Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- keynoteApril 2016
La Sécurité Ouverte How We Doin? So Far?
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Page 5https://doi.org/10.1145/2872427.2883583Open has meant a lot of things in the web thus far. The openness of the web has had profound implications for web security, from the beginning through to today. Each time the underlying web technology changes, we do a reset on the security it provides. ...
- research-articleApril 2016
A Robust Framework for Estimating Linguistic Alignment in Twitter Conversations
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 637–648https://doi.org/10.1145/2872427.2883091When people talk, they tend to adopt the behaviors, gestures, and language of their conversational partners. This "accommodation" to one's partners is largely automatic, but the degree to which it occurs is influenced by social factors, such as gender, ...
- research-articleApril 2016
Modeling User Exposure in Recommendation
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 951–961https://doi.org/10.1145/2872427.2883090Collaborative filtering analyzes user preferences for items (e.g., books, movies, restaurants, academic papers) by exploiting the similarity patterns across users. In implicit feedback settings, all the items, including the ones that a user did not ...
- research-articleApril 2016
Disinformation on the Web: Impact, Characteristics, and Detection of Wikipedia Hoaxes
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 591–602https://doi.org/10.1145/2872427.2883085Wikipedia is a major source of information for many people. However, false information on Wikipedia raises concerns about its credibility. One way in which false information may be presented on Wikipedia is in the form of hoax articles, i.e., articles ...
- research-articleApril 2016
Discovery of Topical Authorities in Instagram
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 1203–1213https://doi.org/10.1145/2872427.2883078Instagram has more than 400 million monthly active accounts who share more than 80 million pictures and videos daily. This large volume of user-generated content is the application's notable strength, but also makes the problem of finding the ...
-
- research-articleApril 2016
Gender, Productivity, and Prestige in Computer Science Faculty Hiring Networks
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 1169–1179https://doi.org/10.1145/2872427.2883073Women are dramatically underrepresented in computer science at all levels in academia and account for just 15% of tenure-track faculty. Understanding the causes of this gender imbalance would inform both policies intended to rectify it and employment ...
- research-articleApril 2016
A Field Guide to Personalized Reserve Prices
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 1093–1102https://doi.org/10.1145/2872427.2883071We study the question of setting and testing reserve prices in single item auctions when the bidders are not identical. At a high level, there are two generalizations of the standard second price auction: in the lazy version we first determine the ...
- research-articleApril 2016
Using Hierarchical Skills for Optimized Task Assignment in Knowledge-Intensive Crowdsourcing
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 843–853https://doi.org/10.1145/2872427.2883070Besides the simple human intelligence tasks such as image labeling, crowdsourcing platforms propose more and more tasks that require very specific skills, especially in participative science projects. In this context, there is a need to reason about the ...
- research-articleApril 2016
Learning Global Term Weights for Content-based Recommender Systems
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 391–400https://doi.org/10.1145/2872427.2883069Recommender systems typically leverage two types of signals to effectively recommend items to users: user activities and content matching between user and item profiles, and recommendation models in literature are usually categorized into collaborative ...
- research-articleApril 2016
Measuring Urban Social Diversity Using Interconnected Geo-Social Networks
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 21–30https://doi.org/10.1145/2872427.2883065Large metropolitan cities bring together diverse individuals, creating opportunities for cultural and intellectual exchanges, which can ultimately lead to social and economic enrichment. In this work, we present a novel network perspective on the ...
- research-articleApril 2016
Social Networks Under Stress
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 9–20https://doi.org/10.1145/2872427.2883063Social network research has begun to take advantage of fine-grained communications regarding coordination, decision-making, and knowledge sharing. These studies, however, have not generally analyzed how external events are associated with a social ...
- research-articleApril 2016
Abusive Language Detection in Online User Content
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 145–153https://doi.org/10.1145/2872427.2883062Detection of abusive language in user generated online content has become an issue of increasing importance in recent years. Most current commercial methods make use of blacklists and regular expressions, however these measures fall short when ...
- research-articleApril 2016
TribeFlow: Mining & Predicting User Trajectories
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 695–706https://doi.org/10.1145/2872427.2883059Which song will Smith listen to next? Which restaurant will Alice go to tomorrow? Which product will John click next? These applications have in common the prediction of user trajectories that are in a constant state of flux over a hidden network (e.g. ...
- research-articleApril 2016
Automatic Extraction of Indicators of Compromise for Web Applications
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 333–343https://doi.org/10.1145/2872427.2883056Indicators of Compromise (IOCs) are forensic artifacts that are used as signs that a system has been compromised by an attack or that it has been infected with a particular malicious software. In this paper we propose for the first time an automated ...
- research-articleApril 2016
Tweet Properly: Analyzing Deleted Tweets to Understand and Identify Regrettable Ones
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 603–612https://doi.org/10.1145/2872427.2883052Inappropriate tweets can cause severe damages on authors' reputation or privacy. However, many users do not realize the negative consequences until they publish these tweets. Published tweets have lasting effects that may not be eliminated by simple ...
- research-articleApril 2016
Which to View: Personalized Prioritization for Broadcast Emails
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 1181–1190https://doi.org/10.1145/2872427.2883049Email is one of the most important communication tools today, but email overload resulting from the large number of unimportant or irrelevant emails is causing trillion-level economy loss every year. Thus personalized email prioritization algorithms are ...
- research-articleApril 2016
On Sampling Nodes in a Network
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 471–481https://doi.org/10.1145/2872427.2883045Random walk is an important tool in many graph mining applications including estimating graph parameters, sampling portions of the graph, and extracting dense communities. In this paper we consider the problem of sampling nodes from a large graph ...
- research-articleApril 2016
The Effect of Recommendations on Network Structure
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 1157–1167https://doi.org/10.1145/2872427.2883040Online social networks regularly offer users personalized, algorithmic suggestions of whom to connect to. Here we examine the aggregate effects of such recommendations on network structure, focusing on whether these recommendations increase the ...
- research-articleApril 2016
PCT: Partial Co-Alignment of Social Networks
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 749–759https://doi.org/10.1145/2872427.2883038People nowadays usually participate in multiple online social networks simultaneously to enjoy more social network services. Besides the common users, social networks providing similar services can also share many other kinds of information entities, ...
- research-articleApril 2016
Ups and Downs: Modeling the Visual Evolution of Fashion Trends with One-Class Collaborative Filtering
WWW '16: Proceedings of the 25th International Conference on World Wide WebApril 2016, Pages 507–517https://doi.org/10.1145/2872427.2883037Building a successful recommender system depends on understanding both the dimensions of people's preferences as well as their dynamics. In certain domains, such as fashion, modeling such preferences can be incredibly difficult, due to the need to ...