31:05 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
Japanese
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-j1795-a718b6a032d8728c47cf4093b748d06a7b153f6e2b27ceded555b6864438259a3
PageCount 8
ParticipantIDs springer_books_10_1007_978_3_642_23088_2_25
PublicationCentury 2000
PublicationDate 2011
PublicationDateYYYYMMDD 2011-01-01
PublicationDate_xml – year: 2011
  text: 2011
PublicationDecade 2010
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSubtitle 22nd International Conference, DEXA 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings, Part I
PublicationTitle Database and Expert Systems Applications
PublicationYear 2011
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Nierstrasz, Oscar
Steffen, Bernhard
Kittler, Josef
Vardi, Moshe Y.
Weikum, Gerhard
Sudan, Madhu
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Pandu Rangan, C.
Kanade, Takeo
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, Lancaster, UK
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, UK
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: ETH Zurich, Zurich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford University, Stanford, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: Oscar
  surname: Nierstrasz
  fullname: Nierstrasz, Oscar
  organization: University of Bern, Bern, Switzerland
– sequence: 9
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Indian Institute of Technology, Madras, India
– sequence: 10
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: University of Dortmund, Dortmund, Germany
– sequence: 11
  givenname: Madhu
  surname: Sudan
  fullname: Sudan, Madhu
  organization: Massachusetts Institute of Technology, USA
– sequence: 12
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 13
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
  organization: University of California, Berkeley, USA
– sequence: 14
  givenname: Moshe Y.
  surname: Vardi
  fullname: Vardi, Moshe Y.
  organization: Rice University, Houston, USA
– sequence: 15
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max-Planck Institute of Computer Science, Saarbrücken, Germany
SSID ssj0002792
ssj0000609487
Score 1.5062518
Snippet A number of methods have been proposed for detecting spam reviews in order to obtain credible summaries. These methods, however, could not be uniformly applied...
SourceID springer
SourceType Publisher
StartPage 341
SubjectTerms anomally detection
graph model
mutually reinforcing
Title A Bipartite Graph Model and Mutually Reinforcing Analysis for Review Sites
URI http://link.springer.com/10.1007/978-3-642-23088-2_25
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La9wwEBab7aX00Dd9o0NvxkWVbFl76GFbUsKS5NKkpCcjyVqyTdkNsU0gvyc_tDOS5VWbUEgvZpHstT2fPJoZzXwi5D3TupoZw_OGK5cXyrpcyZLneDbowqqyGld0Dw7l3nGxOClPJpPrJGup78wHe3VrXcn_oAptgCtWyd4B2fFPoQF-A75wBITh-Jfx-2eYNeSy6E7jHOTD_56xuIv848G2TINx3je_1BcakNmELIqr_mw1qlvoiz2Lfn3uxp55q_3m3NkP3fan8Plv1UR7ujqD60LFTwvOOzSkI3CefV6d48jsYCQiL7bfeC1QExz0WLfyCx0AT91qfXQmEqRg6uPA-P8Nrg6vgBJ17af9YdHjcNP5XLIs7ksR1VQax_DVfGkcI8Yxs3_QfPmSkwIMGqThTxSlAK0OflFQlC4ocon0jCLQoQ7KWQSKrWGeF4Hh88YUkmaNSKxdgrvBsKt5uUN24AGm5N58d7H_fYzkMQkushrdfIaUjGHtKjwVVhTFpxaB82n7Fkk15223vLE-782eo0fkAZbCUKxRAQE_JhO3fkIeRoHTQeBPyWJOR6iph5p6qClATSPUNIGaRqgpNNAANfVQPyPHX3ePvuzlwyYd-U_Q5WWuwbgxUjPBG1VxZYvKLgs2E6YqVMOkrgzMqUvpuOGVdY1ryrI0UoEZLhS43lo8J9P1Zu1eEKpt0VgtlWp4UzD7cabLZamdw_Lp5YyxlySLwqjxs2vryLkNoqtFDaKrvehqFN2rO539mtzfDso3ZNpd9O4tmJudeTfg_RvKn3ia
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Database+and+Expert+Systems+Applications&rft.au=Tawaramoto%2C+Kazuki&rft.au=Kawamoto%2C+Junpei&rft.au=Asano%2C+Yasuhito&rft.au=Yoshikawa%2C+Masatoshi&rft.atitle=A+Bipartite+Graph+Model+and+Mutually+Reinforcing+Analysis+for+Review+Sites&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2011-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642230875&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=341&rft.epage=348&rft_id=info:doi/10.1007%2F978-3-642-23088-2_25
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon