Abstract is missing.
- Optimizing Display Advertising in Online Social NetworksZeinab Abbassi, Aditya Bhaskara, Vishal Misra. 1-11 [doi]
- Frankenplace: Interactive Thematic Mapping for Ad Hoc Exploratory SearchBenjamin Adams, Grant McKenzie, Mark Gahegan. 12-22 [doi]
- Towards Reconciling SPARQL and Certain AnswersShqiponja Ahmetaj, Wolfgang Fischl, Reinhard Pichler, Mantas Simkus, Sebastian Skritek. 23-33 [doi]
- Donor Retention in Online Crowdfunding Communities: A Case Study of DonorsChoose.orgTim Althoff, Jure Leskovec. 34-44 [doi]
- Budget-Constrained Item Cold-Start Handling in Collaborative Filtering Recommenders via Optimal DesignOren Anava, Shahar Golan, Nadav Golbandi, Zohar Shay Karnin, Ronny Lempel, Oleg Rokhlenko, Oren Somekh. 45-54 [doi]
- Improved Theoretical and Practical Guarantees for Chromatic Correlation ClusteringYael Anava, Noa Avigdor-Elgrabli, Iftah Gamzu. 55-65 [doi]
- Global Diffusion via Cascading Invitations: Structure, Growth, and HomophilyAshton Anderson, Daniel P. Huttenlocher, Jon M. Kleinberg, Jure Leskovec, Mitul Tiwari. 66-76 [doi]
- Recommendation Subgraphs for Web DiscoveryArda Antikacioglu, R. Ravi, Srinath Sridhar 0001. 77-87 [doi]
- Is Sniping A Problem For Online Auction Markets?Matt Backus, Thomas Blake, Dimitriy V. Masterov, Steven Tadelis. 88-96 [doi]
- Essential Web Pages Are Easy to FindRicardo A. Baeza-Yates, Paolo Boldi, Flavio Chierichetti. 97-107 [doi]
- Design and Analysis of Benchmarking Experiments for Distributed Internet ServicesEytan Bakshy, Eitan Frachtenberg. 108-118 [doi]
- ACCAMS: Additive Co-Clustering to Approximate Matrices SuccinctlyAlex Beutel, Amr Ahmed, Alexander J. Smola. 119-129 [doi]
- Who, What, When, and Where: Multi-Dimensional Collaborative Recommendations Using Tensor Factorization on Sparse User-Generated DataPreeti Bhargava, Thomas Phan, Jiayu Zhou, Juhan Lee. 130-140 [doi]
- Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at GoogleJoseph Bonneau, Elie Bursztein, Ilan Caron, Rob Jackson, Mike Williamson. 141-150 [doi]
- Supporting Ethical Web Research: A New Research Ethics ReviewAnne Bowser, Janice Y. Tsai. 151-161 [doi]
- Sequential Hypothesis Tests for Adaptive Locality Sensitive HashingAniket Chakrabarti, Srinivasan Parthasarathy. 162-172 [doi]
- Opinion Spam Detection in Web Forum: A Real Case StudyYu-Ren Chen, Hsin-Hsi Chen. 173-183 [doi]
- Summarizing Entity Descriptions for Effective and Efficient Human-centered Entity LinkingGong Cheng, Danyun Xu, Yuzhong Qu. 184-194 [doi]
- Semantic Tagging of Mathematical ExpressionsPao-Yu Chien, Pu-Jen Cheng. 195-204 [doi]
- Collaborative Ranking with a Push at the TopKonstantina Christakopoulou, Arindam Banerjee. 205-215 [doi]
- Parallel Streaming Signature EM-tree: A Clustering Algorithm for Web Scale ApplicationsChristopher Michael De Vries, Lance De Vine, Shlomo Geva, Richi Nayak. 216-226 [doi]
- Network-based Origin Confusion Attacks against HTTPS Virtual HostingAntoine Delignat-Lavaud, Karthikeyan Bhargavan. 227-237 [doi]
- The Dynamics of Micro-Task Crowdsourcing: The Case of Amazon MTurkDjellel Eddine Difallah, Michele Catasta, Gianluca Demartini, Panagiotis G. Ipeirotis, Philippe Cudré-Mauroux. 238-247 [doi]
- Hierarchical Neural Language Models for Joint Representation of Streaming Documents and their ContentNemanja Djuric, Hao Wu, Vladan Radosavljevic, Mihajlo Grbovic, Narayan Bhamidipati. 248-255 [doi]
- Future User Engagement Prediction and Its Application to Improve the Sensitivity of Online ExperimentsAlexey Drutsa, Gleb Gusev, Pavel Serdyukov. 256-266 [doi]
- Enriching Structured Knowledge with Open InformationArnab Dutta, Christian Meilicke, Heiner Stuckenschmidt. 267-277 [doi]
- A Multi-View Deep Learning Approach for Cross Domain User Modeling in Recommendation SystemsAli Mamdouh Elkahky, Yang Song, Xiaodong He. 278-288 [doi]
- Cookies That Give You Away: The Surveillance Implications of Web TrackingSteven Englehardt, Dillon Reisman, Christian Eubank, Peter Zimmerman, Jonathan Mayer, Arvind Narayanan, Edward W. Felten. 289-299 [doi]
- Efficient Densest Subgraph Computation in Evolving GraphsAlessandro Epasto, Silvio Lattanzi, Mauro Sozio. 300-310 [doi]
- A Practical Framework for Privacy-Preserving Data AnalyticsLiyue Fan, Hongxia Jin. 311-321 [doi]
- Compressed Indexes for String Searching in Labeled GraphsPaolo Ferragina, Francesco Piccinno, Rossano Venturini. 322-332 [doi]
- Improving Paid Microtasks through Gamification and Adaptive Furtherance IncentivesOluwaseyi Feyisetan, Elena Simperl, Max Van Kleek, Nigel Shadbolt. 333-343 [doi]
- Tagging Personal Photos with Transfer Deep LearningJianlong Fu, Tao Mei, Kuiyuan Yang, Hanqing Lu, Yong Rui. 344-354 [doi]
- MobInsight: On Improving The Performance of Mobile Apps in Cellular NetworksVijay Gabale, Dilip Krishnaswamy. 355-365 [doi]
- Rethinking Security of Web-Based System ApplicationsMartin Georgiev, Suman Jana, Vitaly Shmatikov. 366-376 [doi]
- Cardinal ContestsArpita Ghosh, Patrick Hummel. 377-387 [doi]
- Accessible On-Line Floor PlansCagatay Goncu, Anuradha Madugalla, Simone Marinai, Kim Marriott. 388-398 [doi]
- Network A/B Testing: From Sampling to EstimationHuan Gui, Ya Xu, Anmol Bhasin, Jiawei Han. 399-409 [doi]
- User Session Identification Based on Strong Regularities in Inter-activity TimeAaron Halfaker, Oliver Keyes, Daniel Kluver, Jacob Thebault-Spieker, Tien T. Nguyen, Kenneth Shores, Anuradha Uduwage, Morten Warncke-Wang. 410-418 [doi]
- Incentivizing High Quality CrowdworkChien-Ju Ho, Aleksandrs Slivkins, Siddharth Suri, Jennifer Wortman Vaughan. 419-429 [doi]
- Skolemising Blank Nodes while Preserving IsomorphismAidan Hogan. 430-440 [doi]
- Scalable Methods for Adaptively Seeding a Social NetworkThibaut Horel, Yaron Singer. 441-451 [doi]
- User Review Sites as a Resource for Large-Scale Sociolinguistic StudiesDirk Hovy, Anders Johannsen, Anders Søgaard. 452-461 [doi]
- When Does Improved Targeting Increase Revenue?Patrick Hummel, R. Preston McAfee. 462-472 [doi]
- Social Status and Badge DesignNicole Immorlica, Gregory Stoddard, Vasilis Syrgkanis. 473-483 [doi]
- Mapping Temporal Horizons: Analysis of Collective Future and Past related Attention in TwitterAdam Jatowt, Émilien Antoine, Yukiko Kawai, Toyokazu Akiyama. 484-494 [doi]
- Path Sampling: A Fast and Provable Method for Estimating 4-Vertex Subgraph CountsMadhav Jha, C. Seshadhri, Ali Pinar. 495-505 [doi]
- Automatic Online Evaluation of Intelligent AssistantsJiepu Jiang, Ahmed Hassan Awadallah, Rosie Jones, Umut Ozertem, Imed Zitouni, Ranjitha Gurunath Kulkarni, Omar Zia Khan. 506-516 [doi]
- Incorporating Social Context and Domain Knowledge for Entity RecognitionJie Tang, Zhanpeng Fang, Jimeng Sun. 517-526 [doi]
- Querying Web-Scale Information Networks Through Bounding Matching ScoresJiahui Jin, Samamon Khemmarat, Lixin Gao, Junzhou Luo. 527-537 [doi]
- LN-Annote: An Alternative Approach to Information Extraction from Emails using Locally-Customized Named-Entity RecognitionYoungHoon Jung, Karl Stratos, Luca P. Carloni. 538-548 [doi]
- Describing and Understanding Neighborhood Characteristics through Online Social MediaMohamed Kafsi, Henriette Cramer, Bart Thomee, David A. Shamma. 549-559 [doi]
- Active Learning for Multi-relational Data ConstructionHiroshi Kajino, Akihiro Kishimoto, Adi Botea, Elizabeth M. Daly, Spyros Kotoulas. 560-569 [doi]
- The Social World of Content Abusers in Community Question AnsweringImrul Kayes, Nicolas Kourtellis, Daniele Quercia, Adriana Iamnitchi, Francesco Bonchi. 570-580 [doi]
- The Lifecycles of Apps in a Social EcosystemIsabel M. Kloumann, Lada A. Adamic, Jon M. Kleinberg, Shaomei Wu. 581-591 [doi]
- Getting More for Less: Optimized Crowdsourcing with Dynamic Tasks and GoalsAri Kobren, Chun How Tan, Panagiotis G. Ipeirotis, Evgeniy Gabrilovich. 592-602 [doi]
- Evolution of Conversations in the Age of Email OverloadFarshad Kooti, Luca Maria Aiello, Mihajlo Grbovic, Kristina Lerman, Amin Mantrach. 603-613 [doi]
- Events and Controversies: Influences of a Shocking News Event on Information SeekingDanai Koutra, Paul N. Bennett, Eric Horvitz. 614-624 [doi]
- Statistically Significant Detection of Linguistic ChangeVivek Kulkarni, Rami Al-Rfou', Bryan Perozzi, Steven Skiena. 625-635 [doi]
- Replacing the Irreplaceable: Fast Algorithms for Team Member RecommendationLiangyue Li, Hanghang Tong, Nan Cao, Kate Ehrlich, Yu-Ru Lin, Norbou Buchler. 636-646 [doi]
- Robust Group LinkagePei Li, Xin Luna Dong, Songtao Guo, Andrea Maurino, Divesh Srivastava. 647-657 [doi]
- Uncovering the Small Community Structure in Large Networks: A Local Spectral ApproachYixuan Li, Kun He, David Bindel, John E. Hopcroft. 658-668 [doi]
- Scalable Parallel EM Algorithms for Latent Dirichlet Allocation in Multi-Core SystemsXiaosheng Liu, Jia Zeng, Xi Yang, Jianfeng Yan, Qiang Yang 0001. 669-679 [doi]
- Grading the Graders: Motivating Peer Graders in a MOOCYanxin Lu, Joe Warren, Christopher M. Jermaine, Swarat Chaudhuri, Scott Rixner. 680-690 [doi]
- Measurement and Analysis of Mobile Web Cache PerformanceYun Ma, Xuanzhe Liu, Shuhui Zhang, Ruirui Xiang, Yunxin Liu, Tao Xie. 691-701 [doi]
- SCULPT: A Schema Language for Tabular Data on the WebWim Martens, Frank Neven, Stijn Vansummeren. 702-720 [doi]
- The Web as a Jungle: Non-Linear Dynamical Systems for Co-evolving Online ActivitiesYasuko Matsubara, Yasushi Sakurai, Christos Faloutsos. 721-731 [doi]
- Spanning Edge Centrality: Large-scale Computation and ApplicationsCharalampos Mavroforakis, Richard Garcia-Lebron, Ioannis Koutis, Evimaria Terzi. 732-742 [doi]
- No Escape From Reality: Security and Privacy of Augmented Reality BrowsersRichard McPherson, Suman Jana, Vitaly Shmatikov. 743-753 [doi]
- Discovering Meta-Paths in Large Heterogeneous Information NetworksChangping Meng, Reynold Cheng, Silviu Maniu, Pierre Senellart, Wangda Zhang. 754-764 [doi]
- From "Selena Gomez" to "Marlon Brando": Understanding Explorative Entity SearchIris Miliaraki, Roi Blanco, Mounia Lalmas. 765-775 [doi]
- Children Seen But Not Heard: When Parents Compromise Children's Online PrivacyTehila Minkus, Kelvin Liu, Keith W. Ross. 776-786 [doi]
- TrueView: Harnessing the Power of Multiple Review SitesAmanda J. Minnich, Nikan Chavoshi, Abdullah Mueen, Shuang Luan, Michalis Faloutsos. 787-797 [doi]
- QUOTUS: The Structure of Political Media Coverage as Revealed by Quoting PatternsVlad Niculae, Caroline Suen, Justine Zhang, Cristian Danescu-Niculescu-Mizil, Jure Leskovec. 798-808 [doi]
- Energy and Performance of Smartphone Radio Bundling in Outdoor EnvironmentsAna Nika, Yibo Zhu, Ning Ding, Abhilash Jindal, Y. Charlie Hu, Xia Zhou, Ben Y. Zhao, Haitao Zheng. 809-819 [doi]
- PriVaricator: Deceiving Fingerprinters with Little White LiesNick Nikiforakis, Wouter Joosen, Benjamin Livshits. 820-830 [doi]
- Diagnoses, Decisions, and Outcomes: Web Search as Decision Support for CancerMichael J. Paul, Ryen W. White, Eric Horvitz. 831-841 [doi]
- PocketTrend: Timely Identification and Delivery of Trending Search Content to Mobile UsersGennady Pekhimenko, Dimitrios Lymberopoulos, Oriana Riva, Karin Strauss, Doug Burger. 842-852 [doi]
- Overcoming Relational Learning Biases to Accurately Predict Preferences in Large Scale NetworksJoseph J. Pfeiffer III, Jennifer Neville, Paul N. Bennett. 853-863 [doi]
- Deriving an Emergent Relational Schema from RDF DataMinh-Duc Pham, Linnea Passing, Orri Erling, Peter A. Boncz. 864-874 [doi]
- The Digital Life of Walkable StreetsDaniele Quercia, Luca Maria Aiello, Rossano Schifanella, Adam Davies. 875-884 [doi]
- Beyond Models: Forecasting Complex Network Processes Directly from DataBruno Ribeiro, Minh X. Hoang, Ambuj K. Singh. 885-895 [doi]
- Weakly Supervised Extraction of Computer Security Events from TwitterAlan Ritter, Evan Wright, William Casey, Tom M. Mitchell. 896-905 [doi]
- Groupsourcing: Team Competition Designs for CrowdsourcingMarkus Rokicki, Sergej Zerr, Stefan Siersdorfer. 906-915 [doi]
- Authentication Melee: A Usability Analysis of Seven Web Authentication SystemsScott Ruoti, Brent Roberts, Kent E. Seamons. 916-926 [doi]
- Finding the Hierarchy of Dense Subgraphs using Nucleus DecompositionsAhmet Erdem Sariyüce, C. Seshadhri, Ali Pinar, Ümit V. Çatalyürek. 927-937 [doi]
- Bringing CUPID Indoor Positioning System to PracticeSouvik Sen, DongHo Kim, Stephane Laroche, Kyu-Han Kim, Jeongkeun Lee. 938-948 [doi]
- Early Detection of Spam Mobile AppsSuranga Seneviratne, Aruna Seneviratne, Mohamed Ali Kâafar, Anirban Mahanti, Prasant Mohapatra. 949-959 [doi]
- N-gram IDF: A Global Term Weighting Scheme Based on Information DistanceMasumi Shirakawa, Takahiro Hara, Shojiro Nishio. 960-970 [doi]
- Query Suggestion and Data Fusion in Contextual DisambiguationMilad Shokouhi, Marc Sloan, Paul N. Bennett, Kevyn Collins-Thompson, Siranush Sarkizova. 971-980 [doi]
- Asymmetric Minwise Hashing for Indexing Binary Inner Products and Set ContainmentAnshumali Shrivastava, Ping Li 0001. 981-991 [doi]
- Language Understanding in the Wild: Combining Crowdsourcing and Machine LearningEdwin D. Simpson, Matteo Venanzi, Steven Reece, Pushmeet Kohli, John Guiver, Stephen J. Roberts, Nicholas R. Jennings. 992-1002 [doi]
- HypTrails: A Bayesian Approach for Comparing Hypotheses About Human Trails on the WebPhilipp Singer, Denis Helic, Andreas Hotho, Markus Strohmaier. 1003-1013 [doi]
- Exploiting Collective Hidden Structures in Webpage Titles for Open Domain Entity ExtractionWei Song, Shiqi Zhao, Chao Zhang, Hua Wu, Haifeng Wang, Lizhen Liu, Hanshi Wang. 1014-1024 [doi]
- ROCKER: A Refinement Operator for Key DiscoveryTommaso Soru, Edgard Marx, Axel-Cyrille Ngonga Ngomo. 1025-1033 [doi]
- Random Walk TripleRush: Asynchronous Graph Querying and SamplingPhilip Stutz, Bibek Paudel, Mihaela Verman, Abraham Bernstein. 1034-1044 [doi]
- Open Domain Question Answering via Semantic EnrichmentHuan Sun, Hao Ma, Wen-tau Yih, Chen-Tse Tsai, Jingjing Liu, Ming-Wei Chang. 1045-1055 [doi]
- All Who Wander: On the Prevalence and Characteristics of Multi-community EngagementChenhao Tan, Lillian Lee. 1056-1066 [doi]
- LINE: Large-scale Information Network EmbeddingJian Tang, Meng Qu, Mingzhe Wang, Ming Zhang, Jun Yan, Qiaozhu Mei. 1067-1077 [doi]
- Leveraging Pattern Semantics for Extracting Entities in EnterprisesFangbo Tao, Bo Zhao, Ariel Fuxman, Yang Li, Jiawei Han. 1078-1088 [doi]
- Density-friendly Graph DecompositionNikolaj Tatti, Aristides Gionis. 1089-1099 [doi]
- Crowd Fraud Detection in Internet AdvertisingTian Tian, Jun Zhu, Fen Xia, Xin Zhuang, Tong Zhang. 1100-1110 [doi]
- Provably Fast Inference of Latent Features from Networks: with Applications to Learning Social Circles and Multilabel ClassificationCharalampos E. Tsourakakis. 1111-1121 [doi]
- The K-clique Densest Subgraph ProblemCharalampos E. Tsourakakis. 1122-1132 [doi]
- GERBIL: General Entity Annotator Benchmarking FrameworkRicardo Usbeck, Michael Röder, Axel-Cyrille Ngonga Ngomo, Ciro Baron, Andreas Both, Martin Brümmer, Diego Ceccarelli, Marco Cornolti, Didier Cherix, Bernd Eickmann, Paolo Ferragina, Christiane Lemke, Andrea Moro 0001, Roberto Navigli, Francesco Piccinno, Giuseppe Rizzo 0002, Harald Sack, René Speck, Raphaël Troncy, Jörg Waitelonis, Lars Wesemann. 1133-1143 [doi]
- An Optimization Framework for Weighting Implicit Relevance Labels for Personalized Web SearchYury Ustinovskiy, Gleb Gusev, Pavel Serdyukov. 1144-1154 [doi]
- A First Look at Tribal Web TrafficMorgan Vigil, Matthew Rantanen, Elizabeth M. Belding. 1155-1165 [doi]
- A Weighted Correlation Index for Rankings with TiesSebastiano Vigna. 1166-1176 [doi]
- Gathering Additional Feedback on Search Results by Multi-Armed Bandits with Respect to Production RankingAleksandr Vorobev, Damien Lefortier, Gleb Gusev, Pavel Serdyukov. 1177-1187 [doi]
- The E-Commerce Market for "Lemons": Identification and Analysis of Websites Selling Counterfeit GoodsJohn Wadleigh, Jake Drew, Tyler Moore. 1188-1197 [doi]
- Concept Expansion Using Web TablesChi Wang, Kaushik Chakrabarti, Yeye He, Kris Ganjam, Zhimin Chen, Philip A. Bernstein. 1198-1208 [doi]
- User Latent Preference Model for Better Downside Management in Recommender SystemsJian Wang, David Hardtke. 1209-1219 [doi]
- The Role of Data Cap in Optimal Two-part Network PricingXin Wang, Richard T. B. Ma, Yinlong Xu. 1220-1230 [doi]
- Tweeting Cameras for Event DetectionYuhui Wang, Mohan S. Kankanhalli. 1231-1241 [doi]
- Mining Missing Hyperlinks from Human Navigation Traces: A Case Study of WikipediaRobert West 0001, Ashwin Paranjape, Jure Leskovec. 1242-1252 [doi]
- Semantic Annotaion of Mobility Data using Social MediaFei Wu, Zhenhui Li, Wang-Chien Lee, Hongjian Wang, Zhuojie Huang. 1253-1263 [doi]
- Automatic Web Content Extraction by Combination of Learning and GroupingShanchan Wu, Jerry Liu, Jian Fan. 1264-1274 [doi]
- Executing Provenance-Enabled Queries over Web DataMarcin Wylot, Philippe Cudré-Mauroux, Paul T. Groth. 1275-1285 [doi]
- Understanding Malvertising Through Ad-Injecting Browser ExtensionsXinyu Xing, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, Wenke Lee. 1286-1295 [doi]
- E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-ServiceHaitao Xu, Daiping Liu, Haining Wang, Angelos Stavrou. 1296-1306 [doi]
- Effective Techniques for Message Reduction and Load Balancing in Distributed Graph ComputationDa Yan, James Cheng, Yi Lu, Wilfred Ng. 1307-1317 [doi]
- Tackling the Achilles Heel of Social Networks: Influence Propagation based Language Model SmoothingRui Yan, Ian En-Hsu Yen, Cheng-Te Li, Shiqi Zhao, Xiaohua Hu. 1318-1328 [doi]
- A Game Theoretic Model for the Formation of Navigable Small-World NetworksZhi Yang, Wei Chen. 1329-1339 [doi]
- A Scalable Asynchronous Distributed Algorithm for Topic ModelingHsiang-Fu Yu, Cho-Jui Hsieh, Hyokun Yun, S. V. N. Vishwanathan, Inderjit S. Dhillon. 1340-1350 [doi]
- LightLDA: Big Topic Models on Modest Computer ClustersJinhui Yuan, Fei Gao, Qirong Ho, Wei Dai, Jinliang Wei, Xun Zheng, Eric Po Xing, Tie-Yan Liu, Wei-Ying Ma. 1351-1361 [doi]
- A Novelty-Seeking based Dining Recommender SystemFuzheng Zhang, Kai Zheng, Nicholas Jing Yuan, Xing Xie, Enhong Chen, Xiaofang Zhou. 1362-1372 [doi]
- Daily-Aware Personalized Recommendation based on Feature-Level Time Series AnalysisYongfeng Zhang, Min Zhang 0006, Yi Zhang, Guokun Lai, Yiqun Liu, Honghui Zhang, Shaoping Ma. 1373-1383 [doi]
- Automatic Detection of Information Leakage Vulnerabilities in Browser ExtensionsRui Zhao, Chuan Yue, Qing Yi. 1384-1394 [doi]
- Enquiring Minds: Early Detection of Rumors in Social Media from Enquiry PostsZhe Zhao, Paul Resnick, Qiaozhu Mei. 1395-1405 [doi]
- Improving User Topic Interest Profiles by Behavior FactorizationZhe Zhao, Zhiyuan Cheng, Lichan Hong, Ed Huai-hsin Chi. 1406-1416 [doi]
- Predicting Pinterest: Automating a Distributed Human ComputationChangtao Zhong, Dmytro Karamshuk, Nishanth Sastry. 1417-1426 [doi]