Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- keynoteOctober 2013
Scholarly big data: information extraction and data mining
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 1–2https://doi.org/10.1145/2505515.2527109Collections of scholarly documents are usually not thought of as big data. However, large collections of scholarly documents often have many millions of publications, authors, citations, equations, figures, etc., and large scale related data and ...
- abstractOctober 2013
Leveraging data to change industry paradigms
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 2209–2210https://doi.org/10.1145/2505515.2514694Much of the conversation on "big data" is centered on data technologies and analytics platforms and how established companies apply them. While those technologies and platforms are certainly very important for industry incumbents, data analytics is also ...
- demonstrationOctober 2013
READFAST: high-relevance search-engine for big text
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 2465–2468https://doi.org/10.1145/2505515.2508215Relevance of search-results is a key factor for any search engine. In order to return and rank the Web-pages that are most relevant to the query, contemporary search engines use complex ranking functions that depend on hundreds of features. For example, ...
- demonstrationOctober 2013
A tool for assisting provenance search in social media
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 2517–2520https://doi.org/10.1145/2505515.2508214In recent years, social media sites are witnessing an information explosion. Determining the reliability of such a large amount of information is a major area of research. Information provenance (aka, sources or origin) provides a way to measure the ...
- demonstrationOctober 2013
GeCo: an online personal data generator and corruptor
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 2473–2476https://doi.org/10.1145/2505515.2508207We demonstrate GeCo, an online personal data GEnerator and COrruptor that facilitates the creation of realistic personal data ranging from names, addresses, and dates, to social security and credit card numbers, as well as numerical values such as ...
-
- demonstrationOctober 2013
Detecting and exploring clusters in attributed graphs: a plugin for the gephi platform
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 2505–2508https://doi.org/10.1145/2505515.2508200Clustering graph data has gained much attention in recent years, as data represented as graphs is ubiquitous in today's applications. For many applications, besides the mere graph data also further information about the vertices of a graph is available, ...
- demonstrationOctober 2013
iNewsBox: modeling and exploiting implicit feedback for building personalized news radio
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 2485–2488https://doi.org/10.1145/2505515.2508199Online news reading has become the major method to know about the world as web provide more information than other media like TV and radio. However, traditional online news reading interface is inconvenient for many types of people, especially for those ...
- demonstrationOctober 2013
Consumer-centric SLA manager for cloud-hosted databases
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 2453–2456https://doi.org/10.1145/2505515.2508196We present an end-to-end framework for consumer-centric SLA management of virtualized database servers. The framework facilitates adaptive and dynamic provisioning of the database tier of the software applications based on application-defined policies ...
- posterOctober 2013
Exploiting trustors as well as trustees in trust-based recommendation
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 1893–1896https://doi.org/10.1145/2505515.2507889In a trust network, two users who are connected by a trust relationship tend to have similar interests. Based on this observation, existing trust-aware recommendation methods predict ratings for a target user on unseen items by referencing to ratings of ...
- posterOctober 2013
Early prediction on imbalanced multivariate time series
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 1889–1892https://doi.org/10.1145/2505515.2507888Multivariate time series (MTS) classification is an important topic in time series data mining, and lots of efficient models and techniques have been introduced to cope with it. However, early classification on imbalanced MTS data largely remains an ...
- posterOctober 2013
Interest mining from user tweets
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 1869–1872https://doi.org/10.1145/2505515.2507883We build a system to extract user interests from Twitter messages. Specifically, we extract interest candidates using linguistic patterns and rank them using four different keyphrase ranking techniques: TFIDF, TextRank, LDA-TextRank, and Relevance-...
- posterOctober 2013
Trustable aggregation of online ratings
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 1233–1236https://doi.org/10.1145/2505515.2507863The average of the customer ratings on the product, which we call reputation, is one of the key factors in online purchasing decision of a product. There is, however, no guarantee in the trustworthiness of the reputation since it can be manipulated ...
- posterOctober 2013
Dynamic query intent mining from a search log stream
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 1205–1208https://doi.org/10.1145/2505515.2507856It has long been recognized that search queries are often broad and ambiguous. Even when submitting the same query, different users may have different search intents. Moreover, the intents are dynamically evolving. Some intents are constantly popular ...
- posterOctober 2013
Software plagiarism detection: a graph-based approach
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 1577–1580https://doi.org/10.1145/2505515.2507848As plagiarism of software increases rapidly, there are growing needs for software plagiarism detection systems. In this paper, we propose a software plagiarism detection system using an API-labeled control flow graph (A-CFG) that abstracts the ...
- posterOctober 2013
Intelligent SSD: a turbo for big data mining
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 1573–1576https://doi.org/10.1145/2505515.2507847This paper introduces the notion of intelligent SSDs. First, we present the design considerations of intelligent SSDs, and then examine their potential benefits under various settings in data mining applications.
- posterOctober 2013
An unsupervised transfer learning approach to discover topics for online reputation management
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 1565–1568https://doi.org/10.1145/2505515.2507845Microblogs play an important role for Online Reputation Management. Companies and organizations in general have an increasing interest in obtaining the last minute information about which are the emerging topics that concern their reputation. In this ...
- posterOctober 2013
On exploiting content and citations together to compute similarity of scientific papers
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 1553–1556https://doi.org/10.1145/2505515.2507842In computing the similarity of scientific papers, previous text-based and link-based similarity measures look at only a single side of the content and citations. In this paper, we propose a novel approach called SimCC that effectively combines the ...
- posterOctober 2013
Discovering relations using matrix factorization methods
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 1549–1552https://doi.org/10.1145/2505515.2507841Traditional relation extraction methods work on manually defined relations and typically expect manually labelled extraction patterns for each relation. This strongly limits the scalability of these systems. In Open Relation Extraction (ORE), the ...
- posterOctober 2013
The essence of knowledge (bases) through entity rankings
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 1537–1540https://doi.org/10.1145/2505515.2507838We consider the task of automatically phrasing and computing top-k rankings over the information contained in common knowledge bases (KBs), such as YAGO or DBPedia. We assemble the thematic focus and ranking criteria of rankings by inspecting the ...
- posterOctober 2013
Incremental shared nearest neighbor density-based clustering
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementOctober 2013, Pages 1533–1536https://doi.org/10.1145/2505515.2507837Shared Nearest Neighbor Density-based clustering (SNN-DBSCAN) is a robust graph-based clustering algorithm and has wide applications from climate data analysis to network intrusion detection. We propose an incremental extension to this algorithm IncSNN-...