Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 12, Issue 3June 2018
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:1556-4681
EISSN:1556-472X
Reflects downloads up to 15 Jan 2025Bibliometrics
Skip Table Of Content Section
research-article
Enhancing Reputation via Price Discounts in E-Commerce Systems: A Data-Driven Approach
Article No.: 26, Pages 1–29https://doi.org/10.1145/3154417

Reputation systems have become an indispensable component of modern E-commerce systems, as they help buyers make informed decisions in choosing trustworthy sellers. To attract buyers and increase the transaction volume, sellers need to earn reasonably ...

research-article
G-RoI: Automatic Region-of-Interest Detection Driven by Geotagged Social Media Data
Article No.: 27, Pages 1–22https://doi.org/10.1145/3154411

Geotagged data gathered from social media can be used to discover interesting locations visited by users called Places-of-Interest (PoIs). Since a PoI is generally identified by the geographical coordinates of a single point, it is hard to match it with ...

research-article
Public Access
Fast, Accurate, and Flexible Algorithms for Dense Subtensor Mining
Article No.: 28, Pages 1–30https://doi.org/10.1145/3154414

Given a large-scale and high-order tensor, how can we detect dense subtensors in it? Can we spot them in near-linear time but with quality guarantees? Extensive previous work has shown that dense subtensors, as well as dense subgraphs, indicate ...

research-article
Public Access
Prioritized Relationship Analysis in Heterogeneous Information Networks
Article No.: 29, Pages 1–27https://doi.org/10.1145/3154401

An increasing number of applications are modeled and analyzed in network form, where nodes represent entities of interest and edges represent interactions or relationships between entities. Commonly, such relationship analysis tools assume homogeneity ...

research-article
Will Triadic Closure Strengthen Ties in Social Networks?
Article No.: 30, Pages 1–25https://doi.org/10.1145/3154399

The social triad—a group of three people—is one of the simplest and most fundamental social groups. Extensive network and social theories have been developed to understand its structure, such as triadic closure and social balance. Over the course of a ...

research-article
Large-Scale Bayesian Probabilistic Matrix Factorization with Memo-Free Distributed Variational Inference
Article No.: 31, Pages 1–24https://doi.org/10.1145/3161886

Bayesian Probabilistic Matrix Factorization (BPMF) is a powerful model in many dyadic data prediction problems, especially the applications of Recommender system. However, its poor scalability has limited its wide applications on massive data. Based on ...

research-article
Multi-View Low-Rank Analysis with Applications to Outlier Detection
Article No.: 32, Pages 1–22https://doi.org/10.1145/3168363

Detecting outliers or anomalies is a fundamental problem in various machine learning and data mining applications. Conventional outlier detection algorithms are mainly designed for single-view data. Nowadays, data can be easily collected from multiple ...

research-article
Public Access
ProgressER: Adaptive Progressive Approach to Relational Entity Resolution
Article No.: 33, Pages 1–45https://doi.org/10.1145/3154410

Entity resolution (ER) is the process of identifying which entities in a dataset refer to the same real-world object. In relational ER, the dataset consists of multiple entity-sets and relationships among them. Such relationships cause the resolution of ...

research-article
Twitter Geolocation: A Hybrid Approach
Article No.: 34, Pages 1–17https://doi.org/10.1145/3178112

Geotagging Twitter messages is an important tool for event detection and enrichment. Despite the availability of both social media content and user network information, these two features are generally utilized separately in the methodology. In this ...

research-article
Public Access
Tied Kronecker Product Graph Models to Capture Variance in Network Populations
Article No.: 35, Pages 1–40https://doi.org/10.1145/3161885

Much of the past work on mining and modeling networks has focused on understanding the observed properties of single example graphs. However, in many real-life applications it is important to characterize the structure of populations of graphs. In this ...

research-article
Public Access
Function-on-Function Regression with Mode-Sparsity Regularization
Article No.: 36, Pages 1–23https://doi.org/10.1145/3178113

Functional data is ubiquitous in many domains, such as healthcare, social media, manufacturing process, sensor networks, and so on. The goal of function-on-function regression is to build a mapping from functional predictors to functional response. In ...

research-article
Continuous-Time User Modeling in Presence of Badges: A Probabilistic Approach
Article No.: 37, Pages 1–30https://doi.org/10.1145/3162050

User modeling plays an important role in delivering customized web services to the users and improving their engagement. However, most user models in the literature do not explicitly consider the temporal behavior of users. More recently, continuous-...

research-article
Mining Event-Oriented Topics in Microblog Stream with Unsupervised Multi-View Hierarchical Embedding
Article No.: 38, Pages 1–26https://doi.org/10.1145/3173044

This article presents an unsupervised multi-view hierarchical embedding (UMHE) framework to sufficiently reveal the intrinsic topical knowledge in social events. Event-oriented topics are highly related to such events as it can provide explicit ...

Subjects

Comments