2013
DOI: 10.1093/comjnl/bxt147
|View full text |Cite
|
Sign up to set email alerts
|

Clustering Media Items Stemming from Multiple Social Networks

Abstract: We have created and evaluated an algorithm capable of deduplicating and clustering exact-and near-duplicate media items that get published and shared on multiple social networks in the context of events. This algorithm works in an entirely ad-hoc manner, without any pre-calculation. When people attend events, they more and more share event-related media items publicly on social networks to let their social network contacts relive and witness the attended events. In the past, we have worked on methods to accumu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 25 publications
0
8
0
Order By: Relevance
“…Such techniques are likely to contribute to a variety of event types, as evidenced by previous case studies [11]. Identification and removal of images with overlays placed by broadcasters and mobile applications [46], would contribute similarly to event types which are broadcast live. A particular issue identified in the ADoff dataset, was the misclassification of images posted about similar events, other football matches scheduled on the same day.…”
Section: Discussionmentioning
confidence: 89%
See 2 more Smart Citations
“…Such techniques are likely to contribute to a variety of event types, as evidenced by previous case studies [11]. Identification and removal of images with overlays placed by broadcasters and mobile applications [46], would contribute similarly to event types which are broadcast live. A particular issue identified in the ADoff dataset, was the misclassification of images posted about similar events, other football matches scheduled on the same day.…”
Section: Discussionmentioning
confidence: 89%
“…Therefore, methods may be required to distinguish unoriginal source from visual features of the image itself. Steiner et al [46] and Layek et al [47] describe methods for identifying unoriginal images, for example images which have been cropped, or include a brand overlay added by broadcast media.…”
Section: Filtering Copied Faked and Misleading Imagesmentioning
confidence: 99%
See 1 more Smart Citation
“…Notably, in a complex network, there are other characteristics than structural features that describe the importance of a node [ 31 ]. For example, in an airport network, each edge represents an air route from one airport to another, and the weight of an edge shows the number of flights on that route in the given direction.…”
Section: Methodsmentioning
confidence: 99%
“…e functions of the system for film and television include automatic segmentation of shots, key frame extraction of shots, static sample query, and text and title content query [3,4]. It provides a set of tools for people on the Web to search and retrieve images and video, and it can be realized in Internet content-based video/image retrieval [5,6]. Video allows the user to use visual characteristics and to retrieve the relationship between time and space and film and television and has integrated text and visual search method, automatic video object segmentation and tracking, and rich visual feature library, including color, texture, shape, and motion, interactive query, and browsing on the Internet [7,8].…”
Section: Introductionmentioning
confidence: 99%