Sciweavers

WSDM
2016
ACM
126views Data Mining» more  WSDM 2016»
8 years 8 months ago
CCCF: Improving Collaborative Filtering via Scalable User-Item Co-Clustering
Collaborative Filtering (CF) is the most popular method for recommender systems. The principal idea of CF is that users might be interested in items that are favorited by similar ...
Yao Wu, Xudong Liu, Min Xie, Martin Ester, Qing Ya...
WSDM
2016
ACM
47views Data Mining» more  WSDM 2016»
8 years 8 months ago
Understanding and Identifying Advocates for Political Campaigns on Social Media
Social media is increasingly being used to access and disseminate information on sociopolitical issues like gun rights and general elections. The popularity and openness of social...
Suhas Ranganath, Xia Hu, Jiliang Tang, Huan Liu
WSDM
2016
ACM
54views Data Mining» more  WSDM 2016»
8 years 8 months ago
Multi-view Machines
With rapidly growing amount of data available on the web, it becomes increasingly likely to obtain data from different perspectives for multi-view learning. Some successive examp...
Bokai Cao, Hucheng Zhou, Guoqiang Li, Philip S. Yu
WSDM
2016
ACM
65views Data Mining» more  WSDM 2016»
8 years 8 months ago
Modeling Intransitivity in Matchup and Comparison Data
We present a method for learning potentially intransitive preference relations from pairwise comparison and matchup data. Unlike standard preference-learning models that represent...
Shuo Chen, Thorsten Joachims
WSDM
2016
ACM
115views Data Mining» more  WSDM 2016»
8 years 8 months ago
Modeling and Predicting Learning Behavior in MOOCs
Massive Open Online Courses (MOOCs), which collect complete records of all student interactions in an online learning environment, offer us an unprecedented opportunity to analyze...
Jiezhong Qiu, Jie Tang, Tracy Xiao Liu, Jie Gong, ...
WSDM
2016
ACM
66views Data Mining» more  WSDM 2016»
8 years 8 months ago
Ensemble Models for Data-driven Prediction of Malware Infections
Given a history of detected malware attacks, can we predict the number of malware infections in a country? Can we do this for different malware and countries? This is an importan...
Chanhyun Kang, Noseong Park, B. Aditya Prakash, Ed...
WSDM
2016
ACM
48views Data Mining» more  WSDM 2016»
8 years 8 months ago
To Suggest, or Not to Suggest for Queries with Diverse Intents: Optimizing Search Result Presentation
We propose a method of optimizing search result presentation for queries with diverse intents, by selectively presenting query suggestions for leading users to more relevant searc...
Makoto P. Kato, Katsumi Tanaka
WSDM
2016
ACM
56views Data Mining» more  WSDM 2016»
8 years 8 months ago
Geographic Segmentation via Latent Poisson Factor Model
Discovering latent structures in spatial data is of critical importance to understanding the user behavior of locationbased services. In this paper, we study the problem of geogra...
Rose Yu, Andrew Gelfand, Suju Rajan, Cyrus Shahabi...
WSDM
2016
ACM
54views Data Mining» more  WSDM 2016»
8 years 8 months ago
Improving Website Hyperlink Structure Using Server Logs
Good websites should be easy to navigate via hyperlinks, yet maintaining a high-quality link structure is difficult. Identifying pairs of pages that should be linked may be hard ...
Ashwin Paranjape, Robert West 0001, Leila Zia, Jur...
WSDM
2016
ACM
54views Data Mining» more  WSDM 2016»
8 years 8 months ago
Probabilistic Group Recommendation Model for Crowdfunding Domains
Vineeth Rakesh, Wang-Chien Lee, Chandan K. Reddy