Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2011
A case for query by image and text content: searching computer help using screenshots and keywords
WWW '11: Proceedings of the 20th international conference on World wide webPages 775–784https://doi.org/10.1145/1963405.1963513The multimedia information retrieval community has dedicated extensive research effort to the problem of content-based image retrieval (CBIR). However, these systems find their main limitation in the difficulty of creating pictorial queries. As a result,...
- research-articleMarch 2011
we.b: the web of short urls
- Demetris Antoniades,
- Iasonas Polakis,
- Georgios Kontaxis,
- Elias Athanasopoulos,
- Sotiris Ioannidis,
- Evangelos P. Markatos,
- Thomas Karagiannis
WWW '11: Proceedings of the 20th international conference on World wide webPages 715–724https://doi.org/10.1145/1963405.1963505Short URLs have become ubiquitous. Especially popular within social networking services, short URLs have seen a significant increase in their usage over the past years, mostly due to Twitter's restriction of message length to 140 characters. In this ...
- research-articleMarch 2011
Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter
WWW '11: Proceedings of the 20th international conference on World wide webPages 695–704https://doi.org/10.1145/1963405.1963503There is a widespread intuitive sense that different kinds of information spread differently on-line, but it has been difficult to evaluate this question quantitatively since it requires a setting where many different kinds of information spread in a ...
- research-articleMarch 2011
Information credibility on twitter
WWW '11: Proceedings of the 20th international conference on World wide webPages 675–684https://doi.org/10.1145/1963405.1963500We analyze the information credibility of news propagated through Twitter, a popular microblogging service. Previous research has shown that most of the messages posted on Twitter are truthful, but the service is also used to spread misinformation and ...
- research-articleMarch 2011
Network bucket testing
WWW '11: Proceedings of the 20th international conference on World wide webPages 615–624https://doi.org/10.1145/1963405.1963492Bucket testing, also known as A/B testing, is a practice that is widely used by on-line sites with large audiences: in a simple version of the methodology, one evaluates a new feature on the site by exposing it to a very small fraction of the total user ...
-
- research-articleMarch 2011
Counting triangles and the curse of the last reducer
WWW '11: Proceedings of the 20th international conference on World wide webPages 607–614https://doi.org/10.1145/1963405.1963491The clustering coefficient of a node in a social network is a fundamental measure that quantifies how tightly-knit the community is around the node. Its computation can be reduced to counting the number of triangles incident on the particular node in ...
- research-articleMarch 2011
Layered label propagation: a multiresolution coordinate-free ordering for compressing social networks
WWW '11: Proceedings of the 20th international conference on World wide webPages 587–596https://doi.org/10.1145/1963405.1963488We continue the line of research on graph compression started with WebGraph, but we move our focus to the compression of social networks in a proper sense (e.g., LiveJournal): the approaches that have been used for a long time to compress web graphs ...
- research-articleMarch 2011
Efficient k-nearest neighbor graph construction for generic similarity measures
WWW '11: Proceedings of the 20th international conference on World wide webPages 577–586https://doi.org/10.1145/1963405.1963487K-Nearest Neighbor Graph (K-NNG) construction is an important operation with many web related applications, including collaborative filtering, similarity search, and many others in data mining and machine learning. Existing methods for K-NNG ...
- research-articleMarch 2011
Finding the bias and prestige of nodes in networks based on trust scores
WWW '11: Proceedings of the 20th international conference on World wide webPages 567–576https://doi.org/10.1145/1963405.1963485Many real-life graphs such as social networks and peer-to-peer networks capture the relationships among the nodes by using trust scores to label the edges. Important usage of such networks includes trust prediction, finding the most reliable or trusted ...
- research-articleMarch 2011
Like like alike: joint friendship and interest propagation in social networks
WWW '11: Proceedings of the 20th international conference on World wide webPages 537–546https://doi.org/10.1145/1963405.1963481Targeting interest to match a user with services (e.g. news, products, games, advertisements) and predicting friendship to build connections among users are two fundamental tasks for social network systems. In this paper, we show that the information ...
- research-articleMarch 2011
Modeling the temporal dynamics of social rating networks using bidirectional effects of social relations and rating patterns
WWW '11: Proceedings of the 20th international conference on World wide webPages 527–536https://doi.org/10.1145/1963405.1963480A social rating network (SRN) is a social network in which edges represent social relationships and users (nodes) express ratings on some of the given items. Such networks play an increasingly important role in reviewing websites such as Epinions.com or ...
- research-articleMarch 2011
We know who you followed last summer: inferring social link creation times in twitter
WWW '11: Proceedings of the 20th international conference on World wide webPages 517–526https://doi.org/10.1145/1963405.1963479Understanding a network's temporal evolution appears to require multiple observations of the graph over time. These often expensive repeated crawls are only able to answer questions about what happened from observation to observation, and not what ...
- research-articleMarch 2011
FACTO: a fact lookup engine based on web tables
WWW '11: Proceedings of the 20th international conference on World wide webPages 507–516https://doi.org/10.1145/1963405.1963477Recently answers for fact lookup queries have appeared on major search engines. For example, for the query Barack Obama date of birth Google directly shows "4 August 1961" above its regular results. In this paper, we describe FACTO, an end-to-end system ...
- research-articleMarch 2011
Efficiently evaluating graph constraints in content-based publish/subscribe
- Andrei Broder,
- Shirshanka Das,
- Marcus Fontoura,
- Bhaskar Ghosh,
- Vanja Josifovski,
- Jayavel Shanmugasundaram,
- Sergei Vassilvitskii
WWW '11: Proceedings of the 20th international conference on World wide webPages 497–506https://doi.org/10.1145/1963405.1963476We introduce the problem of evaluating graph constraints in content-based publish/subscribe (pub/sub) systems. This problem formulation extends traditional content-based pub/sub systems in the following manner: publishers and subscribers are connected ...
- research-articleMarch 2011
Inverted index compression via online document routing
WWW '11: Proceedings of the 20th international conference on World wide webPages 487–496https://doi.org/10.1145/1963405.1963475Modern search engines are expected to make documents searchable shortly after they appear on the ever changing Web. To satisfy this requirement, the Web is frequently crawled. Due to the sheer size of their indexes, search engines distribute the crawled ...
- research-articleMarch 2011
SCAD: collective discovery of attribute values
WWW '11: Proceedings of the 20th international conference on World wide webPages 447–456https://doi.org/10.1145/1963405.1963469Search engines today offer a rich user experience, no longer restricted to "ten blue links". For example, the query "Canon EOS Digital Camera" returns a photo of the digital camera, and a list of suitable merchants and prices. Similar results are ...
- research-articleMarch 2011
Highly efficient algorithms for structural clustering of large websites
WWW '11: Proceedings of the 20th international conference on World wide webPages 437–446https://doi.org/10.1145/1963405.1963468In this paper, we present a highly scalable algorithm for structurally clustering webpages for extraction. We show that, using only the URLs of the webpages and simple content features, it is possible to cluster webpages effectively and efficiently. At ...
- research-articleMarch 2011
SEISA: set expansion by iterative similarity aggregation
WWW '11: Proceedings of the 20th international conference on World wide webPages 427–436https://doi.org/10.1145/1963405.1963467In this paper, we study the problem of expanding a set of given seed entities into a more complete set by discovering other entities that also belong to the same concept set. A typical example is to use "Canon" and "Nikon" as seed entities, and derive ...
- research-articleMarch 2011
Evaluating new search engine configurations with pre-existing judgments and clicks
WWW '11: Proceedings of the 20th international conference on World wide webPages 397–406https://doi.org/10.1145/1963405.1963463We provide a novel method of evaluating search results, which allows us to combine existing editorial judgments with the relevance estimates generated by click-based user browsing models. There are evaluation methods in the literature that use clicks ...
- research-articleMarch 2011
Automatic construction of a context-aware sentiment lexicon: an optimization approach
WWW '11: Proceedings of the 20th international conference on World wide webPages 347–356https://doi.org/10.1145/1963405.1963456The explosion of Web opinion data has made essential the need for automatic tools to analyze and understand people's sentiments toward different topics. In most sentiment analysis applications, the sentiment lexicon plays a central role. However, it is ...