Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
A Field Guide to Personalized Reserve Prices Renato Paes Leme, Martin Pál, Sergei Vassilvitskii |
A Field Guide to Personalized Reserve Prices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Study of Retrieval Models for Long Documents and Queries in Information Retrieval Ronan Cummins |
A Study of Retrieval Models for Long Documents and Queries in Information Retrieval Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
IncApprox: A Data Analytics System for Incremental Approximate Computing Dhanya R. Krishnan, Do Le Quoc, Pramod Bhatotia, Christof Fetzer, Rodrigo Rodrigues |
IncApprox: A Data Analytics System for Incremental Approximate Computing Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
What Links Alice and Bob?: Matching and Ranking Semantic Patterns in Heterogeneous Networks Jiongqian Liang, Deepak Ajwani, Patrick K. Nicholson, Alessandra Sala, Srinivasan Parthasarathy |
What Links Alice and Bob?: Matching and Ranking Semantic Patterns in Heterogeneous Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Behavior Driven Topic Transition for Search Task Identification Liangda Li, Hongbo Deng, Yunlong He, Anlei Dong, Yi Chang, Hongyuan Zha |
Behavior Driven Topic Transition for Search Task Identification Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Case for Robotic Wireless Networks Mahanth Gowda, Ashutosh Dhekne, Romit Roy Choudhury |
The Case for Robotic Wireless Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Modeling User Consumption Sequences Austin R. Benson, Ravi Kumar, Andrew Tomkins |
Modeling User Consumption Sequences Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MapWatch: Detecting and Monitoring International Border Personalization on Online Maps Gary Soeller, Karrie Karahalios, Christian Sandvig, Christo Wilson |
MapWatch: Detecting and Monitoring International Border Personalization on Online Maps Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Did You Say U2 or YouTube?: Inferring Implicit Transcripts from Voice Search Logs Milad Shokouhi, Umut Ozertem, Nick Craswell |
Did You Say U2 or YouTube?: Inferring Implicit Transcripts from Voice Search Logs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Lifecycle and Cascade of WeChat Social Messaging Groups Jiezhong Qiu, Yixuan Li, Jie Tang, Zheng Lu, Hao Ye, Bo Chen, Qiang Yang, John E. Hopcroft |
The Lifecycle and Cascade of WeChat Social Messaging Groups Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Ruining He, Julian J. McAuley |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Effect of Recommendations on Network Structure Jessica Su, Aneesh Sharma, Sharad Goel |
The Effect of Recommendations on Network Structure Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
On the Relevance of Irrelevant Alternatives Austin R. Benson, Ravi Kumar, Andrew Tomkins |
On the Relevance of Irrelevant Alternatives Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Exploiting Green Energy to Reduce the Operational Costs of Multi-Center Web Search Engines Roi Blanco, Matteo Catena, Nicola Tonellotto |
Exploiting Green Energy to Reduce the Operational Costs of Multi-Center Web Search Engines Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
No Honor Among Thieves: A Large-Scale Analysis of Malicious Web Shells Oleksii Starov, Johannes Dahse, Syed Sharique Ahmad, Thorsten Holz, Nick Nikiforakis |
No Honor Among Thieves: A Large-Scale Analysis of Malicious Web Shells Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Noriaki Kawamae |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Automatic Discovery of Attribute Synonyms Using Query Logs and Table Corpora Yeye He, Kaushik Chakrabarti, Tao Cheng, Tomasz Tylenda |
Automatic Discovery of Attribute Synonyms Using Query Logs and Table Corpora Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Objective Variables for Probabilistic Revenue Maximization in Second-Price Auctions with Reserve Maja R. Rudolph, Joseph G. Ellis, David M. Blei |
Objective Variables for Probabilistic Revenue Maximization in Second-Price Auctions with Reserve Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
TribeFlow: Mining & Predicting User Trajectories Flavio Figueiredo, Bruno Ribeiro, Jussara M. Almeida, Christos Faloutsos |
TribeFlow: Mining & Predicting User Trajectories Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
On Sampling Nodes in a Network Flavio Chierichetti, Anirban Dasgupta, Ravi Kumar, Silvio Lattanzi, Tamás Sarlós |
On Sampling Nodes in a Network Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Measuring Urban Social Diversity Using Interconnected Geo-Social Networks Desislava Hristova, Matthew J. Williams, Mirco Musolesi, Pietro Panzarasa, Cecilia Mascolo |
Measuring Urban Social Diversity Using Interconnected Geo-Social Networks Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Exploring Patterns of Identity Usage in Tweets: A New Problem, Solution and Case Study Kenneth Joseph, Wei Wei, Kathleen M. Carley |
Exploring Patterns of Identity Usage in Tweets: A New Problem, Solution and Case Study Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Immersive Recommendation: News and Event Recommendations Using Personal Digital Traces Cheng-Kang Hsieh, Longqi Yang, Honghao Wei, Mor Naaman, Deborah Estrin |
Immersive Recommendation: News and Event Recommendations Using Personal Digital Traces Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
HeteroSales: Utilizing Heterogeneous Social Networks to Identify the Next Enterprise Customer Qingbo Hu, Sihong Xie, Jiawei Zhang, Qiang Zhu, Songtao Guo, Philip S. Yu |
HeteroSales: Utilizing Heterogeneous Social Networks to Identify the Next Enterprise Customer Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Yao Liu, Mengbai Xiao, Ming Zhang, Xin Li, Mian Dong, Zhan Ma, Zhenhua Li, Songqing Chen |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Using Hierarchical Skills for Optimized Task Assignment in Knowledge-Intensive Crowdsourcing Panagiotis Mavridis, David Gross-Amblard, Zoltán Miklós |
Using Hierarchical Skills for Optimized Task Assignment in Knowledge-Intensive Crowdsourcing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Communication Network Within the Crowd Ming Yin, Mary L. Gray, Siddharth Suri, Jennifer Wortman Vaughan |
The Communication Network Within the Crowd Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Bayesian Budget Feasibility with Posted Pricing Eric Balkanski, Jason D. Hartline |
Bayesian Budget Feasibility with Posted Pricing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mining Aspect-Specific Opinion using a Holistic Lifelong Topic Model Shuai Wang, Zhiyuan Chen, Bing Liu |
Mining Aspect-Specific Opinion using a Holistic Lifelong Topic Model Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Improving Post-Click User Engagement on Native Ads via Survival Analysis Nicola Barbieri, Fabrizio Silvestri, Mounia Lalmas |
Improving Post-Click User Engagement on Native Ads via Survival Analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Dokyun Lee, Kartik Hosanagar |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
In a World That Counts: Clustering and Detecting Fake Social Engagement at Scale Yixuan Li, Oscar Martinez, Xing Chen, Yi Li, John E. Hopcroft |
In a World That Counts: Clustering and Detecting Fake Social Engagement at Scale Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Probabilistic Bag-Of-Hyperlinks Model for Entity Linking Octavian-Eugen Ganea, Marina Ganea, Aurélien Lucchi, Carsten Eickhoff, Thomas Hofmann |
Probabilistic Bag-Of-Hyperlinks Model for Entity Linking Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Modeling a Retweet Network via an Adaptive Bayesian Approach Bin Bi, Junghoo Cho |
Modeling a Retweet Network via an Adaptive Bayesian Approach Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Collaborative Nowcasting for Contextual Recommendation Yu Sun, Nicholas Jing Yuan, Xing Xie, Kieran McDonald, Rui Zhang |
Collaborative Nowcasting for Contextual Recommendation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Piggyback System for Joint Entity Mention Detection and Linking in Web Queries Marco Cornolti, Paolo Ferragina, Massimiliano Ciaramita, Stefan Rüd, Hinrich Schütze |
A Piggyback System for Joint Entity Mention Detection and Linking in Web Queries Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Dot Everyone!!: Power, the Internet and You Martha Lane Fox |
Dot Everyone!!: Power, the Internet and You Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
User Fatigue in Online News Recommendation Hao Ma, Xueqing Liu, Zhihong Shen |
User Fatigue in Online News Recommendation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Understanding User Economic Behavior in the City Using Large-scale Geotagged and Crowdsourced Data Yingjie Zhang, Beibei Li, Jason Hong |
Understanding User Economic Behavior in the City Using Large-scale Geotagged and Crowdsourced Data Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Death and Life of Great Italian Cities: A Mobile Phone Data Perspective Marco De Nadai, Jacopo Staiano, Roberto Larcher, Nicu Sebe, Daniele Quercia, Bruno Lepri |
The Death and Life of Great Italian Cities: A Mobile Phone Data Perspective Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Using Metafeatures to Increase the Effectiveness of Latent Semantic Models in Web Search Alexey Borisov, Pavel Serdyukov, Maarten de Rijke |
Using Metafeatures to Increase the Effectiveness of Latent Semantic Models in Web Search Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Md. Mustafizur Rahman, Hongning Wang |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Learning Global Term Weights for Content-based Recommender Systems Yupeng Gu, Bo Zhao, David Hardtke, Yizhou Sun |
Learning Global Term Weights for Content-based Recommender Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Neural Click Model for Web Search Alexey Borisov, Ilya Markov, Maarten de Rijke, Pavel Serdyukov |
A Neural Click Model for Web Search Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Crowdsourcing Annotations for Websites' Privacy Policies: Can It Really Work? Shomir Wilson, Florian Schaub, Rohan Ramanath, Norman M. Sadeh, Fei Liu, Noah A. Smith, Frederick Liu |
Crowdsourcing Annotations for Websites' Privacy Policies: Can It Really Work? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Semantic Web and the Semantics of the Web: Where Does Meaning Come From? Peter Norvig |
The Semantic Web and the Semantics of the Web: Where Does Meaning Come From? Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
From Diversity-based Prediction to Better Ontology & Schema Matching Avigdor Gal, Haggai Roitman, Tomer Sagi |
From Diversity-based Prediction to Better Ontology & Schema Matching Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Pushing the Frontier: Exploring the African Web Ecosystem Rodérick Fanou, Gareth Tyson, Pierre François, Arjuna Sathiaseelan |
Pushing the Frontier: Exploring the African Web Ecosystem Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Voting with Their Feet: Inferring User Preferences from App Management Activities Huoran Li, Wei Ai, Xuanzhe Liu, Jian Tang, Gang Huang, Feng Feng, Qiaozhu Mei |
Voting with Their Feet: Inferring User Preferences from App Management Activities Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the Temporal Dynamics of Opinion Spamming: Case Studies on Yelp Santosh K. C., Arjun Mukherjee |
On the Temporal Dynamics of Opinion Spamming: Case Studies on Yelp Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
David García, Markus Strohmaier |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Amit K. Chopra, Munindar P. Singh |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Entity Disambiguation with Linkless Knowledge Bases Yang Li, Shulong Tan, Huan Sun, Jiawei Han, Dan Roth, Xifeng Yan |
Entity Disambiguation with Linkless Knowledge Bases Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Scheduling Human Intelligence Tasks in Multi-Tenant Crowd-Powered Systems Djellel Eddine Difallah, Gianluca Demartini, Philippe Cudré-Mauroux |
Scheduling Human Intelligence Tasks in Multi-Tenant Crowd-Powered Systems Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Cracking Classifiers for Evasion: A Case Study on the Google's Phishing Pages Filter Bin Liang, Miaoqiang Su, Wei You, Wenchang Shi, Gang Yang |
Cracking Classifiers for Evasion: A Case Study on the Google's Phishing Pages Filter Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services Mohammad Karami, Youngsam Park, Damon McCoy |
Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Understanding the Detection of View Fraud in Video Content Portals Miriam Marciel, Rubén Cuevas, Albert Banchs, Roberto Gonzalez, Stefano Traverso, Mohamed Ahmed, Arturo Azcorra |
Understanding the Detection of View Fraud in Video Content Portals Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Table Cell Search for Question Answering Huan Sun, Hao Ma, Xiaodong He, Wen-tau Yih, Yu Su, Xifeng Yan |
Table Cell Search for Question Answering Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Zhonghao Yu, Sam Macbeth, Konark Modi, Josep M. Pujol |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Who Benefits from the "Sharing" Economy of Airbnb? Giovanni Quattrone, Davide Proserpio, Daniele Quercia, Licia Capra, Mirco Musolesi |
Who Benefits from the "Sharing" Economy of Airbnb? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Linking Users Across Domains with Location Data: Theory and Validation Christopher J. Riederer, Yunsung Kim, Augustin Chaintreau, Nitish Korula, Silvio Lattanzi |
Linking Users Across Domains with Location Data: Theory and Validation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Distributed Estimation of Graph 4-Profiles Ethan R. Elenberg, Karthikeyan Shanmugam, Michael Borokhovich, Alexandros G. Dimakis |
Distributed Estimation of Graph 4-Profiles Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Justin Cheng, Lada A. Adamic, Jon M. Kleinberg, Jure Leskovec |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Which to View: Personalized Prioritization for Broadcast Emails Beidou Wang, Martin Ester, Jiajun Bu, Yu Zhu, Ziyu Guan, Deng Cai |
Which to View: Personalized Prioritization for Broadcast Emails Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
People and Cookies: Imperfect Treatment Assignment in Online Experiments Dominic Coey, Michael Bailey |
People and Cookies: Imperfect Treatment Assignment in Online Experiments Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Discovering Structure in the Universe of Attribute Names Alon Y. Halevy, Natalya Fridman Noy, Sunita Sarawagi, Steven Euijong Whang, Xiao Yu |
Discovering Structure in the Universe of Attribute Names Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Latent Space Model for Multi-Modal Social Data Yoon-Sik Cho, Greg Ver Steeg, Emilio Ferrara, Aram Galstyan |
Latent Space Model for Multi-Modal Social Data Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services Xiaojing Liao, Chang Liu, Damon McCoy, Elaine Shi, Shuang Hao, Raheem A. Beyah |
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Daniel M. Romero, Brian Uzzi, Jon M. Kleinberg |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Unsupervised, Efficient and Semantic Expertise Retrieval Christophe Van Gysel, Maarten de Rijke, Marcel Worring |
Unsupervised, Efficient and Semantic Expertise Retrieval Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Learning-to-Rank for Real-Time High-Precision Hashtag Recommendation for Streaming News Bichen Shi, Georgiana Ifrim, Neil J. Hurley |
Learning-to-Rank for Real-Time High-Precision Hashtag Recommendation for Streaming News Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Profiling the Potential of Web Tables for Augmenting Cross-domain Knowledge Bases Dominique Ritze, Oliver Lehmberg, Yaser Oulabi, Christian Bizer |
Profiling the Potential of Web Tables for Augmenting Cross-domain Knowledge Bases Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Scaling up Dynamic Topic Models Arnab Bhadury, Jianfei Chen, Jun Zhu, Shixia Liu |
Scaling up Dynamic Topic Models Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Isabel Mette Kloumann, Chenhao Tan, Jon M. Kleinberg, Lillian Lee |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Chenwei Zhang, Wei Fan, Nan Du, Philip S. Yu |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Visualizing Large-scale and High-dimensional Data Jian Tang, Jingzhou Liu, Ming Zhang, Qiaozhu Mei |
Visualizing Large-scale and High-dimensional Data Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automatic Extraction of Indicators of Compromise for Web Applications Onur Catakoglu, Marco Balduzzi, Davide Balzarotti |
Automatic Extraction of Indicators of Compromise for Web Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards Mobile Query Auto-Completion: An Efficient Mobile Application-Aware Approach Aston Zhang, Amit Goyal, Ricardo Baeza-Yates, Yi Chang, Jiawei Han, Carl A. Gunter, Hongbo Deng |
Towards Mobile Query Auto-Completion: An Efficient Mobile Application-Aware Approach Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Strengthening Weak Identities Through Inter-Domain Trust Transfer Giridhari Venkatadri, Oana Goga, Changtao Zhong, Bimal Viswanath, Krishna P. Gummadi, Nishanth R. Sastry |
Strengthening Weak Identities Through Inter-Domain Trust Transfer Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
As Time Goes By: Comprehensive Tagging of Textual Phrases with Temporal Scopes Erdal Kuzey, Vinay Setty, Jannik Strötgen, Gerhard Weikum |
As Time Goes By: Comprehensive Tagging of Textual Phrases with Temporal Scopes Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Where Can I Buy a Boulder?: Searching for Offline Retail Locations Sandro Bauer, Filip Radlinski, Ryen W. White |
Where Can I Buy a Boulder?: Searching for Offline Retail Locations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Socialized Language Model Smoothing via Bi-directional Influence Propagation on Social Networks Rui Yan, Cheng-Te Li, Hsun-Ping Hsieh, Po Hu, Xiaohua Hu, Tingting He |
Socialized Language Model Smoothing via Bi-directional Influence Propagation on Social Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Joint Recognition and Linking of Fine-Grained Locations from Tweets Zongcheng Ji, Aixin Sun, Gao Cong, Jialong Han |
Joint Recognition and Linking of Fine-Grained Locations from Tweets Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Growing Wikipedia Across Languages via Recommendation Ellery Wulczyn, Robert West, Leila Zia, Jure Leskovec |
Growing Wikipedia Across Languages via Recommendation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Gender, Productivity, and Prestige in Computer Science Faculty Hiring Networks Samuel F. Way, Daniel B. Larremore, Aaron Clauset |
Gender, Productivity, and Prestige in Computer Science Faculty Hiring Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An Empirical Study of Web Cookies Aaron Cahn, Scott Alfeld, Paul Barford, S. Muthukrishnan |
An Empirical Study of Web Cookies Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mean Field Equilibria for Competitive Exploration in Resource Sharing Settings Pu Yang, Krishnamurthy Iyer, Peter I. Frazier |
Mean Field Equilibria for Competitive Exploration in Resource Sharing Settings Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Robust Framework for Estimating Linguistic Alignment in Twitter Conversations Gabriel Doyle, Daniel Yurovsky, Michael C. Frank |
A Robust Framework for Estimating Linguistic Alignment in Twitter Conversations Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Non-Linear Mining of Competing Local Activities Yasuko Matsubara, Yasushi Sakurai, Christos Faloutsos |
Non-Linear Mining of Competing Local Activities Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension Frank Li, Grant Ho, Eric Kuan, Yuan Niu, Lucas Ballard, Kurt Thomas, Elie Bursztein, Vern Paxson |
Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension Details |
|
Author Comments:
Code and data is proprietary, while also sensitive even if released.
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Exploring Limits to Prediction in Complex Social Systems Travis Martin, Jake M. Hofman, Amit Sharma, Ashton Anderson, Duncan J. Watts |
Exploring Limits to Prediction in Complex Social Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Beyond Collaborative Filtering: The List Recommendation Problem Oren Sar Shalom, Noam Koenigstein, Ulrich Paquet, Hastagiri P. Vanchinathan |
Beyond Collaborative Filtering: The List Recommendation Problem Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Identifying Web Queries with Question Intent Gilad Tsur, Yuval Pinter, Idan Szpektor, David Carmel |
Identifying Web Queries with Question Intent Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Disinformation on the Web: Impact, Characteristics, and Detection of Wikipedia Hoaxes Srijan Kumar, Robert West, Jure Leskovec |
Disinformation on the Web: Impact, Characteristics, and Detection of Wikipedia Hoaxes Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Just in Time: Controlling Temporal Performance in Crowdsourcing Competitions Markus Rokicki, Sergej Zerr, Stefan Siersdorfer |
Just in Time: Controlling Temporal Performance in Crowdsourcing Competitions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
From Freebase to Wikidata: The Great Migration Thomas Pellissier Tanon, Denny Vrandecic, Sebastian Schaffert, Thomas Steiner, Lydia Pintscher |
From Freebase to Wikidata: The Great Migration Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Detecting Good Abandonment in Mobile Search Kyle Williams, Julia Kiseleva, Aidan C. Crook, Imed Zitouni, Ahmed Hassan Awadallah, Madian Khabsa |
Detecting Good Abandonment in Mobile Search Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Averaging Gone Wrong: Using Time-Aware Analyses to Better Understand Behavior Samuel Barbosa, Dan Cosley, Amit Sharma, Roberto M. Cesar Jr. |
Averaging Gone Wrong: Using Time-Aware Analyses to Better Understand Behavior Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Recommendations in Signed Social Networks Jiliang Tang, Charu C. Aggarwal, Huan Liu |
Recommendations in Signed Social Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mechanism Design for Mixed Bidders Yoram Bachrach, Sofia Ceppi, Ian A. Kash, Peter B. Key, Mohammad Reza Khani |
Mechanism Design for Mixed Bidders Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PCT: Partial Co-Alignment of Social Networks Jiawei Zhang, Philip S. Yu |
PCT: Partial Co-Alignment of Social Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
La Sécurité Ouverte How We Doin? So Far? Mary Ellen Zurko |
La Sécurité Ouverte How We Doin? So Far? Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Publication does not represent original research
Verification:
Author has
verified
information
|
Addressing Complex and Subjective Product-Related Queries with Customer Reviews Julian J. McAuley, Alex Yang |
Addressing Complex and Subjective Product-Related Queries with Customer Reviews Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Abusive Language Detection in Online User Content Chikashi Nobata, Joel R. Tetreault, Achint Thomas, Yashar Mehdad, Yi Chang |
Abusive Language Detection in Online User Content Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Tell Me About Yourself: The Malicious CAPTCHA Attack Nethanel Gelernter, Amir Herzberg |
Tell Me About Yourself: The Malicious CAPTCHA Attack Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Discovery of Topical Authorities in Instagram Aditya Pal, Amaç Herdagdelen, Sourav Chatterji, Sumit Taank, Deepayan Chakrabarti |
Discovery of Topical Authorities in Instagram Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Modeling User Exposure in Recommendation Dawen Liang, Laurent Charlin, James McInerney, David M. Blei |
Modeling User Exposure in Recommendation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Exploiting Dining Preference for Restaurant Recommendation Fuzheng Zhang, Nicholas Jing Yuan, Kai Zheng, Defu Lian, Xing Xie, Yong Rui |
Exploiting Dining Preference for Restaurant Recommendation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Competition on Price and Quality in Cloud Computing Cinar Kilcioglu, Justin M. Rao |
Competition on Price and Quality in Cloud Computing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Representing Documents via Latent Keyphrase Inference Jialu Liu, Xiang Ren, Jingbo Shang, Taylor Cassidy, Clare R. Voss, Jiawei Han |
Representing Documents via Latent Keyphrase Inference Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Tweet Properly: Analyzing Deleted Tweets to Understand and Identify Regrettable Ones Lu Zhou, Wenbo Wang, Keke Chen |
Tweet Properly: Analyzing Deleted Tweets to Understand and Identify Regrettable Ones Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Effective Construction of Relative Lempel-Ziv Dictionaries Kewen Liao, Matthias Petri, Alistair Moffat, Anthony Wirth |
Effective Construction of Relative Lempel-Ziv Dictionaries Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Mining Online Social Data for Detecting Social Network Mental Disorders Hong-Han Shuai, Chih-Ya Shen, De-Nian Yang, Yi-Feng Lan, Wang-Chien Lee, Philip S. Yu, Ming-Syan Chen |
Mining Online Social Data for Detecting Social Network Mental Disorders Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Beyond the Baseline: Establishing the Value in Mobile Phone Based Poverty Estimates Chris Smith-Clarke, Licia Capra |
Beyond the Baseline: Establishing the Value in Mobile Phone Based Poverty Estimates Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reverse Engineering SPARQL Queries Marcelo Arenas, Gonzalo I. Diaz, Egor V. Kostylev |
Reverse Engineering SPARQL Queries Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Query-Less: Predicting Task Repetition for NextGen Proactive Search and Recommendation Engines Yang Song, Qi Guo |
Query-Less: Predicting Task Repetition for NextGen Proactive Search and Recommendation Engines Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Winning Arguments: Interaction Dynamics and Persuasion Strategies in Good-faith Online Discussions Chenhao Tan, Vlad Niculae, Cristian Danescu-Niculescu-Mizil, Lillian Lee |
Winning Arguments: Interaction Dynamics and Persuasion Strategies in Good-faith Online Discussions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An In-depth Study of Mobile Browser Performance Javad Nejati, Aruna Balasubramanian |
An In-depth Study of Mobile Browser Performance Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Detecting Evolution of Concepts based on Cause-Effect Relationships in Online Reviews Yating Zhang, Adam Jatowt, Katsumi Tanaka |
Detecting Evolution of Concepts based on Cause-Effect Relationships in Online Reviews Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Using Shortlists to Support Decision Making and Improve Recommender System Performance Tobias Schnabel, Paul N. Bennett, Susan T. Dumais, Thorsten Joachims |
Using Shortlists to Support Decision Making and Improve Recommender System Performance Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
TrackMeOrNot: Enabling Flexible Control on Web Tracking Wei Meng, Byoungyoung Lee, Xinyu Xing, Wenke Lee |
TrackMeOrNot: Enabling Flexible Control on Web Tracking Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Predicting Pre-click Quality for Native Advertisements Ke Zhou, Miriam Redi, Andrew Haines, Mounia Lalmas |
Predicting Pre-click Quality for Native Advertisements Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Felipe Pezoa, Juan L. Reutter, Fernando Suárez, Martín Ugarte, Domagoj Vrgoc |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Economic Recommendation with Surplus Maximization Yongfeng Zhang, Qi Zhao, Yi Zhang, Daniel Friedman, Min Zhang, Yiqun Liu, Shaoping Ma |
Economic Recommendation with Surplus Maximization Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Semantics and Expressive Power of Subqueries and Aggregates in SPARQL 1.1 Mark Kaminski, Egor V. Kostylev, Bernardo Cuenca Grau |
Semantics and Expressive Power of Subqueries and Aggregates in SPARQL 1.1 Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An Empirical Analysis of Algorithmic Pricing on Amazon Marketplace Le Chen, Alan Mislove, Christo Wilson |
An Empirical Analysis of Algorithmic Pricing on Amazon Marketplace Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|