Combining Human Computing and Machine Learning to Make Sense of Big (Aerial) Data for Disaster Response |
|
EMTerms 1.0: A terminological resource for crisis tweets |
|
Processing Social Media Messages in Mass Emergency: A Survey |
|
Volunteer-powered automatic classification of social media messages for public health in AIDR |
|
AIDR: Artificial intelligence for disaster response |
|
Developing mobile Linked Data applications |
|
Characterizing the life cycle of online news stories using social media reactions |
|
Coordinating human and machine intelligence to classify microblog communications in crises |
|
Emergency-relief coordination on social media: Automatically matching resource requests and offers |
|
CrisisLex: A lexicon for collecting and filtering Microblogged communications in crises |
|
FAST: Forecast and analytics of social media and traffic |
|
Emotions under Discussion: Gender, Status and Communication in Online Collaboration |
|
Composite Retrieval of Diverse and Complementary Bundles |
|
Transient news crowds in social media |
|
Predicting information credibility in time-sensitive social media |
|
Online matching of web content to closed captions in IntoNow |
|
Measuring and summarizing movement in microblog postings |
|
Practical extraction of disaster-relevant information from social media |
|
Complexity and algorithms for composite retrieval |
|
Extracting information nuggets from disaster- Related messages in social media |
|
Democratizing mobile app development for disaster management |
|
Tweet4act: Using incident-specific profiles for classifying crisis-related messages |
|
The role of information diffusion in the evolution of social networks |
|
Finding news curators in twitter |
|
Social media news communities: Gatekeeping, coverage, and statement bias |
|
Information and Influence Propagation in Social Networks |
|
Says who? Automatic text-based content analysis of television news |
|
Information verification during natural disasters |
|
Meme ranking to maximize posts virality in microblogging platforms |
|
A data-driven sketch of Wikipedia editors |
|
Correlating financial time series with micro-blogging activity |
|
Drawing a data-driven portrait of Wikipedia editors |
|
Emotions and dialogue in a peer-production community: The case of Wikipedia |
|
Mining search behavior and user-generated content: Presentation at the industrial session - EDBT/ICDT 2012 |
|
Online team formation in social networks |
|
Web Crawling |
|
Adversarial Web search |
|
Information credibility on Twitter |
|
Sparsification of influence networks |
|
Social Network Analysis and Mining for Business Applications |
|
Viscous Democracy for Social Networks |
|
Query reformulation mining: models, patterns, and applications |
|
An optimization framework for query recommendation |
|
Web Retrieval and Mining |
|
Twitter under crisis: Can we trust what we RT? |
|
The effects of query bursts on web search |
|
The Meme Ranking Problem: Maximizing Microblogging Virality |
|
Power in unity: Forming teams in large-scale community systems |
|
Graph regularization methods for Web spam detection |
|
Efficient Algorithms for Large-Scale Local Triangle Counting |
|
Evaluation of business scenarios by means of composite indicators |
|
Aging effects on query flow graphs for query suggestion |
|
Optimising topical query decomposition |
|
Query suggestions using Query-Flow graphs |
|
Fast shortest path distance estimation in large networks |
|
Voting in social networks |
|
Taxonomy-driven lumping for sequence mining |
|
Topical query decomposition |
|
Finding high-quality content in social media |
|
Web spam identification through content and hyperlinks |
|
Efficient semi-streaming algorithms for local triangle counting in massive graphs |
|
The query-flow graph: Model and applications |
|
Dr. Searcher and Mr. Browser: A unified hyperlink-click graph |
|
Searching the wikipedia with contextual information |
|
Query-log mining for detecting spam |
|
Fighting Web spam |
|
The Juxtaposed approximate PageRank method for robust PageRank approximation in a peer-to-peer web search network |
|
EvalWare: Granular computing for web applications |
|
Link Analysis for Web Spam Detection |
|
Know your neighbors: Web spam detection using the web topology |
|
Computing trusted authority scores in peer-to-peer web search networks |
|
New metrics for reputation management in P2P networks |
|
Challenges on distributed Web retrieval |
|