Anton Borg

Learn More
Influential users play an important role in online social networks since users tend to have an impact on one other. Therefore, the proposed work analyzes users and their behavior in order to identify influential users and predict user participation. Normally, the success of a social media site is dependent on the activity level of the participating users.(More)
Autoimmune haemolytic anaemia is not a well-recognised complication of sarcoidosis. We describe the case of a 30-year-old female who presented with acute warm haemolytic anaemia and widespread lymphadenopathy. Sarcoidosis was diagnosed on lymph node biopsy and further investigation. The haemolytic anaemia responded only to a high dose of steroids. Evidence(More)
Clustering algorithms have been used to divide genes into groups according to the degree of their expression similarity. Such a grouping may suggest that the respective genes are correlated and/or co-regulated, and subsequently indicates that the genes could possibly share a common biological role. In this paper , four clustering algorithms are(More)
—Spyware detection can be achieved by using machine learning techniques that identify patterns in the End User License Agreements (EULAs) presented by application installers. However, solutions have required manual input from the user with varying degrees of accuracy. We have implemented an automatic prototype for extraction and classification and used it(More)
—— Today, there are difficulties finding all malicious programs due to juridical restrictions and deficits concerning the anti-malicious programs. Also, a “ " grey-zone” " of questionable programs exists, hard for different protection programs to handle and almost impossible for a single user to judge. A software reputation system consisting of expert,(More)
  • 1