1. Technical Field
This disclosure relates to classifying message content, including classifying social media content, such as tweets on Twitter™, as span and other types of content.
2. Description of Related Art
Twitter is used for a variety of reasons, including information dissemination, marketing, political organizing and to spread propaganda, spamming, promotion, conversations, and so on. Characterizing these activities and categorizing associated user generated content can be a challenging task.
Twitter has emerged as a critical factor in information dissemination, marketing, S. Wu, J. M. Hofman, W. A. Mason, and D. J. Watts, “Who Says What to Whom on Twitter”, In Proceedings of World Wide Web Conference (WWW '11), 2011, and influence discovery. It has also become an important tool for mobilizing people, as witnessed by the events of the 2011 ‘Arab spring’ “The face of egypt's social networking revolution”, In http://www.cbsnews.com/stories/2011/02/12/eveningnews/main20031662.shtml, 2011; P. Beaumont, “Can social networking overthrow a government?”, In http://www.smh.com.au/technology/technology-news/can-social-networking-overthrow-a-government-20110225-1b7u6.html, 2011, and for crisis management, when it was used to reconnect Japanese earthquake victims with loved ones and to provide real time information during the subsequent nuclear disaster (S. Kessler, “Social media plays vital role in reconnecting japan quake victims with loved ones”, In http://mashable.com/2011/03/14/internet-intact-japan/, 2011). In the cultural arena, Twitter has developed into an effective mouthpiece for celebrities, “Social networking sites used by celebrities—the twitter Revolution”, In http://www.twittingsound.com/social-networking-sites-used-by-celebrities-the-twitter-revolution.html, 2011, spawning a generation of stars, like Justin Bieber, and starlets (“Lady gaga a bigger twitter star than justin bieber—10 million fans say so”, In http://sanfrancisco.ibtimes.com/articles/147005/20110517/1ady-gaga-a-bigger-twitter-star-justin-beiber-10-million-fans-say.htm, 2011). As a consequence, new social marketing strategies and sophisticated automated promotion campaigns have risen. Information dissemination, advertising, propaganda campaigns, bot retweeting and spamming are some of the many diverse activities occurring on Twitter.
Examples of retweeting activity illustrate the richness of Twitter dynamics. Differentiating between these diverse activities on Twitter and classifying the short posts can be a challenging problem. For example, a post that is retweeted multiple times by the same user may be categorized as spam. However, if the same message is of interest to and retweeted by many other users, it can be classified as a successful campaign or information dissemination. Such judgments may be difficult to make based solely on content. The advent of bots and automatic tweeting services have added another dimension of complexity to the already difficult problem. How distinguish human activity from programmed or bot activity, as well as campaigns designed to manipulate opinion from those that capture users' interest, and popular from unpopular content?
It thus can be challenging to quickly and economically classify content in a message, such as content in social media, such as the content of a tweet on Twitter™.
R. Crane and D. Sornette, “Viral, quality, and junk videos on youtube: Separating content from noise in an information-rich environment”, In Proceedings of the AAAI Symposium on Social Information Processing, 2008, describe a method based on dynamics of collective user activity on YouTube to automatically distinguish quality videos from junk videos. However, this method may only discover three classes of activity and videos, while heterogeneous activity in social media may require more than three classes.
Some existing spam detection, B. Markines, C. Cattuto, and F. Menczer, “Social spam detection”, In Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web, Al RWeb '09, pages 41-48, New York, N.Y., USA, 2009. ACM; Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov, “Spamming botnets: signatures and characteristics”, SIGCOMM Comput. Commun. Rev., 38(4):171-182, August 2008, and trust management systems J. Caverlee, L. Liu, and S. Webb. Socialtrust: “tamper-resilient trust establishment in online communities”, In JCDL '08: Proceedings of the 8th ACM/IEEE-CS joint conference on Digital libraries, pages 104-114, New York, N.Y., USA, 2008, ACM, look at content and structure. They may require additional constraints, like labeled up-to-date annotation of resources and access to content and cooperation of search engine. These may be difficult to satisfy due to the diversity and quantity of messages in social media.
C. Grier, K. Thomas, V. Paxson, and M. Zhang, “@spam: the underground on 140 characters or less”, In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 27-37, New York, N.Y., USA, 2010, ACM, analyzed the features of spam on Twitter. They detect spam using three blacklisting services. Similarly, another method employed to remove spam on Twitter uses Clean Tweets, H. Kwak, C. Lee, H. Park, and S. Moon, “What is Twitter, a social network or a news media?”, In Proceedings of the 19th international conference on World wide web, WWW '10, pages 591-600, New York, N.Y., USA, 2010, ACM. Clean tweets filter tweets from users who are less than a day (or any duration specified) old and tweets that mention three (or any number specified) trending topics. However, this approach may be unable to detect spammers who auto-tweet or post spam-like tweets at regular intervals (like EasyCash435 or on strategy,
Previous work provided a binary (such as low-quality vs. high quality content) or tertiary classification of content based on analysis of content and structure. See E. Agichtein, C. Castillo, D. Donato, A. Gionis, and G. Mishne, “Finding high-quality content in social media”, In Proceedings of the international conference on Web search and web data mining, WSDM '08, pages 183, 194, New York, N.Y., USA, 2008, ACM, or user response to it, R. Crane and D. Sornette, “Viral, quality, and junk videos on youtube: Separating content from noise in an information-rich environment”, In Proceedings of the AAAI Symposium on Social Information Processing, 2008. However, the rich, heterogenous and complex activity on Twitter may necessitate the need for a more detailed characterization.
Quickly and inexpensively classifying message content, including classifying social media content such as tweets on Twitter™, as span and other types of content, remains challenging.
A computer system running a program of instructions may classify the content of a message that is re-broadcasted in whole or in part by one or more re-broadcasters. An amount of time interval diversity may be determined in the time intervals between each successive pair of re-broadcasted messages. An amount of re-broadcaster diversity may be determined in the number of times the message has been re-broadcasted by each of the re-broadcasters. The content of the message may be classified based on the amount of time interval diversity and the amount of re-broadcaster diversity.
The message may be a tweet on Twitter™. Each rebroadcast may be a retweet on Twitter™.
The message may include a URL. Each rebroadcast may include the URL.
The amount of time interval diversity and/or the amount of re-broadcaster diversity may be computed using entropy or a different method.
The classifying may equate a low amount of time interval diversity with automatic or robotic activity; a high amount of re-broadcaster diversity and a high amount of time interval diversity with newsworthy information; a low amount of time interval diversity and a low amount of re-broadcaster diversity with spam; a low amount of re-broadcaster diversity with an advertisement or promotion; and/or a low amount of re-broadcaster diversity and a high amount of time interval diversity with a campaign.
The classifying may be performed without analyzing the content. For example, the message may contain text, an image, and/or a video, and the classifying may classify the text, image, and/or video without analyzing the text, image, and/or video.
The classifying may distinguish between newsworthy content and spam based on the amount of time interval diversity and the amount of re-broadcaster diversity.
These, as well as other components, steps, features, objects, benefits, and advantages, will now become clear from a review of the following detailed description of illustrative embodiments, the accompanying drawings, and the claims.
The drawings are of illustrative embodiments. They do not illustrate all embodiments. Other embodiments may be used in addition or instead. Details that may be apparent or unnecessary may be omitted to save space or for more effective illustration. Some embodiments may be practiced with additional components or steps and/or without all of the components or steps that are illustrated. When the same numeral appears in different drawings, it refers to the same or like components or steps.
Illustrative embodiments are now described. Other embodiments may be used in addition or instead. Details that may be apparent or unnecessary may be omitted to save space or for a more effective presentation. Some embodiments may be practiced with additional components or steps and/or without all of the components or steps that are described.
An information-theoretic approach to classification of user activity on Twitter is presented with a focus on tweets that contain embedded URLs. Their collective ‘retweeting’ dynamics are studied.
Two features, time-interval and user entropy, may be identified and used to classify retweeting activity. Good separation of different activities may be achieved using just these two features, and content may be categorized based on the collective user response it generates.
Five distinct categories of retweeting activity on Twitter have been identified: automatic/robotic activity, newsworthy information dissemination, advertising and promotion, campaigns, and parasitic advertisement.
The techniques may be applied to other types of messaging systems, such as other types of social media systems, as well as to content other than URLs, such as text, image, and video content. The techniques may also be applied to classify other classes of information. The classification approach may not require any analysis of the content.
A quantitative approach is presented to classify tweet content.
An information-theoretic method may characterize the dynamics of retweeting activity generated by some content on Twitter. The method may be content and language independent. The method may nevertheless categorize content into multiple classes based on how Twitter users react to it. It may be able to separate newsworthy stories from those that are not interesting, campaigns that are driven by humans from those driven by bots, successful marketing campaigns from unsuccessful ones.
When a user posts or ‘tweets’ a story, he exposes it to other Twitter users. Tweets that contain URLs will now be discussed as an example. These URLs may be used as markers to trace the spread of information or content through the Twitter population. When a later tweet includes the same URL as an earlier one, the new post may be considered to be a ‘retweet’ of the content of the original tweet. The retweet may not be required to contain an ‘RT’ string, nor check that the user follows the author of the original tweet. Thus, retweets may include traditional retweets from the original author's followers, as well as conversations about the content associated with that URL and independent mentions of it. The collective user response to the tweet may be called the retweeting activity and may vary with the nature of content and users' interest in it.
This may in turn lead to characteristic dynamic patterns. For example, a popular news story may be retweeted by many different users (but only once by each user), whereas campaigns may get many retweets, but mainly from the same small group of users.
Some retweets, however, could be automatically generated. Relying purely on frequency of retweets may thus be misleading as to the popularity of content. The temporal signature of automated retweeting may be drastically different from human response, allowing differentiation between them.
Given some content (URL), retweeting dynamics may be characterized by two distributions: distribution of the time intervals between successive retweets and distribution of distinct users involved in retweeting. Entropy may be used to quantitatively characterize these distributions. These two numeric features may capture much of the complexity of user activity.
Using these features to classify activity on Twitter, several different types of activity may be identified, including marketing campaigns, information dissemination, auto-tweeting, and spam. In fact, some of the profiles that have been correctly identified as engaging in spam-like activities have been eventually suspended by Twitter. The approach can separate newsworthy content from promotional campaigns, independent of the language of the content, and can provide an objective measure of the value of content to people.
User's response to content posted on Twitter is encoded in the dynamics of retweeting of this content.
Retweeting activity of posts made by starlets (without major following) may be starkly different from that of stars.
In addition to information dissemination, automated tweeting, promotional activities and advertisements, campaigns add to the diversity of Twitter dynamics. One of the successful campaigners in a sample was a Brazilian politician Marina Silva.
Manual analysis of retweeting activity on Twitter is labor-intensive. Instead, in this section a principled approach to categorize retweeting activity associated with some content is described.
Problem Statement. Given some user-generated content or tweet cjεC (where C is a set of tweets or content), the aim is to analyze the trace, TjεT (where T is the collective activity on all content), of retweeting activity on it, to understand the content and associated dynamics. This trace, Tj can be represented by a sequence of tuples ((uj1, tj1), (uj2, tj2), . . . , (uji, tji), . . . , (ujK, tjK)), where uji represents a user retweeting cj at time tji. Given N such traces T1, . . . , TNεT and their corresponding tweets c1, . . . , cj, . . . , cNεC, how do we meaningfully characterize and categorize them?
The observations made above about dynamics of retweeting can be succinctly captured by two distributions: inter-tweet time interval distribution and user distribution.
First, the distribution of time intervals between successive retweets is considered. These are shown in
The regularity or predictability of the temporal trace of tweets using time-interval entropy may be measured. Let ΔT represent the time interval between two consecutive retweets in a trace Tj with possible values {Δt1, Δt2, . . . , Δti, . . . , ΔtnT}. If there are nΔT
The entropy HΔT of the distribution of time intervals may be:
Automatic retweeting with a regular pattern may have a lower time interval entropy, and may therefore, be more predictable than human retweeting, which may more broadly be distributed and less predictable.
In addition to time interval, the distribution of the number of times distinct users retweet the content or a portion of it, such as a URL, may be measured.
The campaign shown in
Similarly in case of the retweeting activity shown in
Entropy may be used to measure the breadth of user distribution. Let random variable F represent a distinct user in a trace Tj, with possible values {f1, f2, . . . , fi, . . . , fnF}. Let there be nf
The user entropy HF may be given by:
As clear from the Equation 4, in spam-like activity a small number of users are responsible for large number of tweets, which may lead to a lower entropy than retweeting activity of newsworthy content. On the other hand, automated retweeting coming from many distinct users (as in
Time interval and user entropies HΔT(Tj) and HF(Tj) can used to categorize the content of retweeting activity. This classification may help not only identify the different dynamic activities occurring on Twitter, but may also provide valuable insight into the nature of the associated content.
The linear runtime complexity of entropy calculation and the presence of scalable methods of clustering, P. S. Bradley, C. A. Reina, and U. M. Fayyad, “Clustering Very Large Databases Using EM Mixture Models”, Pattern Recognition, International Conference on, 2:2076+, 2000, may ensure that this entropy-based approach can be easily applied to very large data sets.
Twitter's Gardenhose streaming API provides access to a portion of real time user activity, roughly 20%-30\% of all user activity. This API was used to collect tweets for a period of three weeks in the fall of 2010. The focus was specifically on tweets that included a URL (usually shortened by a service such as bit.ly) in the body of the message. In order to ensure that the complete retweeting history of each URL was obtained, Twitter's search API was used to retrieve all activity for that URL.
The data collection process resulted in 3,424,033 tweets which mentioned 70,343 distinct shortened URLs. There were 815,614 users in the data sample. The retweeting activity was studied of URLs posted by users who posted at least two popular URLs. By popular, this means URLs that were retweeted at least 100 times. There were 687 such distinct URLs.
The entropy based approach was applied to study the retweeting dynamics of these URLs. It shows that entropy-based analysis gives a good characterization of different types of activities observed in collective retweeting of these URLs.
The content of each URL was manually examined (using Google translate on foreign language pages) to annotate the activity along following categories:
If the URL belongs to the twitter profile of a news organization, the retweeting activity was classified as following news.
If the URL links to the blog or webpage maintained by an individual, the retweeting activity was classified as following blogs or celebrity.
If the URL belongs to an individual or an organization with a discernible agenda (politics, animal rights issues), the retweeting activity was classified as a campaign.
If the URL links to an advertisement or promotion, the retweeting activity was classified as such. This includes instances where users post the same link repeatedly, leading to spam-like content generation, and the promotional activities of aspiring starlets.
This is a form of parasitic advertisement in which users participate unwittingly. This happens when a user logs into a website or web service, and then that service tweets a message in user's name telling his followers about it. For example, when a user visits sites such as Tinychat (tinychat.com) or Twitcam (twitcam.com), a message is posted to the user's Twitter account “join me on tinychat . . . ”
Retweeting that is mainly generated through Twitterfeed (www.twitterfeed.com) or similar services is classifies as automatic activity. Note that automated activity could be associated with any type of content, but since it has its own unique characteristics, different from all the aforementioned activities, it is included as a separate class. This can be identified by looking at the source of the tweet, which will identify twitterfeed (or a similar service) as the originator.
It was found that users respond to news stories and blog posts in identical manner, making them difficult to distinguish. Generally, the type of information contained in these two sources is also very similar. Therefore, for classification purposes, these may be put in the same category of newsworthy content.
Advertisements are mostly located in the lower half of the figure, although successful advertisements that capture public interest are indistinguishable from newsworthy content. Unsuccessful campaigns that are driven by a few dedicated zealots are in their own cluster with high time interval and low user entropy, but successful campaigns are also indistinguishable from newsworthy content.
The distribution of distinct time intervals and users involved in the retweeting activity gives a good characterization of the retweeting activity. As explained in Section 3, temporal and user entropy are used to quantify these distributions. Temporal entropy is maximum when the time intervals between any two successive retweets is different. User entropy is maximum when each user retweets the message only once. Next, using temporal and user entropies as features, the retweeting activity represented by a trace TjεT may be classified. Both unsupervised and supervised classification was performed. The data is manually labeled to train the supervised classifier and to evaluate the performance of the classification techniques. Weka software library (www.cs.waikato.ac.nz/ml/weak) was used for off-the-shelf implementation of EM (expectation maximization), A. Dempster, N. Laird, and D. Rubin, “Maximum likelihood from incomplete data via the EM algorithm”, Royal statistical Society B, 39:1, 38, 1977), k-NN (k-nearest neighbors) and SVM(support vector machines, B. E. Boser, I. M. Guyon, and V. N. Vapnik, “A training algorithm for optimal margin classifiers”, In Proceedings of the Fifth annual workshop on Computational learning theory, COLT '92, pages 144, 152, New York, N.Y., USA, 1992. ACM) classification.
Support Vector Machine was used with radial basis function (RBF) kernel and k-NN algorithm with three nearest neighbors and Euclidean distance function to classify the data. Table 1 reports results of 10-fold cross validation in each model was trained on 90% of the labeled data and tested on the remaining 10%. The F-scores of both algorithms are relatively high, showing that they have well separated instances into different classes.
Expectation Maximization (EM) algorithm was used to automatically cluster points. EM uses Gaussian mixture model and can decide how many clusters to create by cross validation. The number of clusters determined automatically by this method was nine.
Broadly speaking, five classes of retweeting activity and associated content on Twitter were identified.
As can be seen from the results, almost all methods classify automatic or robotic retweeting (auto-tweet) with high accuracy. Some of such activity in the data set is related to technology news stories. Their user entropy is similar to that of other news stories. However, such activity has a much lower time interval entropy than other news stories.
Two primary kind of automated services that were identified are auto-tweeting services and tweet-scheduling services. There are two categories of auto-tweeting activities.
The first arises when an individual subscribes to an automatic service that tweets messages on the user's profile on his behalf. One such automatic service is Twitterfeed (www.twitterfeed.com), through which the user can subscribe to a blog or news website (any service with an RSS feed). Twitter users employ this service to automatically retweet stories posted on technology news sites Mashable and TechCrunch. This leads to individual auto-tweets observed from the profile of that user.
However, this auto-tweeting feature is also being used for promotional and perhaps phishing activities. For example, a fan site (http://bieberinsanityblog.blogspot.com/) for Justin Bieber asks fans to provide their Twitter account information. The site is powered by Twitterfeed, and then auto-tweets Justin Bieber news from the profiles of registered fans, resulting in collective auto-tweeting.
Services like Tweet-u-later (http://www.tweet-u-later.com/) and Hootsuite can be used to schedule tweeting activities. These websites can be used for spamming. Registering a collection of profiles to these websites and scheduling the a tweet to posted repeatedly, enables spammers to post the same message multiple times.
Since the method described herein can differentiate human activity from bot or automated activity, marketing companies may be identified which engage automated services to increase their visibility on Twitter. Such services include OperationWeb (http://www.operationweb.com/) and TweetMaster (http://tweetmaster.tk/), which claim that they “will tweet your ad or message on my Twitter accounts that add up to over 170 thousand followers 2-6 times per day for 30 days.”
Most of these services use bots or automated services to push up the perceived visibility of the advertisements. To increase visibility they need a large number of profiles. To gain access to a large number of profiles, such services ask users to register, set their own prices for tweets and feature the sponsored tweets in their profile. In this way these services create a win-win situation, helping companies to promote their product and users to make money by featuring sponsored messages on their profiles.
This class comprises of mostly news and blogs and some successful campaigns. Newsworthy information is characterized by comparable (usually high) user and temporal entropy. Since people, not bots, are involved in disseminating such content, we call this “human response to information.” Both supervised and unsupervised clustering algorithms able to separate news and blogs, i.e., information sharing by humans, from the rest of retweeting activity with good accuracy (Tables 1, 3 and 2). However, EM algorithm with five classes breaks this class into smaller clusters (cluster0, cluster3 and cluster4). This is a meaningful subdivision based on popularity, with content in cluster3 being the most popular, content in cluster0 being normal content, and content in cluster4 having low popularity. When EM is allowed to automatically adjust the number of clusters, the popular clusters found by the earlier algorithm gets subdivided into two more classes giving five clusters of human response to information (cluster1, cluster3, cluster6, cluster7 and cluster8 in
Advertisements and promotions are distinguished by low user entropy and low to high temporal entropy. Supervised clustering is able to accurately detect advertisements and promotions (Table 1). Most spam-like advertisements fall in this section. These are unwanted advertisements which are never retweeted by any user besides the originator of the advertisement. EM algorithm with five classes also identifies a group comprising predominantly of advertisements. However, EM algorithm with automatic class detection, divides this group further into three classes: cluster0 comprising mostly of spam-like activity with very low user entropy (≈0), cluster2 containing advertisements with low user and medium time entropy, and cluster5 comprising of campaign-like promotions and advertisements with low user entropy and medium to high temporal entropy.
Campaigns are identified by low user entropy and very high temporal entropy. There are very few campaigns in the hand-labeled dataset. Even then, supervised algorithms are able to classify campaigns with a fair degree of accuracy (cf. Table 1). However, unsupervised algorithm merges campaigns with advertisements and promotions. Due to considerable overlap of characteristics of campaigns with advertisements or promotions, to distinguish a campaign from an advertisement is difficult, even for manual annotators. Note, that when a campaign is very successful like the one by silva_marina,
None of the methods were able to identify parasitic advertisements very accurately. One possible reason may be their parasitic nature, where they do not have a distinct characteristic feature of their own, but adopt the characteristics of the hosting user profile.
In order to make entropy values comparable, these values may be normalized. A variety of normalization procedures are available, depending on the application. Normalization may rescale values, so that they fall in the range of 0 and 1. When so normalized, values above 0.6 are considered to be high, above 0.8 to be very high, and below 0.4 to be low. The exact thresholds may be adjusted based on the specifics and needs of the application.
The dynamics of retweeting activity associated with some content on Twitter can be characterized by the entropy of the user and time interval distributions. These two features alone are able to separate user activity into different meaningful classes. The method may be computationally efficient and scalable, content and language independent, and robust to missing data.
Entropy-based classification can be used for spam detection, trend identification, trust management, user modeling, understanding intent and detecting suspicious activity on online social media. Five categories of retweeting activity on Twitter have been identified: newsworthy information dissemination, advertisements and promotions, campaigns, automatic or robotic activity and parasitic advertisements. Human response to news, blogs, and celebrity posts may be very similar. The entropy-based classification method enables characterization of user activity and helps to understand user-generated content and separate popular content from normal or unpopular content.
This analysis may be applied to larger datasets and other online social media. There has been a gradual emergence of sophisticated spamming and birth of an alternate industry to manipulate content on Twitter like promotional activities to improve the perceived popularity of stars. H. Kwak, C. Lee, H. Park, and S. Moon, “What is Twitter, a social network or a news media?”, In Proceedings of the 19th international conference on World wide web, WWW '10, pages 591-600, New York, N.Y., USA, 2010, ACM, had asked an important question—What is Twitter, a Social Network or a News Media? An analysis of Twitter shows that it is not only both a social network but much more—the diversity of twitter activity is a reflection of complexity of collective user dynamics on online social media.
A computer system containing a program of instructions may be configured to make the various diversity determinations, including when using entropy, and the various content classifications that have now been discussed. The computer system includes one or more processors, tangible memories (e.g., random access memories (RAMs), read-only memories (ROMs), and/or programmable read only memories (PROMS)), tangible storage devices (e.g., hard disk drives, CD/DVD drives, and/or flash memories), system buses, video processing components, network communication components, input/output ports, and/or user interface devices (e.g., keyboards, pointing devices, displays, microphones, sound reproduction systems, and/or touch screens). The computer system may include one or more computers at the same or different locations. When at different locations, the computers may be configured to communicate with one another through a wired and/or wireless network communication system.
Each computer system may include software (e.g., one or more operating systems, device drivers, application programs, and/or communication programs). When software is included, the software includes programming instructions and may include associated data and libraries. When included, the programming instructions are configured to implement one or more algorithms that implement one or more of the functions of the computer system, as recited herein. The description of each function that is performed by each computer system also constitutes a description of the algorithm(s) that performs that function.
The software may be stored on or in one or more non-transitory, tangible storage devices, such as one or more hard disk drives, CDs, DVDs, and/or flash memories. The software may be in source code and/or object code format. Associated data may be stored in any type of volatile and/or non-volatile memory. The software may be loaded into a non-transitory memory and executed by one or more processors.
The components, steps, features, objects, benefits, and advantages that have been discussed are merely illustrative. None of them, nor the discussions relating to them, are intended to limit the scope of protection in any way. Numerous other embodiments are also contemplated. These include embodiments that have fewer, additional, and/or different components, steps, features, objects, benefits, and advantages. These also include embodiments in which the components and/or steps are arranged and/or ordered differently.
For example, other measures could replace entropy in quantifying the amount of diversity, such as the Gini coefficient [http://en.wikipedia.org/wiki/Gini_coefficient], or the modified coefficient of variation [Allison, P. D. (1980). Inequality and scientific productivity. Social Studies of Science, 10(2):163-179.]
Unless otherwise stated, all measurements, values, ratings, positions, magnitudes, sizes, and other specifications that are set forth in this specification, including in the claims that follow, are approximate, not exact. They are intended to have a reasonable range that is consistent with the functions to which they relate and with what is customary in the art to which they pertain.
All articles, patents, patent applications, and other publications that have been cited in this disclosure are incorporated herein by reference.
The phrase “means for” when used in a claim is intended to and should be interpreted to embrace the corresponding structures and materials that have been described and their equivalents. Similarly, the phrase “step for” when used in a claim is intended to and should be interpreted to embrace the corresponding acts that have been described and their equivalents. The absence of these phrases from a claim means that the claim is not intended to and should not be interpreted to be limited to these corresponding structures, materials, or acts, or to their equivalents.
The scope of protection is limited solely by the claims that now follow. That scope is intended and should be interpreted to be as broad as is consistent with the ordinary meaning of the language that is used in the claims when interpreted in light of this specification and the prosecution history that follows, except where specific meanings have been set forth, and to encompass all structural and functional equivalents.
Relational terms such as “first” and “second” and the like may be used solely to distinguish one entity or action from another, without necessarily requiring or implying any actual relationship or order between them. The terms “comprises,” “comprising,” and any other variation thereof when used in connection with a list of elements in the specification or claims are intended to indicate that the list is not exclusive and that other elements may be included. Similarly, an element preceded by an “a” or an “an” does not, without further constraints, preclude the existence of additional elements of the identical type.
None of the claims are intended to embrace subject matter that fails to satisfy the requirement of Sections 101, 102, or 103 of the Patent Act, nor should they be interpreted in such a way. Any unintended coverage of such subject matter is hereby disclaimed. Except as just stated in this paragraph, nothing that has been stated or illustrated is intended or should be interpreted to cause a dedication of any component, step, feature, object, benefit, advantage, or equivalent to the public, regardless of whether it is or is not recited in the claims.
The abstract is provided to help the reader quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, various features in the foregoing detailed description are grouped together in various embodiments to streamline the disclosure. This method of disclosure should not be interpreted as requiring claimed embodiments to require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus, the following claims are hereby incorporated into the detailed description, with each claim standing on its own as separately claimed subject matter.
This application is based upon and claims priority to U.S. provisional patent application 61/652,982, entitled “INFORMATION-THEORETIC METHOD TO IDENTIFY SPAM IN SOCIAL MEDIA,” filed May 30, 2012, attorney docket number 028080-0750. The entire content of this application is incorporated herein by reference.
This invention was made with government support under Grant No. FA9550-10-1-0102, 1295 G NA276, awarded by Air Force Office of Scientific Research, and under Grant No. IIS-0968370, awarded by the National Science Foundation. The government has certain rights in the invention.