Adam Wierzbicki

Orcid: 0000-0003-0075-7030

According to our database1, Adam Wierzbicki authored at least 122 papers between 1998 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Improving medical experts' efficiency of misinformation detection: an exploratory study.
World Wide Web (WWW), March, 2023

Using Cognitive Models to Understand and Counteract the Effect of Self-Induced Bias on Recommendation Algorithms.
J. Artif. Intell. Soft Comput. Res., March, 2023

DSHacker at SemEval-2023 Task 3: Genres and Persuasion Techniques Detection with Multilingual Data Augmentation through Machine Translation and Text Generation.
Proceedings of the The 17th International Workshop on Semantic Evaluation, 2023

An Adaptive Approach to Detecting Fake News Based on Generalized Text Features.
Proceedings of the 7th International Conference on Computational Linguistics and Intelligent Systems. Volume I: Machine Learning Workshop, 2023

DSHacker at CheckThat!-2023: Check-Worthiness in Multigenre and Multilingual Content With GPT-3.5 Data Augmentation.
Proceedings of the Working Notes of the Conference and Labs of the Evaluation Forum (CLEF 2023), 2023

2022
Tell Me How You Feel: Designing Emotion-Aware Voicebots to Ease Pandemic Anxiety In Aging Citizens.
CoRR, 2022

2021
Focus on Misinformation: Improving Medical Experts' Efficiency of Misinformation Detection.
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021

Cognitive Limitations of Older E-Commerce Customers in Product Comparison Tasks.
Proceedings of the Human-Computer Interaction - INTERACT 2021 - 18th IFIP TC 13 International Conference, Bari, Italy, August 30, 2021

Older Auctioneers: Performance of Older Users in On-Line Dutch Auctions.
Proceedings of the Human-Computer Interaction - INTERACT 2021 - 18th IFIP TC 13 International Conference, Bari, Italy, August 30, 2021

2020
Whom to Believe? Understanding and Modeling Brain Activity in Source Credibility Evaluation.
Frontiers Neuroinformatics, 2020

How You Say or What You Say? Neural Activity in Message Credibility Evaluation.
Proceedings of the Computational Science - ICCS 2020, 2020

Look Who's Talking: Modeling Decision Making Based on Source Credibility.
Proceedings of the Computational Science - ICCS 2020, 2020

Picking Peaches or Squeezing Lemons: Selecting Crowdsourcing Workers for Reducing Cost of Redundancy.
Proceedings of the Computational Science - ICCS 2020, 2020

True Or False: How Does Our Brain Decide About Truth?
Proceedings of the IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology, 2020

2019
Correction to: older adults and hackathons: a qualitative study.
Empir. Softw. Eng., 2019

Technologies for promoting social participation in later life.
CoRR, 2019

Lost in Online Stores? Agent-Based Modeling of Cognitive Limitations of Elderly Online Consumers.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2019

2018
Wikipedia Knowledge Community Modeling.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Computing controversy: Formal model and algorithms for detecting controversy on Wikipedia and in search queries.
Inf. Process. Manag., 2018

Surgical teams on GitHub: Modeling performance of GitHub project development processes.
Inf. Softw. Technol., 2018

Older adults and hackathons: a qualitative study.
Empir. Softw. Eng., 2018

Decomposition Algorithms for a Multi-Hard Problem.
Evol. Comput., 2018

Automatic Credibility Assessment of Popular Medical Articles Available Online.
Proceedings of the Social Informatics, 2018

Guidelines towards better participation of older adults in software development processes using a new SPIRAL method and participatory approach.
Proceedings of the 11th International Workshop on Cooperative and Human Aspects of Software Engineering, 2018

Web Content Credibility
Springer, ISBN: 978-3-319-77793-1, 2018

2017
Understanding and predicting Web content credibility using the Content Credibility Corpus.
Inf. Process. Manag., 2017

Precious Time: Understanding Social Stratification in the Knowledge Society Through Time Allocation.
CoRR, 2017

Turned 70?: it is time to start editing Wikipedia.
Proceedings of the International Conference on Web Intelligence, 2017

LivingLab PJAIT: towards better urban participation of seniors.
Proceedings of the International Conference on Web Intelligence, 2017

How to Train People to Increase Their Security Awareness in IT.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

2016
Web Content Classification Using Distributions of Subjective Quality Evaluations.
ACM Trans. Web, 2016

Report on the WebQuality 2015 Workshop.
SIGIR Forum, 2016

Verifying social network models of Wikipedia knowledge community.
Inf. Sci., 2016

Choose a Job You Love: Predicting Choices of GitHub Developers.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Credibility as Signal: Predicting Evaluations of Credibility by a Signal-Based Model.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

An Application of Rule-Induction Based Method in Psychological Measurement for Application in HCI Research.
Proceedings of the Social Informatics - 8th International Conference, 2016

Crowd Teaches the Machine: Reducing Cost of Crowd-Based Training of Machine Classifiers.
Proceedings of the Artificial Intelligence and Soft Computing, 2016

How to Support the Lay Users Evaluations of Medical Information on the Web?
Proceedings of the Human Interface and the Management of Information: Information, Design and Interaction, 2016

Multi-hard Problems in Uncertain Environment.
Proceedings of the 2016 on Genetic and Evolutionary Computation Conference, Denver, CO, USA, July 20, 2016

Cooperation Prediction in GitHub Developers Network with Restricted Boltzmann Machine.
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016

2015
Security Trade-Off and Energy Efficiency Analysis in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Towards a highly effective and robust Web credibility evaluation system.
Decis. Support Syst., 2015

On the Modelling of the Influence of Access Control Management to the System Security and Performance.
Proceedings of the ICEIS 2015, 2015

On the Balancing Security Against Performance in Database Systems.
Proceedings of the Computer Networks - 22nd International Conference, 2015

AQoPA: Automated Quality of Protection Analysis Framework for Complex Systems.
Proceedings of the Computer Information Systems and Industrial Management, 2015

2014
Wikipedia Knowledge Community Modeling.
Encyclopedia of Social Network Analysis and Mining, 2014

The Concept and Security Analysis of Wireless Sensor Network for Gas Lift in Oilwells.
Ann. UMCS Informatica, 2014

Studying Web Content Credibility by Social Simulation.
J. Artif. Soc. Soc. Simul., 2014

Predicting webpage credibility using linguistic features.
Proceedings of the 23rd International World Wide Web Conference, 2014

Incredible: is (almost) all web content trustworthy? analysis of psychological factors related to website credibility evaluation.
Proceedings of the 23rd International World Wide Web Conference, 2014

Exploratory Study of Relationships among Statement Credibility, Context, and Semantic Similarity.
Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), Warsaw, Poland, August 11-14, 2014, 2014

Credibility Microscope: Relating Web Page Credibility Evaluations to Their Textual Content.
Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), Warsaw, Poland, August 11-14, 2014, 2014

On the Effectiveness of Emergent Task Allocation of Virtual Programmer Teams.
Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), Warsaw, Poland, August 11-14, 2014, 2014

Hybrid Algorithm for Precise Recommendation from Almost Infinite Set of Websites.
Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), Warsaw, Poland, August 11-14, 2014, 2014

Application of TextRank Algorithm for Credibility Assessment.
Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), Warsaw, Poland, August 11-14, 2014, 2014

GitHub Projects. Quality Analysis of Open-Source Software.
Proceedings of the Social Informatics, 2014

Predicting Controversy of Wikipedia Articles Using the Article Feedback Tool.
Proceedings of the 2014 International Conference on Social Computing, Beijing, China, August 04, 2014

Modeling Impact of Social Stratification on the Basis of Time Allocation Heuristics in Society.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2014

Threats of Using Gamification for Motivating Web Page Quality Evaluation.
Proceedings of the 2014 Mulitmedia, 2014

On the Modelling of the Computer Security Impact on the Reputation Systems.
Proceedings of the Information and Communication Technology, 2014

Simulations of Credibility Evaluation and Learning in a Web 2.0 Community.
Proceedings of the Artificial Intelligence and Soft Computing, 2014

Analysis of Demographical Factors' Influence on Websites' Credibility Evaluation.
Proceedings of the Human-Computer Interaction. Applications and Services, 2014

Socially inspired algorithms for the travelling thief problem.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

2013
Collaborative Problem Solving in Emergency Situations: Lessons Learned from a Rescue Mission.
Proceedings of the Advanced Methods for Computational Collective Intelligence, 2013

Modeling Wikipedia admin elections using multidimensional behavioral social networks.
Soc. Netw. Anal. Min., 2013

Improving computational trust representation based on Internet auction traces.
Decis. Support Syst., 2013

Defending imitating attacks in web credibility evaluation systems.
Proceedings of the 22nd International World Wide Web Conference, 2013

On the subjectivity and bias of web content credibility evaluations.
Proceedings of the 22nd International World Wide Web Conference, 2013

Collective Memory in Poland: A Reflection in Street Names.
Proceedings of the Social Informatics, 2013

Temporal, Cultural and Thematic Aspects of Web Credibility.
Proceedings of the Social Informatics - 5th International Conference, 2013

On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Surprising Consequences of Simple Privacy Protection Method.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

Forecasting Online Advertising Campaigns in the Wild.
Proceedings of the Co-created Effective, Agile, and Trusted eServices, 2013

2012
On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML).
Ann. UMCS Informatica, 2012

Behavior Dynamics in Media-Sharing Social Networks <i>by H. Vicky Zhao, W. Sabrina Lin and K. J. Ray Liu</i>.
J. Artif. Soc. Soc. Simul., 2012

Game-theoretic models of web credibility.
Proceedings of the 2nd Joint WICOW/AIRWeb Workshop on Web Quality, 2012

2011
Fairness Emergence in Reputation Systems.
J. Artif. Soc. Soc. Simul., 2011

From Computational to Human Trust: Problems, Methods and Applications of Trust Management.
Proceedings of the Social Informatics - Third International Conference, SocInfo 2011, 2011

Social Mechanism of Granting Trust Basing on Polish Wikipedia Requests for Adminship.
Proceedings of the Social Informatics - Third International Conference, SocInfo 2011, 2011

Guiding P2P control traffic using DHTS.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

2010
Trust and Fairness in Open, Distributed Systems
Studies in Computational Intelligence 298, Springer, ISBN: 978-3-642-13450-0, 2010

Interdisciplinary Matchmaking: Choosing Collaborators by Skill, Acquaintance and Trust.
Proceedings of the Computational Social Network Analysis, 2010

Advanced Feedback Management for Internet Auction Reputation Systems.
IEEE Internet Comput., 2010

Spiral of hatred: social effects in Internet auctions. Between informativity and emotion.
Electron. Commer. Res., 2010

Learning about team collaboration from Wikipedia edit history.
Proceedings of the 6th International Symposium on Wikis and Open Collaboration, 2010

Efficient and Correct Trust Propagation Using CloseLook.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

Learning About the Quality of Teamwork from Wikiteams.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Using Stereotypes to Identify Risky Transactions in Internet Auctions.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Emotion Aware Mobile Application.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

2009
Mining online auction social networks for reputation and recommendation.
Control. Cybern., 2009

Spiral of Hatred: Social Effects in Buyer-Seller Cross-Comments Left on Internet Auctions.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

Enriching Trust Prediction Model in Social Network with User Rating Similarity.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2009

A Generic and Overlay-Agnostic Publish-Subscribe Protocol.
Proceedings of the First International Conference on Advances in P2P Systems, 2009

ProtoTrust: An Environment for Improved Trust Management in Internet Auctions.
Proceedings of the Advances in Databases and Information Systems, 2009

Comment Classification for Internet Auction Platforms.
Proceedings of the Advances in Databases and Information Systems, 2009

2008
Guest editors' introduction: Disruptive networking with peer-to-peer systems.
Comput. Commun., 2008

Guest editors' introduction: Foundation of peer-to-peer computing.
Comput. Commun., 2008

Fairness Emergence through Simple Reputation.
Proceedings of the Trust, 2008

Discovering the Most Trusted Agents without Central Control.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Integrated Support for Scientific Creativity.
Proceedings of the Creative Environments: Issues of Creativity Support for the Knowledge Civilization Age, 2007

Practical trust management without reputation in peer-to-peer games.
Multiagent Grid Syst., 2007

The Case for Fairness of Trust Management.
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007

Evaluating a New Reputation Algorithm With Consideration For Fairness.
Proceedings of the First International Conference on Emerging Security Information, 2007

Access Control Management in Open Distributed Virtual Repositories and the Grid.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Analyzing and Improving the Security of Internet Elections.
Proceedings of the ISSE/SECURE 2007, 2007

Fair Game-Theoretic Resource Management in Dedicated Grids.
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007

2006
The Sound of Silence: Mining Implicit Feedbacks to Compute Reputation.
Proceedings of the Internet and Network Economics, Second International Workshop, 2006

Trust Management without Reputation in P2P Games.
Proceedings of the SECRYPT 2006, 2006

Trust Enforcement in Peer-to-Peer Massive Multi-player Online Games.
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006

2005
A new authentication protocol for revocable anonymity in ad-hoc networks
CoRR, 2005

Authentication with controlled anonymity in P2P systems.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Peer-to-Peer Direct Sales.
Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August, 2005

Fair and Scalable Peer-to-Peer Games of Turns.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

2004
Cache replacement policies for P2P file sharing protocols.
Eur. Trans. Telecommun., 2004

Equitable aggregations and multiple criteria analysis.
Eur. J. Oper. Res., 2004

P2P Scrabble. Can P2P Games Commence?
Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P 2004), 2004

Cache replacement policies revisited: the case of P2P traffic.
Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), 2004

2003
Application-Oriented Evaluation of Measurement Estimation.
Proceedings of the Architectures for Quality of Service in the Internet, 2003

2002
Rhubarb: A Tool for Developing Scalable and Secure Peer-to-Peer Applications.
Proceedings of the 2nd International Conference on Peer-to-Peer Computing (P2P 2002), 2002

Internet Cache Location and Design of Content Delivery Networks.
Proceedings of the Web Engineering and Peer-to-Peer Computing, 2002

1998
A Distributed WWW Cache.
Comput. Networks, 1998

A Filtering Algorithm for Web Caches.
Comput. Networks, 1998


  Loading...