Bhaskar Mehta

Learn More
Email spam is a much studied topic, but even though current email spam detecting software has been gaining a competitive edge against text based email spam, new advances in spam generation have posed a new challenge: image-based spam. Image based spam is email which includes embedded images containing the spam messages, but in binary format. In this paper,(More)
Collaborative filtering systems are essentially social systems which base their recommendation on the judgment of a large number of people. However, like other social systems, they are also vulnerable to manipulation by malicious social elements. Lies and Propaganda may be spread by a malicious user who may have an interest in promoting an item, or(More)
Collaborative Filtering systems are essentially social systems which base their recommendation on the judgment of a large number of people. However, like other social systems, they are also vulnerable to manipulation by malicious social elements. <i>Lies and Propaganda</i> may be spread by a malicious user who may have an interest in promoting an item, or(More)
The widespread deployment of recommender systems has lead to user feedback of varying quality. While some users faithfully express their true opinion, many provide noisy ratings which can be detrimental to the quality of the generated recommendations. The presence of noise can violate modeling assumptions and may thus lead to instabilities in estimation and(More)
The widespread deployment of recommender systems has lead to user feedback of varying quality. While some users faithfully express their true opinion, many provide noisy ratings which can be detrimental to the quality of the generated recommendations. The presence of noise can violate modeling assumptions and may thus lead to instabilities in estimation and(More)
Collaborative Filtering systems are essentially social systems which base their recommendation on the judgment of a large number of people. However, like other social systems, they are also vulnerable to manipulation. Lies and Propaganda may be spread by malicious users who may have an interest in promoting an item, or downplaying the popularity of another(More)
Personalization is an established method for reducing information overload and facilitating targeted access to relevant information objects in an information system. However, the use of the information collected about a user and his current context in a user profile is traditionally restricted to a single system, although many user tasks require information(More)
Current developments on Service-oriented Architectures, Peer-to-Peer and Grid computing promise more open and flexible architectures for digital libraries. They will open DL technology to a wider clientele, allow faster adaptability and enable the usage of federative models on content and service provision. These technologies rise new challenges for the(More)
Mediating between available information objects and individual information needs is a central issue within the functionality of a digital library. In the simplest case this is an information request answered by a search engine based on an analysis of information objects within the digital library’s information collection. However, neither the information(More)