Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 2016
DOI: 10.1145/2939672.2939868
|View full text |Cite
|
Sign up to set email alerts
|

Smart Broadcasting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 11 publications
0
14
0
Order By: Relevance
“…However, previous work typically shares one or more of the following limitations, which we address in this work: (i) they only support knowledge triplets (subject, predicate, object) or structured knowledge; (ii) they assume there is a truth, however, a statement may be under discussion when a source writes about it; and, (iii) they do not distinguish between the unreliability of the knowledge item to which the statement refers and the trustworthiness of the source. Temporal point processes have been previously used to model information cascades [15,11,5], social activity [14,19,12], badges [10], network evolution [18,13], opinion dynamics [6], or product competition [26]. However, to the best of our knowledge, the present work is the first that leverages temporal point processes in the context of information reliability and source trustworthiness.…”
Section: Introductionmentioning
confidence: 99%
“…However, previous work typically shares one or more of the following limitations, which we address in this work: (i) they only support knowledge triplets (subject, predicate, object) or structured knowledge; (ii) they assume there is a truth, however, a statement may be under discussion when a source writes about it; and, (iii) they do not distinguish between the unreliability of the knowledge item to which the statement refers and the trustworthiness of the source. Temporal point processes have been previously used to model information cascades [15,11,5], social activity [14,19,12], badges [10], network evolution [18,13], opinion dynamics [6], or product competition [26]. However, to the best of our knowledge, the present work is the first that leverages temporal point processes in the context of information reliability and source trustworthiness.…”
Section: Introductionmentioning
confidence: 99%
“…In the remainder of the paper, whenever an intensity function and mark distribution are parametrized by θ, we write λ * θ (•), m * θ (•), P θ (A T ), and, for notational simplicity, use p * θ = (λ * θ , m * θ ) as a short-hand to denote the joint probability density of the MTPP. Recent literature [5,8,12,13,17,30,33] has established that MTPPs outperform other models (e.g., exponential law) in their ability to accurately predict online and off-line human actions.…”
Section: Problem Formulationmentioning
confidence: 99%
“…Following previous work [29,33,34], we measure visibility a user achieves, i.e., the reward, using two different metrics: (i) the position of her most recent post on her followers' feeds over time, or rank, i.e., R * (T ) = T 0 r(t)dt, where the position zero, r(t) = 0, corresponds to top and thus lower is better; (ii) the (amount of) time that her most recent post is at the top of her followers' feeds, or time at the top, i.e., R * (T ) = T 0 I(r(t) < 1)dt, and thus higher is better. If the followers' feeds are sorted in reverse chronological order, previous work has derived optimal offline [12] and online [34] algorithms for (i) and (ii), respectively, under the additional assumption that the posting intensity of other users her followers follow adopts certain functional form. However, as pointed out by previous work, feeds are typically algorithmically sorted, the posting intensity of other users may be highly complex, and thus the derived algorithms may be of limited use in practice.…”
Section: Experiments On Smart Broadcastingmentioning
confidence: 99%
See 2 more Smart Citations