Proceedings of the Sixth ACM International Conference on Web Search and Data Mining 2013
DOI: 10.1145/2433396.2433423
|View full text |Cite
|
Sign up to set email alerts
|

Bursty subgraphs in social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…The occurrence of a burst is modeled by an underlying state transiting into a bursty state that emits messages at a higher rate than at the non-bursty state. Based on this model, many variant models are proposed for detecting bursts from document streams [11], [38], e-commerce queries [12], time series [39], and social networks [13]. Although these models are theoretically interesting, some assumptions made by them are inappropriate, such as the Poisson process of message arrivals (see [40]) and nonexistence of spams/bots, which may limit their practical usage.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The occurrence of a burst is modeled by an underlying state transiting into a bursty state that emits messages at a higher rate than at the non-bursty state. Based on this model, many variant models are proposed for detecting bursts from document streams [11], [38], e-commerce queries [12], time series [39], and social networks [13]. Although these models are theoretically interesting, some assumptions made by them are inappropriate, such as the Poisson process of message arrivals (see [40]) and nonexistence of spams/bots, which may limit their practical usage.…”
Section: Related Workmentioning
confidence: 99%
“…Similar problem also exists when detecting bursts caused by usercontent interactions. Many previous works on burst detection are based on idealized assumptions [10], [11], [12], [13] and simply ignore the existence of social bots.…”
Section: Introductionmentioning
confidence: 99%
“…The occurrence of a burst is modeled by an underlying state transiting into a bursty state that emits messages at a higher rate than at the non-bursty state. Based on this model, many variant models are proposed for detecting bursts from document streams [39,22], e-commerce queries [24], time series [41], and social networks [13]. Although these models are theoretically interesting, some assumptions made by them are inappropriate, such as the Poisson process of message arrivals (see [4]) and nonexistence of spams/bots, which may limit their practical usage.…”
Section: Related Workmentioning
confidence: 99%
“…Similar problem also exist when detecting bursts caused by user-content interactions. Many previous works on burst detection are based on idealistic assumptions [17,39,24,13] and simply ignore the existence of social bots. Present work.…”
Section: Introductionmentioning
confidence: 99%
“…Micro-blogging platforms have also been used to monitor trends with novel applications such as predicting stock prices [23]. They have also been used to detect communities based on interests [14] or bursts [11] and to rank users based on their influence [27] within their community or based on their topical expertise [21]. Behavior of users on the social platforms and communities has also been studied [1,19].…”
Section: Related Workmentioning
confidence: 99%