Abstract
Reviewing conference submissions is both labour-intensive and diffuse. A lack of focus leads to reviewers spending much of their scarce time on papers which will not be accepted, which can prevent them from identifying several classes of problems with papers that will be. We identify opportunities for automation in the review process and propose protocols which allow human reviewers to better focus their limited time and attention, making it easier to select only the best “genetic” material to incorporate into their conference’s “DNA.” Some of the protocols that we propose are difficult to “game” without uneconomic investment on the part of the attacker, and successfully attacking others requires attackers to provide a positive social benefit to the wider research community.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Geer, D.J.: Monopoly considered harmful. IEEE Security & Privacy 1(6), 14–17 (2003)
Kessler, M.: An experimental study of bibliographic coupling between technical papers. IEEE Transactions on Information Theory 9(1), 49–51 (1963)
Pearson, K.: On lines and planes of closest fit to systems of space. Philosophical Magazine 2(11), 559–572 (1901)
Simkin, M.V., Roychowdhury, V.P.: A Mathematical Theory of Citing. Journal of the American Society for Information Science and Technology 58(11) (2007)
Stamp, M.: Risks of monoculture. Communications of the ACM 47(3) ( March 2004)
Tang, J., Zhang, D., Yao, L.: Social Network Extraction of Academic Researchers. In: Seventh IEEE International Conference on Data Mining (ICDM), pp. 292–301 (2007)
Tang, J., Zhang, J., Yao, L., Li, J., Zhang, L., Su, Z.: ArnetMiner: extraction and mining of academic social networks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD). ACM (August 2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Anderson, J., Stajano, F., Watson, R.N.M. (2011). How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort). In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds) Security Protocols XIX. Security Protocols 2011. Lecture Notes in Computer Science, vol 7114. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25867-1_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-25867-1_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25866-4
Online ISBN: 978-3-642-25867-1
eBook Packages: Computer ScienceComputer Science (R0)