Skip to main content

Showing 1–11 of 11 results for author: Melton, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.15893  [pdf, other

    cs.SI

    Quantifying Influencer Impact on Affective Polarization

    Authors: Rezaur Rashid, Joshua Melton, Ouldouz Ghorbani, Siddharth Krishnan, Shannon Reid, Gabriel Terejanu

    Abstract: In today's digital age, social media platforms play a crucial role in shaping public opinion. This study explores how discussions led by influencers on Twitter, now known as 'X', affect public sentiment and contribute to online polarization. We developed a counterfactual framework to analyze the polarization scores of conversations in scenarios both with and without the presence of an influential… ▽ More

    Submitted 16 September, 2024; v1 submitted 24 May, 2024; originally announced May 2024.

    Comments: 8 pages, 4 figures

  2. arXiv:2404.10228  [pdf, other

    cs.LG cs.CL cs.SI

    Two-Stage Stance Labeling: User-Hashtag Heuristics with Graph Neural Networks

    Authors: Joshua Melton, Shannon Reid, Gabriel Terejanu, Siddharth Krishnan

    Abstract: The high volume and rapid evolution of content on social media present major challenges for studying the stance of social media users. In this work, we develop a two stage stance labeling method that utilizes the user-hashtag bipartite graph and the user-user interaction graph. In the first stage, a simple and efficient heuristic for stance labeling uses the user-hashtag bipartite graph to iterati… ▽ More

    Submitted 17 May, 2024; v1 submitted 15 April, 2024; originally announced April 2024.

  3. arXiv:2203.02744  [pdf, other

    cs.CR cs.LG

    Flurry: a Fast Framework for Reproducible Multi-layered Provenance Graph Representation Learning

    Authors: Maya Kapoor, Joshua Melton, Michael Ridenhour, Mahalavanya Sriram, Thomas Moyer, Siddharth Krishnan

    Abstract: Complex heterogeneous dynamic networks like knowledge graphs are powerful constructs that can be used in modeling data provenance from computer systems. From a security perspective, these attributed graphs enable causality analysis and tracing for analyzing a myriad of cyberattacks. However, there is a paucity in systematic development of pipelines that transform system executions and provenance i… ▽ More

    Submitted 5 March, 2022; originally announced March 2022.

    Comments: 10 pages, 5 figures

  4. arXiv:2203.01903  [pdf, other

    cs.LG

    Pay Attention to Relations: Multi-embeddings for Attributed Multiplex Networks

    Authors: Joshua Melton, Michael Ridenhour, Siddharth Krishnan

    Abstract: Graph Convolutional Neural Networks (GCNs) have become effective machine learning algorithms for many downstream network mining tasks such as node classification, link prediction, and community detection. However, most GCN methods have been developed for homogenous networks and are limited to a single embedding for each node. Complex systems, often represented by heterogeneous, multiplex networks… ▽ More

    Submitted 3 March, 2022; originally announced March 2022.

    Comments: 10 pages, 7 figures

    MSC Class: 68 ACM Class: I.2

  5. arXiv:2011.01861  [pdf, other

    cs.CL cs.LG

    DeL-haTE: A Deep Learning Tunable Ensemble for Hate Speech Detection

    Authors: Joshua Melton, Arunkumar Bagavathi, Siddharth Krishnan

    Abstract: Online hate speech on social media has become a fast-growing problem in recent times. Nefarious groups have developed large content delivery networks across several main-stream (Twitter and Facebook) and fringe (Gab, 4chan, 8chan, etc.) outlets to deliver cascades of hate messages directed both at individuals and communities. Thus addressing these issues has become a top priority for large-scale s… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

    Comments: Accepted at ICMLA20 Special Session: Machine Learning for Natural Language Processing

    ACM Class: I.2.7

  6. arXiv:1802.04143  [pdf

    cs.CY cs.HC cs.SI

    The Fundamentals of Policy Crowdsourcing

    Authors: John Prpic, Araz Taeihagh, James Melton

    Abstract: What is the state of the research on crowdsourcing for policy making? This article begins to answer this question by collecting, categorizing, and situating an extensive body of the extant research investigating policy crowdsourcing, within a new framework built on fundamental typologies from each field. We first define seven universal characteristics of the three general crowdsourcing techniques… ▽ More

    Submitted 8 February, 2018; originally announced February 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1702.04213

    Journal ref: Policy & Internet, 7: 340-361 (2015)

  7. MOOCs and Crowdsourcing: Massive Courses and Massive Resources

    Authors: John Prpic, James Melton, Araz Taeihagh, Terry Anderson

    Abstract: Premised upon the observation that MOOC and crowdsourcing phenomena share several important characteristics, including IT mediation, large-scale human participation, and varying levels of openness to participants, this work systematizes a comparison of MOOC and crowdsourcing phenomena along these salient dimensions. In doing so, we learn that both domains share further common traits, including sim… ▽ More

    Submitted 10 February, 2017; originally announced February 2017.

    Comments: First Monday, Volume 20, Issue 12, December 2015

    Journal ref: First Monday, Volume 20, Issue 12, December 2015

  8. arXiv:1702.04219  [pdf

    cs.CY cs.HC

    Experiments on Crowdsourcing Policy Assessment

    Authors: J. Prpic, A. Taeihagh, J. Melton

    Abstract: Can Crowds serve as useful allies in policy design? How do non-expert Crowds perform relative to experts in the assessment of policy measures? Does the geographic location of non-expert Crowds, with relevance to the policy context, alter the performance of non-experts Crowds in the assessment of policy measures? In this work, we investigate these questions by undertaking experiments designed to re… ▽ More

    Submitted 10 February, 2017; originally announced February 2017.

    Comments: Oxford Internet Institute, University of Oxford - IPP 2014 - Crowdsourcing for Politics and Policy

  9. arXiv:1702.04215  [pdf

    cs.CY cs.HC

    Crowdsourcing the Policy Cycle

    Authors: J. Prpic, A. Taeihagh, J. Melton

    Abstract: Crowdsourcing is beginning to be used for policymaking. The wisdom of crowds [Surowiecki 2005], and crowdsourcing [Brabham 2008], are seen as new avenues that can shape all kinds of policy, from transportation policy [Nash 2009] to urban planning [Seltzer and Mahmoudi 2013], to climate policy. In general, many have high expectations for positive outcomes with crowdsourcing, and based on both anecd… ▽ More

    Submitted 10 February, 2017; originally announced February 2017.

    Comments: Collective Intelligence 2014, MIT Center for Collective Intelligence

  10. arXiv:1702.04213  [pdf

    cs.CY cs.HC

    A Framework for Policy Crowdsourcing

    Authors: J. Prpic, A. Taeihagh, J. Melton

    Abstract: What is the state of the literature in respect to Crowdsourcing for policy making? This work attempts to answer this question by collecting, categorizing, and situating the extant research investigating Crowdsourcing for policy, within the broader Crowdsourcing literature. To do so, the work first extends the Crowdsourcing literature by introducing, defining, explaining, and using seven universal… ▽ More

    Submitted 10 February, 2017; originally announced February 2017.

    Comments: Oxford Internet Institute, University of Oxford - IPP 2014 - Crowdsourcing for Politics and Policy

  11. arXiv:cs/0701157  [pdf

    cs.DB

    A Critique of ANSI SQL Isolation Levels

    Authors: Hal Berenson, Phil Bernstein, Jim Gray, Jim Melton, Elizabeth O'Neil, Patrick O'Neil

    Abstract: ANSI SQL-92 defines Isolation Levels in terms of phenomena: Dirty Reads, Non-Repeatable Reads, and Phantoms. This paper shows that these phenomena and the ANSI SQL definitions fail to characterize several popular isolation levels, including the standard locking implementations of the levels. Investigating the ambiguities of the phenomena leads to clearer definitions; in addition new phenomena th… ▽ More

    Submitted 25 January, 2007; originally announced January 2007.

    Report number: MSR-TR-95-51

    Journal ref: Proc. ACM SIGMOD 95, pp. 1-10, San Jose CA, June 1995