Blog credibility ranking by exploiting verified content

  • Andreas Juffinger, Michael Granitzer, Elisabeth Lex
  • January 2009, ACM (Association for Computing Machinery)
  • DOI: 10.1145/1526993.1527005

The authors haven't finished explaining this publication. If you are the author, sign in to claim or explain your work.

Read Publication

http://dx.doi.org/10.1145/1526993.1527005

The following have contributed to this page: Dr Elisabeth Lex

In partnership with: