Last update:
Thu Jun 5 07:08:23 MDT 2025
Helen Ashman and
Arun Iyengar Introduction . . . . . . . . . . . . . . 1:1--1:??
Bhuvan Urgaonkar and
Giovanni Pacifici and
Prashant Shenoy and
Mike Spreitzer and
Asser Tantawi Analytic modeling of multitier Internet
applications . . . . . . . . . . . . . . 2:1--2:??
Bernard J. Jansen The comparative effectiveness of
sponsored and nonsponsored links for Web
e-commerce queries . . . . . . . . . . . 3:1--3:??
Karen Church and
Barry Smyth and
Paul Cotter and
Keith Bradley Mobile information access: a study of
emerging search behavior on the mobile
Internet . . . . . . . . . . . . . . . . 4:1--4:??
Jure Leskovec and
Lada A. Adamic and
Bernardo A. Huberman The dynamics of viral marketing . . . . 5:1--5:??
Tao Yu and
Yue Zhang and
Kwei-Jay Lin Efficient algorithms for Web services
selection with end-to-end QoS
constraints . . . . . . . . . . . . . . 6:1--6:??
Micah Dubinko and
Ravi Kumar and
Joseph Magnani and
Jasmine Novak and
Prabhakar Raghavan and
Andrew Tomkins Visualizing tags over time . . . . . . . 7:1--7:??
Bharath Kumar Mohan and
Benjamin J. Keller and
Naren Ramakrishnan Scouts, promoters, and connectors: The
roles of ratings in nearest-neighbor
collaborative filtering . . . . . . . . 8:1--8:??
Alex Rogers and
Esther David and
Nicholas R. Jennings and
Jeremy Schiff The effects of proxy bidding and minimum
bid increments within eBay auctions . . 9:1--9:??
M. Ángeles Serrano and
Ana Maguitman and
Marián Boguñá and
Santo Fortunato and
Alessandro Vespignani Decoding the structure of the WWW: a
comparative analysis of Web crawls . . . 10:1--10:??
Charles Reis and
John Dunagan and
Helen J. Wang and
Opher Dubrovsky and
Saher Esmeir BrowserShield: Vulnerability-driven
filtering of dynamic HTML . . . . . . . 11:1--11:??
Zan Sun and
Jalal Mahmud and
I. V. Ramakrishnan and
Saikat Mukherjee Model-directed Web transactions under
constrained modalities . . . . . . . . . 12:1--12:??
Raj Sharman and
Shiva Shankar Ramanna and
Ram Ramesh and
Ram Gopal Cache architecture for on-demand
streaming on the Web . . . . . . . . . . 13:1--13:??
Uwe Zdun and
Carsten Hentrich and
Schahram Dustdar Modeling process-driven and
service-oriented architectures using
patterns and pattern primitives . . . . 14:1--14:??
Marc Najork and
Brian D. Davison Introduction to special section on
adversarial issues in Web search . . . . 1:1--1:??
Luca Becchetti and
Carlos Castillo and
Debora Donato and
Ricardo Baeza-Yates and
Stefano Leonardi Link analysis for Web spam detection . . 2:1--2:??
Tanguy Urvoy and
Emmanuel Chauveau and
Pascal Filoche and
Thomas Lavergne Tracking Web spam with HTML style
similarities . . . . . . . . . . . . . . 3:1--3:??
Yu-Ru Lin and
Hari Sundaram and
Yun Chi and
Junichi Tatemura and
Belle L. Tseng Detecting splogs via temporal dynamics
using self-similarity analysis . . . . . 4:1--4:??
Harald Weinreich and
Hartmut Obendorf and
Eelco Herder and
Matthias Mayer Not quite the average: an empirical
study of Web use . . . . . . . . . . . . 5:1--5:??
Qi Yu and
Athman Bouguettaya Framework for Web service query algebra
and optimization . . . . . . . . . . . . 6:1--6:??
Boanerges Aleman-Meza and
Meenakshi Nagarajan and
Li Ding and
Amit Sheth and
I. Budak Arpinar and
Anupam Joshi and
Tim Finin Scalable semantic analytics on social
networks for addressing the problem of
conflict of interest detection . . . . . 7:1--7:??
Daniel Gmach and
Stefan Krompass and
Andreas Scholz and
Martin Wimmer and
Alfons Kemper Adaptive quality of service management
for enterprise services . . . . . . . . 8:1--8:??
Bo Yang and
Jiming Liu Discovering global network communities
based on local centralities . . . . . . 9:1--9:??
Schahram Dustdar and
Bernd J. Krämer Introduction to special issue on service
oriented computing (SOC) . . . . . . . . 10:1--10:??
Khalid Belhajjame and
Suzanne M. Embury and
Norman W. Paton and
Robert Stevens and
Carole A. Goble Automatic annotation of Web services
based on workflow definitions . . . . . 11:1--11:??
Islam Elgedawy and
Zahir Tari and
James A. Thom Correctness-aware high-level functional
matching approaches for semantic Web
services . . . . . . . . . . . . . . . . 12:1--12:??
Seung Hwan Ryu and
Fabio Casati and
Halvard Skogsrud and
Boualem Benatallah and
Régis Saint-Paul Supporting the dynamic evolution of Web
service protocols in service-oriented
architectures . . . . . . . . . . . . . 13:1--13:??
Michael Schäfer and
Peter Dolog and
Wolfgang Nejdl An environment for flexible advanced
compensations of Web service
transactions . . . . . . . . . . . . . . 14:1--14:??
Mudhakar Srivatsa and
Arun Iyengar and
Jian Yin and
Ling Liu Mitigating application-level denial of
service attacks on Web servers: a
client-transparent approach . . . . . . 15:1--15:??
Ryen W. White and
Mikhail Bilenko and
Silviu Cucerzan Leveraging popular destinations to
enhance Web search interaction . . . . . 16:1--16:??
Mauro Andreolini and
Sara Casolari and
Michele Colajanni Models and framework for supporting
runtime decisions in Web-based systems 17:1--17:??
Einat Amitay and
Andrei Broder Introduction to special issue on query
log analysis: Technology and ethics . . 18:1--18:??
Alissa Cooper A survey of query log privacy-enhancing
techniques from a policy perspective . . 19:1--19:??
Ricardo Baeza-Yates and
Aristides Gionis and
Flavio P. Junqueira and
Vanessa Murdock and
Vassilis Plachouras and
Fabrizio Silvestri Design trade-offs for search engine
caching . . . . . . . . . . . . . . . . 20:1--20:??
Matthew Richardson Learning about the world through
long-term query logs . . . . . . . . . . 21:1--21:??
Georgia Koutrika and
Frans Adjie Effendi and
Zolt\'n Gyöngyi and
Paul Heymann and
Hector Garcia-Molina Combating spam in tagging systems: an
evaluation . . . . . . . . . . . . . . . 22:1--22:??
Tye Rattenbury and
Mor Naaman Methods for extracting place semantics
from Flickr tags . . . . . . . . . . . . 1:1--1:??
Collin Jackson and
Adam Barth and
Andrew Bortz and
Weidong Shao and
Dan Boneh Protecting browsers from DNS rebinding
attacks . . . . . . . . . . . . . . . . 2:1--2:??
Ziv Bar-Yossef and
Idit Keidar and
Uri Schonfeld Do not crawl in the DUST: Different URLs
with Similar Text . . . . . . . . . . . 3:1--3:??
Xiangye Xiao and
Qiong Luo and
Dan Hong and
Hongbo Fu and
Xing Xie and
Wei-Ying Ma Browsing on small displays by
transforming Web pages into
hierarchically structured subpages . . . 4:1--4:??
Evgeniy Gabrilovich and
Andrei Broder and
Marcus Fontoura and
Amruta Joshi and
Vanja Josifovski and
Lance Riedel and
Tong Zhang Classifying search queries using the Web
as a source of knowledge . . . . . . . . 5:1--5:??
Ian Reay and
Scott Dick and
James Miller A large-scale empirical study of P3P
privacy policies: Stated actions vs.
legal obligations . . . . . . . . . . . 6:1--6:??
Yon Dourisboure and
Filippo Geraci and
Marco Pellegrini Extraction and classification of dense
implicit communities in the Web graph 7:1--7:??
Hsin-Tsang Lee and
Derek Leonard and
Xiaoming Wang and
Dmitri Loguinov IRLbot: Scaling to 6 billion pages and
beyond . . . . . . . . . . . . . . . . . 8:1--8:??
Andrew F. Tappenden and
James Miller Cookies: a deployment study and the
testing implications . . . . . . . . . . 9:1--9:??
Marco Comuzzi and
Barbara Pernici A framework for QoS-based Web service
contracting . . . . . . . . . . . . . . 10:1--10:??
Thomi Pilioura and
Aphrodite Tsalgatidou Unified publication and discovery of
semantic Web services . . . . . . . . . 11:1--11:??
Jennifer Golbeck Trust and nuanced profile similarity in
online social networks . . . . . . . . . 12:1--12:??
Aameek Singh and
Mudhakar Srivatsa and
Ling Liu Search-as-a-service: Outsourced search
over outsourced storage . . . . . . . . 13:1--13:??
Valentin Robu and
Harry Halpin and
Hana Shepherd Emergence of consensus and shared
vocabularies in collaborative tagging
systems . . . . . . . . . . . . . . . . 14:1--14:??
Yu Zheng and
Yukun Chen and
Quannan Li and
Xing Xie and
Wei-Ying Ma Understanding transportation modes based
on GPS data for Web applications . . . . 1:1--1:??
Guoli Li and
Vinod Muthusamy and
Hans-Arno Jacobsen A distributed service-oriented
architecture for business process
execution . . . . . . . . . . . . . . . 2:1--2:??
Marco Montali and
Maja Pesic and
Wil M. P. van der Aalst and
Federico Chesani and
Paola Mello and
Sergio Storari Declarative specification and
verification of service choreographies 3:1--3:??
Mishari Almishari and
Xiaowei Yang Ads-portal domains: Identification and
measurements . . . . . . . . . . . . . . 4:1--4:??
Radu Jurca and
Florent Garcin and
Arjun Talwar and
Boi Faltings Reporting incentives and biases in
online review forums . . . . . . . . . . 5:1--5:??
Michail Vlachos and
Suleyman S. Kozat and
Philip S. Yu Optimal distance bounds for fast search
on compressed time-series query logs . . 6:1--6:??
Piero Fraternali and
Sara Comai and
Alessandro Bozzon and
Giovanni Toffetti Carughi Engineering rich Internet applications
with a model-driven approach . . . . . . 7:1--7:??
Xiangye Xiao and
Qiong Luo and
Zhisheng Li and
Xing Xie and
Wei-Ying Ma A large-scale study on map search logs 8:1--8:??
Ghazwa Malak and
Houari Sahraoui and
Linda Badri and
Mourad Badri Modeling Web quality using a
probabilistic approach: an empirical
validation . . . . . . . . . . . . . . . 9:1--9:??
Barbara Poblete and
Myra Spiliopoulou and
Ricardo Baeza-Yates Privacy-preserving query log mining for
business confidentiality protection . . 10:1--10:??
Mariano P. Consens and
Renée J. Miller and
Flavio Rizzolo and
Alejandro A. Vaisman Exploring XML Web collections with
DescribeX . . . . . . . . . . . . . . . 11:1--11:??
Brett Adams and
Dinh Phung and
Svetha Venkatesh Discovery of latent subcommunities in a
blog's readership . . . . . . . . . . . 12:1--12:??
Emre Kiciman and
Benjamin Livshits AjaxScope: a Platform for Remotely
Monitoring the Client-Side Behavior of
Web 2.0 Applications . . . . . . . . . . 13:1--13:??
Geert Jan Bex and
Wouter Gelade and
Frank Neven and
Stijn Vansummeren Learning Deterministic Regular
Expressions for the Inference of Schemas
from XML Data . . . . . . . . . . . . . 14:1--14:??
Peter Bailey and
Ryen W. White and
Han Liu and
Giridhar Kumaran Mining Historic Query Trails to Label
Long and Rare Search Engine Queries . . 15:1--15:??
Francisco Claude and
Gonzalo Navarro Fast and Compact Web Graph
Representations . . . . . . . . . . . . 16:1--16:??
Ashwin Swaminathan and
Renan G. Cattelan and
Ydo Wexler and
Cherian V. Mathew and
Darko Kirovski Relating Reputation and Money in Online
Markets . . . . . . . . . . . . . . . . 17:1--17:??
John Riedl and
Barry Smyth Introduction to special issue on
recommender systems . . . . . . . . . . 1:1--1:??
Fidel Cacheda and
Víctor Carneiro and
Diego Fernández and
Vreixo Formoso Comparison of collaborative filtering
algorithms: Limitations of current
techniques and proposals for scalable,
high-performance recommender systems . . 2:1--2:??
Akhmed Umyarov and
Alexander Tuzhilin Using external aggregate ratings for
improving individual recommendations . . 3:1--3:??
Yang Song and
Lu Zhang and
C. Lee Giles Automatic tag recommendation algorithms
for social recommender systems . . . . . 4:1--4:??
Yu Zheng and
Lizhu Zhang and
Zhengxin Ma and
Xing Xie and
Wei-Ying Ma Recommending friends and locations based
on individual location history . . . . . 5:1--5:??
Mingfang Wu and
Falk Scholer and
Andrew Turpin Topic Distillation with Query-Dependent
Link Connections and Page
Characteristics . . . . . . . . . . . . 6:1--6:??
John Hurley and
Emi Garcia-Palacios and
Sakir Sezer Host-Based P2P Flow Identification and
Use in Real-Time . . . . . . . . . . . . 7:1--7:??
Siddharth Mitra and
Mayank Agrawal and
Amit Yadav and
Niklas Carlsson and
Derek Eager and
Anirban Mahanti Characterizing Web-Based Video Sharing
Workloads . . . . . . . . . . . . . . . 8:1--8:??
Rifat Ozcan and
Ismail Sengor Altingovde and
Özgür Ulusoy Cost-Aware Strategies for Query Result
Caching in Web Search Engines . . . . . 9:1--9:??
Pedro Valderas and
Vicente Pelechano A Survey of Requirements Specification
in Model-Driven Development of Web
Applications . . . . . . . . . . . . . . 10:1--10:??
Chris Grier and
Shuo Tang and
Samuel T. King Designing and Implementing the OP and
OP2 Web Browsers . . . . . . . . . . . . 11:1--11:??
Vassiliki Koutsonikola and
Athena Vakali A Clustering-Driven LDAP Framework . . . 12:1--12:??
Federica Paci and
Massimo Mecella and
Mourad Ouzzani and
Elisa Bertino ACConv -- An Access Control Model for
Conversational Web Services . . . . . . 13:1--13:??
Dimitris Zeginis and
Yannis Tzitzikas and
Vassilis Christophides On Computing Deltas of RDF/S Knowledge
Bases . . . . . . . . . . . . . . . . . 14:1--14:??
Eda Baykan and
Monika Henzinger and
Ludmila Marian and
Ingmar Weber A Comprehensive Study of Features and
Algorithms for URL-Based Topic
Classification . . . . . . . . . . . . . 15:1--15:??
Rattapoom Tuchinda and
Craig A. Knoblock and
Pedro Szekely Building Mashups by Demonstration . . . 16:1--16:??
Hussein A. Alzoubi and
Seungjoon Lee and
Michael Rabinovich and
Oliver Spatscheck and
Jacobus Van Der Merwe A Practical Architecture for an Anycast
CDN . . . . . . . . . . . . . . . . . . 17:1--17:??
Ziv Bar-Yossef and
Maxim Gurevich Efficient Search Engine Measurements . . 18:1--18:??
Phillipa Gill and
Martin Arlitt and
Niklas Carlsson and
Anirban Mahanti and
Carey Williamson Characterizing Organizational Use of
Web-Based Services: Methodology,
Challenges, Observations, and Insights 19:1--19:??
Adish Singla and
Ingmar Weber Camera Brand Congruence and Camera Model
Propagation in the Flickr Social Graph 20:1--20:??
Cecilia Curlango-Rosas and
Gregorio A. Ponce and
Gabriel A. Lopez-Morteo A Specialized Search Assistant for
Learning Objects . . . . . . . . . . . . 21:1--21:??
Guangyu Zhu and
Gilad Mishne ClickRank: Learning Session-Context
Models to Enrich Web Search Ranking . . 1:1--1:??
Yiqun Liu and
Fei Chen and
Weize Kong and
Huijia Yu and
Min Zhang and
Shaoping Ma and
Liyun Ru Identifying Web Spam with the Wisdom of
the Crowds . . . . . . . . . . . . . . . 2:1--2:??
Ali Mesbah and
Arie van Deursen and
Stefan Lenselink Crawling Ajax-Based Web Applications
through Dynamic Analysis of User
Interface State Changes . . . . . . . . 3:1--3:??
Hady W. Lauw and
Ee-Peng Lim and
Ke Wang Quality and Leniency in Online
Collaborative Rating Systems . . . . . . 4:1--4:??
Helen Ashman and
Arun Iyengar and
Marc Najork Editorial . . . . . . . . . . . . . . . 5:1--5:??
Sabrina De Capitani Di Vimercati and
Sara Foresti and
Sushil Jajodia and
Stefano Paraboschi and
Giuseppe Psaila and
Pierangela Samarati Integrating trust management and access
control in data-intensive Web
applications . . . . . . . . . . . . . . 6:1--6:??
Mohammad Alrifai and
Thomas Risse and
Wolfgang Nejdl A hybrid approach for efficient Web
service composition with end-to-end QoS
constraints . . . . . . . . . . . . . . 7:1--7:??
Peter Desnoyers and
Timothy Wood and
Prashant Shenoy and
Rahul Singh and
Sangameshwar Patil and
Harrick Vin Modellus: Automated modeling of complex
Internet data center applications . . . 8:1--8:??
Luca Maria Aiello and
Alain Barrat and
Rossano Schifanella and
Ciro Cattuto and
Benjamin Markines and
Filippo Menczer Friendship prediction and homophily in
social media . . . . . . . . . . . . . . 9:1--9:??
Sara Comai and
Davide Mazza A model-driven methodology to the
content layout problem in Web
applications . . . . . . . . . . . . . . 10:1--10:38
Yuval Merhav and
Filipe Mesquita and
Denilson Barbosa and
Wai Gen Yee and
Ophir Frieder Extracting information networks from the
blogosphere . . . . . . . . . . . . . . 11:1--11:??
Iris Miliaraki and
Manolis Koubarakis FoXtrot: Distributed structural and
value XML filtering . . . . . . . . . . 12:1--12:??
Marian Dörk and
Carey Williamson and
Sheelagh Carpendale Navigating tomorrow's web: From
searching and browsing to visual
exploration . . . . . . . . . . . . . . 13:1--13:??
B. Barla Cambazoglu and
Ismail Sengor Altingovde and
Rifat Ozcan and
Özgür Ulusoy Cache-Based Query Processing for Search
Engines . . . . . . . . . . . . . . . . 14:1--14:??
Goran Delac and
Ivan Budiselic and
Ivan Zuzak and
Ivan Skuliber and
Tomislav Stefanec A Methodology for SIP and SOAP
Integration Using Application-Specific
Protocol Conversion . . . . . . . . . . 15:1--15:??
Myeongjae Jeon and
Youngjae Kim and
Jeaho Hwang and
Joonwon Lee and
Euiseong Seo Workload Characterization and
Performance Implications of Large-Scale
Blog Servers . . . . . . . . . . . . . . 16:1--16:??
Christo Wilson and
Alessandra Sala and
Krishna P. N. Puttaswamy and
Ben Y. Zhao Beyond Social Graphs: User Interactions
in Online Social Networks and their
Implications . . . . . . . . . . . . . . 17:1--17:??
Wouter Weerkamp and
Krisztian Balog and
Maarten de Rijke Exploiting External Collections for
Query Expansion . . . . . . . . . . . . 18:1--18:??
Ou Wu and
Weiming Hu and
Lei Shi Measuring the Visual Complexities of Web
Pages . . . . . . . . . . . . . . . . . 1:1--1:??
Vicki L. Hanson and
John T. Richards Progress on Website Accessibility? . . . 2:1--2:??
Eda Baykan and
Monika Henzinger and
Ingmar Weber A Comprehensive Study of Techniques for
URL-Based Web Page Language
Classification . . . . . . . . . . . . . 3:1--3:??
Kim Marriott and
Peter Moulder and
Nathan Hurst HTML Automatic Table Layout . . . . . . 4:1--4:??
Marco Anisetti and
Claudio A. Ardagna and
Ernesto Damiani and
Francesco Saonara A test-based security certification
scheme for Web services . . . . . . . . 5:1--5:??
Patricia Victor and
Nele Verbiest and
Chris Cornelis and
Martine De Cock Enhancing the trust-based recommendation
process with explicit distrust . . . . . 6:1--6:??
Chuan Yue and
Haining Wang A measurement study of insecure
JavaScript practices on the Web . . . . 7:1--7:??
Weifeng Su and
Hejun Wu and
Yafei Li and
Jing Zhao and
Frederick H. Lochovsky and
Hongmin Cai and
Tianqiang Huang Understanding query interfaces by
statistical parsing . . . . . . . . . . 8:1--8:??
Oscar Díaz and
Cristóbal Arellano and
Maider Azanza A language for end-user Web
augmentation: Caring for producers and
consumers alike . . . . . . . . . . . . 9:1--9:??
Eirini Kaldeli and
Ehsan Ullah Warriach and
Alexander Lazovik and
Marco Aiello Coordinating the web of services for a
smart home . . . . . . . . . . . . . . . 10:1--10:??
Raju Balakrishnan and
Subbarao Kambhampati and
Manishkumar Jha Assessing relevance and trust of the
deep web sources and results based on
inter-source agreement . . . . . . . . . 11:1--11:??
Cam-Tu Nguyen and
Natsuda Kaothanthong and
Takeshi Tokuyama and
Xuan-Hieu Phan A feature-word-topic model for image
annotation and retrieval . . . . . . . . 12:1--12:??
Eloisa Vargiu and
Alessandro Giuliani and
Giuliano Armano Improving contextual advertising by
adopting collaborative filtering . . . . 13:1--13:??
Mauro Conti and
Arbnor Hasani and
Bruno Crispo Virtual private social networks and a
Facebook implementation . . . . . . . . 14:1--14:??
B. Barla Cambazoglu and
Enver Kayaaslan and
Simon Jonassen and
Cevdet Aykanat A term-based inverted index partitioning
model for efficient distributed query
processing . . . . . . . . . . . . . . . 15:1--15:??
Tim Weninger and
Thomas J. Johnston and
Jiawei Han The parallel path framework for entity
discovery on the web . . . . . . . . . . 16:1--16:??
Liwei Liu and
Freddy Lecue and
Nikolay Mehandjiev Semantic content-based recommendation of
software services using context . . . . 17:1--17:??
Jing Jiang and
Christo Wilson and
Xiao Wang and
Wenpeng Sha and
Peng Huang and
Yafei Dai and
Ben Y. Zhao Understanding latent interactions in
online social networks . . . . . . . . . 18:1--18:??
Silvia Quarteroni and
Marco Brambilla and
Stefano Ceri A bottom-up, knowledge-aware approach to
integrating and querying Web data
services . . . . . . . . . . . . . . . . 19:1--19:??
Luis A. Leiva and
Roberto Vivó Web browsing behavior analysis and
interactive hypervideo . . . . . . . . . 20:1--20:??
Lidong Bing and
Wai Lam and
Tak-Lam Wong Robust detection of semi-structured web
records using a DOM
structure-knowledge-driven model . . . . 21:1--21:??
Zhen Liao and
Daxin Jiang and
Jian Pei and
Yalou Huang and
Enhong Chen and
Huanhuan Cao and
Hang Li A vlHMM approach to context-aware search 22:1--22:??
Ryen W. White and
Eric Horvitz Captions and biases in diagnostic search 23:1--23:??
Jung-Hyun Lee and
Jongwoo Ha and
Jin-Yong Jung and
Sangkeun Lee Semantic contextual advertising based on
the open directory project . . . . . . . 24:1--24:??
Xiaodi Huang UsageQoS: Estimating the QoS of Web
Services through Online User Communities 1:1--1:??
Ingo Weber and
Hye-Young Paik and
Boualem Benatallah Form-Based Web Service Composition for
Domain Experts . . . . . . . . . . . . . 2:1--2:??
Rifat Ozcan and
Ismail Sengor Altingovde and
B. Barla Cambazoglu and
Özgür Ulusoy Second Chance: a Hybrid Approach for
Dynamic Result Caching and Prefetching
in Search Engines . . . . . . . . . . . 3:1--3:??
Reza Sherkat and
Jing Li and
Nikos Mamoulis Efficient Time-Stamped Event Sequence
Anonymization . . . . . . . . . . . . . 4:1--4:??
Jesus Bellido and
Rosa Alarcón and
Cesare Pautasso Control-Flow Patterns for Decentralized
RESTful Service Composition . . . . . . 5:1--5:??
Sergiu Chelaru and
Ismail Sengor Altingovde and
Stefan Siersdorfer and
Wolfgang Nejdl Analyzing, Detecting, and Exploiting
Sentiment in Web Queries . . . . . . . . 6:1--6:??
Sergio Duarte Torres and
Ingmar Weber and
Djoerd Hiemstra Analysis of Search and Browsing Behavior
of Young Users on the Web . . . . . . . 7:1--7:??
Ao-Jan Su and
Y. Charlie Hu and
Aleksandar Kuzmanovic and
Cheng-Kok Koh How to Improve Your Search Engine
Ranking: Myths and Reality . . . . . . . 8:1--8:??
Michael Sirivianos and
Kyungbaek Kim and
Jian Wei Gan and
Xiaowei Yang Leveraging Social Feedback to Verify
Online Identity Claims . . . . . . . . . 9:1--9:??
Andrea Pugliese and
Matthias Bröcheler and
V. S. Subrahmanian and
Michael Ovelgönne Efficient MultiView Maintenance under
Insertion in Huge Social Networks . . . 10:1--10:??
Bojana Bislimovska and
Alessandro Bozzon and
Marco Brambilla and
Piero Fraternali Textual and Content-Based Search in
Repositories of Web Application Models 11:1--11:??
Alejandro Bellogín and
Pablo Castells and
Iván Cantador Neighbor Selection and Weighting in
User-Based Collaborative Filtering: a
Performance Prediction Approach . . . . 12:1--12:??
Yi Qian and
Sibel Adali Foundations of Trust and Distrust in
Networks: Extended Structural Balance
Theory . . . . . . . . . . . . . . . . . 13:1--13:??
Stefano Soi and
Florian Daniel and
Fabio Casati Conceptual Development of Custom,
Domain-Specific Mashup Platforms . . . . 14:1--14:??
Xianchao Zhang and
You Wang and
Nan Mou and
Wenxin Liang Propagating Both Trust and Distrust with
Target Differentiation for Combating
Link-Based Web Spam . . . . . . . . . . 15:1--15:??
Giorgos Margaritis and
Stergios V. Anastasiadis Incremental Text Indexing for Fast
Disk-Based Search . . . . . . . . . . . 16:1--16:??
Stefan Siersdorfer and
Sergiu Chelaru and
Jose San Pedro and
Ismail Sengor Altingovde and
Wolfgang Nejdl Analyzing and Mining Comments and
Comment Ratings on the Social Web . . . 17:1--17:??
Sven Casteleyn and
Irene Garrigós and
Jose-Norberto Mazón Ten Years of Rich Internet Applications:
a Systematic Mapping Study, and Beyond 18:1--18:??
Mustafa Emre Dincturk and
Guy-Vincent Jourdan and
Gregor V. Bochmann and
Iosif Viorel Onut A Model-Based Approach for Crawling Rich
Internet Applications . . . . . . . . . 19:1--19:??
Eduard C. Dragut and
Bhaskar Dasgupta and
Brian P. Beirne and
Ali Neyestani and
Badr Atassi and
Clement Yu and
Weiyi Meng Merging Query Results From Local Search
Engines for Georeferenced Objects . . . 20:1--20:??
Xihui Chen and
Jun Pang and
Ran Xue Constructing and Comparing User Mobility
Profiles . . . . . . . . . . . . . . . . 21:1--21:??
A. Gural Vural and
B. Barla Cambazoglu and
Pinar Karagoz Sentiment-Focused Web Crawling . . . . . 22:1--22:??
Rumen Kyusakov and
Pablo Puñal Pereira and
Jens Eliasson and
Jerker Delsing EXIP: a Framework for Embedded Web
Development . . . . . . . . . . . . . . 23:1--23:??
Paul Thomas Using Interaction Data to Explain
Difficulty Navigating Online . . . . . . 24:1--24:??
Ryen W. White and
Ahmed Hassan Content Bias in Online Health Search . . 25:1--25:??
Kenneth K. Fletcher and
Xiaoqing F. Liu and
Mingdong Tang Elastic Personalized Nonfunctional
Attribute Preference and Trade-off Based
Service Selection . . . . . . . . . . . 1:1--1:??
Haibin Zhang and
Yan Wang and
Xiuzhen Zhang and
Ee-Peng Lim ReputationPro: The Efficient Approaches
to Contextual Transaction Trust
Computation in E-Commerce Environments 2:1--2:??
Wenbin Cai and
Muhan Zhang and
Ya Zhang Active Learning for Web Search Ranking
via Noise Injection . . . . . . . . . . 3:1--3:??
Phillipa Gill and
Masashi Crete-Nishihata and
Jakub Dalek and
Sharon Goldberg and
Adam Senft and
Greg Wiseman Characterizing Web Censorship Worldwide:
Another Look at the OpenNet Initiative
Data . . . . . . . . . . . . . . . . . . 4:1--4:??
Valeria Fionda and
Giuseppe Pirr\`o and
Claudio Gutierrez NautiLOD: a Formal Language for the Web
of Data Graph . . . . . . . . . . . . . 5:1--5:??
Anonymous Editorial . . . . . . . . . . . . . . . 6:1--6:??
Stefano Tranquillini and
Florian Daniel and
Pavel Kucherbaev and
Fabio Casati Modeling, Enacting, and Integrating
Custom Crowdsourcing Processes . . . . . 7:1--7:??
Oscar Díaz and
Cristóbal Arellano The Augmented Web: Rationales,
Opportunities, and Challenges on
Browser-Side Transcoding . . . . . . . . 8:1--8:??
Chang-Ai Sun and
Xin Zhang and
Yan Shang and
Marco Aiello Integrating Transactions into BPEL
Service Compositions: an Aspect-Based
Approach . . . . . . . . . . . . . . . . 9:1--9:??
Natalia Kwasnikowska and
Luc Moreau and
Jan Van Den Bussche A Formal Account of the Open Provenance
Model . . . . . . . . . . . . . . . . . 10:1--10:??
Cinzia Cappiello and
Maristella Matera and
Matteo Picozzi A UI-Centric Approach for the End-User
Development of Multidevice Mashups . . . 11:1--11:??
Muhammad Bilal Zafar and
Parantapa Bhattacharya and
Niloy Ganguly and
Krishna P. Gummadi and
Saptarshi Ghosh Sampling Content from Online Social
Networks: Comparing Random vs. Expert
Sampling of the Twitter Stream . . . . . 12:1--12:??
Yazhe Wang and
Jamie Callan and
Baihua Zheng Should We Use the Sample? Analyzing
Datasets Sampled from Twitter's Stream
API . . . . . . . . . . . . . . . . . . 13:1--13:??
Zhiyuan Su and
Ling Liu and
Mingchu Li and
Xinxin Fan and
Yang Zhou Reliable and Resilient Trust Management
in Distributed Service Provision
Networks . . . . . . . . . . . . . . . . 14:1--14:??
Stefano Calzavara and
Gabriele Tolomei and
Andrea Casini and
Michele Bugliesi and
Salvatore Orlando A Supervised Learning Approach to
Protect Client Authentication on the Web 15:1--15:??
Sihyung Lee Detection of Political Manipulation in
Online Communities through Measures of
Effort and Collaboration . . . . . . . . 16:1--16:??
Sujatha Das Gollapalli and
Cornelia Caragea and
Prasenjit Mitra and
C. Lee Giles Improving Researcher Homepage
Classification with Unlabeled Data . . . 17:1--17:??
Jing Wang and
Clement T. Yu and
Philip S. Yu and
Bing Liu and
Weiyi Meng Diversionary Comments under Blog Posts 18:1--18:??
Liran Katzir and
Stephen J. Hardiman Estimating Clustering Coefficients and
Size of Social Networks via Random Walk 19:1--19:??
Willian Massami Watanabe and
Ana Luiza Dias and
Renata Pontin De Mattos Fortes Fona: Quantitative Metric to Measure
Focus Navigation on Rich Internet
Applications . . . . . . . . . . . . . . 20:1--20:??
Jakub Marszalkowski and
Jan Mizgajski and
Dariusz Mokwa and
Maciej Drozdowski Analysis and Solution of CSS-Sprite
Packing Problem . . . . . . . . . . . . 1:1--1:??
Iheb Ben Amor and
Salima Benbernou and
Mourad Ouziri and
Zaki Malik and
Brahim Medjahed Discovering Best Teams for Data
Leak-Aware Crowdsourcing in Social
Networks . . . . . . . . . . . . . . . . 2:1--2:??
Hengjie Song and
Yonghui Xu and
Huaqing Min and
Qingyao Wu and
Wei Wei and
Jianshu Weng and
Xiaogang Han and
Qiang Yang and
Jialiang Shi and
Jiaqian Gu and
Chunyan Miao and
Nishida Toyoaki Individual Judgments Versus Consensus:
Estimating Query-URL Relevance . . . . . 3:1--3:??
Xianchao Zhang and
Zhaoxing Li and
Shaoping Zhu and
Wenxin Liang Detecting Spam and Promoting Campaigns
in Twitter . . . . . . . . . . . . . . . 4:1--4:??
Rik Eshuis and
Freddy Lécué and
Nikolay Mehandjiev Flexible Construction of Executable
Service Compositions from Reusable
Semantic Knowledge . . . . . . . . . . . 5:1--5:??
Bruno T. Ávila and
Rafael D. Lins W-tree: a Compact External Memory
Representation for Webgraphs . . . . . . 6:1--6:??
Xinyu Wang and
Jianke Zhu and
Zibin Zheng and
Wenjie Song and
Yuanhong Shen and
Michael R. Lyu A Spatial-Temporal QoS Prediction
Approach for Time-aware Web Service
Recommendation . . . . . . . . . . . . . 7:1--7:??
Guibing Guo and
Jie Zhang and
Neil Yorke-Smith A Novel Evidence-Based Bayesian
Similarity Measure for Recommender
Systems . . . . . . . . . . . . . . . . 8:1--8:??
Franco Frattolillo A Buyer-Friendly and Mediated
Watermarking Protocol for Web Context 9:1--9:??
Wensheng Wu and
Weiyi Meng and
Weifeng Su and
Guangyou Zhou and
Yao-Yi Chiang Q2P: Discovering Query Templates via
Autocompletion . . . . . . . . . . . . . 10:1--10:??
Simon Walk and
Denis Helic and
Florian Geigl and
Markus Strohmaier Activity Dynamics in Collaboration
Networks . . . . . . . . . . . . . . . . 11:1--11:??
Huiyuan Zheng and
Jian Yang and
Weiliang Zhao Probabilistic QoS Aggregations for
Service Composition . . . . . . . . . . 12:1--12:??
Michael J. Paul and
Ryen W. White and
Eric Horvitz Search and Breast Cancer: On Episodic
Shifts of Attention over Life Histories
of an Illness . . . . . . . . . . . . . 13:1--13:??
Stephan Doerfel and
Daniel Zoller and
Philipp Singer and
Thomas Niebler and
Andreas Hotho and
Markus Strohmaier What Users Actually Do in a Social
Tagging System: a Study of User Behavior
in BibSonomy . . . . . . . . . . . . . . 14:1--14:??
Kaweh Djafari Naini and
Ismail Sengor Altingovde and
Wolf Siberski Scalable and Efficient Web Search Result
Diversification . . . . . . . . . . . . 15:1--15:??
Tim Furche and
Giovanni Grasso and
Michael Huemer and
Christian Schallhart and
Michael Schrefl PeaCE-Ful Web Event Extraction and
Processing as Bitemporal Mutable Events 16:1--16:??
Lorrie Faith Cranor and
Pedro Giovanni Leon and
Blase Ur A Large-Scale Evaluation of U.S.
Financial Institutions' Standardized
Privacy Notices . . . . . . . . . . . . 17:1--17:??
Ivan Srba and
Maria Bielikova A Comprehensive Survey and
Classification of Approaches for
Community Question Answering . . . . . . 18:1--18:??
Seung-Won Hwang and
Saehoon Kim and
Yuxiong He and
Sameh Elnikety and
Seungjin Choi Prediction and Predictability for Search
Query Acceleration . . . . . . . . . . . 19:1--19:??
Sukru Eraslan and
Yeliz Yesilada and
Simon Harper Scanpath Trend Analysis on Web Pages:
Clustering Eye Tracking Scanpaths . . . 20:1--20:??
Maria Rafalak and
Dominik Deja and
Adam Wierzbicki and
Radoslaw Nielek and
Michal Kakol Web Content Classification Using
Distributions of Subjective Quality
Evaluations . . . . . . . . . . . . . . 21:1--21:??
Guangming Guo and
Feida Zhu and
Enhong Chen and
Qi Liu and
Le Wu and
Chu Guan From Footprint to Evidence: an
Exploratory Study of Mining Social Data
for Credit Scoring . . . . . . . . . . . 22:1--22:??
Leila Bahri and
Barbara Carminati and
Elena Ferrari COIP-Continuous, Operable, Impartial,
and Privacy-Aware Identity Validity
Estimation for OSN Profiles . . . . . . 23:1--23:??
Sanmay Das and
Allen Lavoie and
Malik Magdon-Ismail Manipulation among the Arbiters of
Collective Intelligence: How Wikipedia
Administrators Mold Public Opinion . . . 24:1--24:??
Partha Mukherjee and
Bernard J. Jansen Information Sharing by Viewers Via
Second Screens for In-Real-Life Events 1:1--1:??
Anna Squicciarini and
Cornelia Caragea and
Rahul Balakavi Toward Automated Online Photo Privacy 2:1--2:??
Jeon-Hyung Kang and
Kristina Lerman Effort Mediates Access to Information in
Online Social Networks . . . . . . . . . 3:1--3:??
Suranga Seneviratne and
Aruna Seneviratne and
Mohamed Ali Kaafar and
Anirban Mahanti and
Prasant Mohapatra Spam Mobile Apps: Characteristics,
Detection, and in the Wild Analysis . . 4:1--4:??
Silvia Uribe and
Federico Álvarez and
José Manuel Menéndez User's Web Page Aesthetics Opinion: a
Matter of Low-Level Image Descriptors
Based on MPEG-7 . . . . . . . . . . . . 5:1--5:??
Javier Parra-Arnau and
Jagdish Prasad Achara and
Claude Castelluccia MyAdChoices: Bringing Transparency and
Control to Online Advertising . . . . . 7:1--7:??
Tianyi Wang and
Gang Wang and
Bolun Wang and
Divya Sambasivan and
Zengbin Zhang and
Xing Li and
Haitao Zheng and
Ben Y. Zhao Value and Misinformation in
Collaborative Investing Platforms . . . 8:1--8:??
Alexey Drutsa and
Gleb Gusev and
Pavel Serdyukov Periodicity in User Engagement with a
Search Engine and Its Application to
Online Controlled Experiments . . . . . 9:1--9:??
M. Rezaur Rahman and
Jinyoung Han and
Yong Jae Lee and
Chen-Nee Chuah Analyzing the Adoption and Cascading
Process of OSN-Based Gifting
Applications: an Empirical Study . . . . 10:1--10:??
Yasuko Matsubara and
Yasushi Sakurai and
B. Aditya Prakash and
Lei Li and
Christos Faloutsos Nonlinear Dynamics of Information
Diffusion in Social Networks . . . . . . 11:1--11:??
Sergio Rojas-Galeano On Obstructing Obscenity Obfuscation . . 12:1--12:??
Haitao Xu and
Daiping Liu and
Haining Wang and
Angelos Stavrou An Empirical Investigation of
Ecommerce-Reputation-Escalation-as-a-Service 13:1--13:??
Philipp Singer and
Denis Helic and
Andreas Hotho and
Markus Strohmaier A Bayesian Method for Comparing
Hypotheses About Human Trails . . . . . 14:1--14:??
Fatemeh Vahedian and
Robin Burke and
Bamshad Mobasher Multirelational Recommendation in
Heterogeneous Networks . . . . . . . . . 15:1--15:??
Ahmet Erdem Sariyüce and
C. Seshadhri and
Ali Pinar and
Ümit V. Çatalyürek Nucleus Decompositions for Identifying
Hierarchy of Dense Subgraphs . . . . . . 16:1--16:??
Yaron Kanza and
Elad Kravi and
Eliyahu Safra and
Yehoshua Sagiv Location-Based Distance Measures for
Geosocial Similarity . . . . . . . . . . 17:1--17:??
A. Panagopoulos and
E. Koutrouli and
A. Tsalgatidou Modeling and Evaluating a Robust
Feedback-Based Reputation System for
E-Commerce Platforms . . . . . . . . . . 18:1--18:??
Devis Bianchini and
Valeria De Antonellis and
Michele Melchiori WISeR: a Multi-Dimensional Framework for
Searching and Ranking Web APIs . . . . . 19:1--19:??
André Rocha and
Cássio Prazeres LDoW--PaN: Linked Data on the
Web-Presentation and Navigation . . . . 20:1--20:??
Gang Wang and
Xinyi Zhang and
Shiliang Tang and
Christo Wilson and
Haitao Zheng and
Ben Y. Zhao Clickstream User Behavior Models . . . . 21:1--21:??
Aidan Hogan Canonical Forms for Isomorphic and
Equivalent RDF Graphs: Algorithms for
Leaning and Labelling Blank Nodes . . . 22:1--22:??
Georgia Koutrika and
Qian Lin A Study of Web Print: What People Print
in the Digital Era . . . . . . . . . . . 23:1--23:??
Massimo Bernaschi and
Alessandro Celestini and
Stefano Guarino and
Flavio Lombardi Exploring and Analyzing the Tor Hidden
Services Graph . . . . . . . . . . . . . 24:1--24:??
Chang Xu and
Jie Zhang Collusive Opinion Fraud Detection in
Online Reviews: a Probabilistic Modeling
Approach . . . . . . . . . . . . . . . . 25:1--25:??
Soumi Chattopadhyay and
Ansuman Banerjee and
Nilanjan Banerjee A Fast and Scalable Mechanism for Web
Service Composition . . . . . . . . . . 26:1--26:??
Ming He and
Yong Ge and
Enhong Chen and
Qi Liu and
Xuesong Wang Exploring the Emerging Type of Comment
for Online Videos: DanMu . . . . . . . . 1:1--1:??
Pasquale Minervini and
Volker Tresp and
Claudia D'amato and
Nicola Fanizzi Adaptive Knowledge Propagation in Web
Ontologies . . . . . . . . . . . . . . . 2:1--2:??
Yining Liu and
Yong Liu and
Yanming Shen and
Keqiu Li Recommendation in a Changing World:
Exploiting Temporal Dynamics in Ratings
and Reviews . . . . . . . . . . . . . . 3:1--3:??
Wenting Tu and
David W. Cheung and
Nikos Mamoulis and
Min Yang and
Ziyu Lu Activity Recommendation with Partners 4:1--4:??
Kaushik Dutta and
Debra Vandermeer Caching to Reduce Mobile App Energy
Consumption . . . . . . . . . . . . . . 5:1--5:??
Cristyan Manta-Caro and
Juan M. Fernández-Luna Modeling and Simulating the Web of
Things from an Information Retrieval
Perspective . . . . . . . . . . . . . . 6:1--6:??
Brian D. Davison List of 2016 TWEB Reviewers . . . . . . 7:1--7:??
Brian D. Davison Editorial . . . . . . . . . . . . . . . 8:1--8:??
Yantao Jia and
Yuanzhuo Wang and
Xiaolong Jin and
Hailun Lin and
Xueqi Cheng Knowledge Graph Embedding: a Locally and
Temporally Adaptive Translation-Based
Approach . . . . . . . . . . . . . . . . 8:1--8:??
Souneil Park and
Aleksandar Matic and
Kamini Garg and
Nuria Oliver When Simpler Data Does Not Imply Less
Information: a Study of User Profiling
Scenarios With Constrained View of
Mobile HTTP(S) Traffic . . . . . . . . . 9:1--9:??
Stefano Calzavara and
Alvise Rabitti and
Michele Bugliesi Semantics-Based Analysis of Content
Security Policy Deployment . . . . . . . 10:1--10:??
Fidel Cacheda and
Roi Blanco and
Nicola Barbieri Characterizing and Predicting Users'
Behavior on Local Search Queries . . . . 11:1--11:??
Paolo Boldi and
Andrea Marino and
Massimo Santini and
Sebastiano Vigna BUbiNG: Massive Crawling for the Masses 12:1--12:26
Rossano Gaeta A Model of Information Diffusion in
Interconnected Online Social Networks 13:1--13:??
Brian D. Davison 2017 TWEB Reviewers . . . . . . . . . . 14:1--14:??
Daniela Fogli and
Giovanni Guida Evaluating Quality in Use of Corporate
Web Sites: an Empirical Investigation 15:1--15:??
Sangkeun Park and
Mark S. Ackerman and
Uichin Lee Localness of Location-based Knowledge
Sharing: a Study of Naver KiN ``Here'' 16:1--16:??
Koustav Rudra and
Niloy Ganguly and
Pawan Goyal and
Saptarshi Ghosh Extracting and Summarizing Situational
Information from the Twitter Social
Media during Disasters . . . . . . . . . 17:1--17:??
Fariz Darari and
Werner Nutt and
Giuseppe Pirr\`o and
Simon Razniewski Completeness Management for RDF Data
Sources . . . . . . . . . . . . . . . . 18:1--18:??
Yue Wang and
Dawei Yin and
Luo Jie and
Pengyuan Wang and
Makoto Yamada and
Yi Chang and
Qiaozhu Mei Optimizing Whole-Page Presentation for
Web Search . . . . . . . . . . . . . . . 19:1--19:??
Wojciech Mu\la and
Daniel Lemire Faster Base64 Encoding and Decoding
Using AVX2 Instructions . . . . . . . . 20:1--20:??
Francesco Parisi and
Noseong Park and
Andrea Pugliese and
V. S. Subrahmanian Top-$k$ User-Defined Vertex Scoring
Queries in Edge-Labeled Graph Databases 21:1--21:??
Rodérick Fanou and
Gareth Tyson and
Eder Leao Fernandes and
Pierre Francois and
Francisco Valera and
Arjuna Sathiaseelan Exploring and Analysing the African Web
Ecosystem . . . . . . . . . . . . . . . 22:1--22:??
Ana I. Torre-Bastida and
Jesús Bermúdez and
Arantza Illarramendi A Rule-Based Transducer for Querying
Incompletely Aligned Datasets . . . . . 23:1--23:??
Luca Vassio and
Idilio Drago and
Marco Mellia and
Zied Ben Houidi and
Mohamed Lamine Lamali You, the Web, and Your Device:
Longitudinal Characterization of
Browsing Habits . . . . . . . . . . . . 24:1--24:??
Qingyuan Gong and
Yang Chen and
Jiyao Hu and
Qiang Cao and
Pan Hui and
Xin Wang Understanding Cross-Site Linking in
Online Social Networks . . . . . . . . . 25:1--25:??
Yi Cui and
Clint Sparkman and
Hsin-Tsang Lee and
Dmitri Loguinov Unsupervised Domain Ranking in
Large-Scale Web Crawls . . . . . . . . . 26:1--26:??
J. An and
H. Kwak and
S. Jung and
J. Salminen and
M. Admad and
B. Jansen Imaginary People Representing Real
Numbers: Generating Personas from Online
Social Media Data . . . . . . . . . . . 27:1--27:??
Shomir Wilson and
Florian Schaub and
Frederick Liu and
Kanthashree Mysore Sathyendra and
Daniel Smullen and
Sebastian Zimmeck and
Rohan Ramanath and
Peter Story and
Fei Liu and
Norman Sadeh and
Noah A. Smith Analyzing Privacy Policies at Scale:
From Crowdsourcing to Automated
Annotations . . . . . . . . . . . . . . 1:1--1:??
Dionysis Athanasopoulos and
Apostolos Zarras Mining Abstract XML Data-Types . . . . . 2:1--2:??
Marco Anisetti and
Claudio Ardagna and
Ernesto Damiani and
Gianluca Polegri Test-Based Security Certification of
Composite Services . . . . . . . . . . . 3:1--3:??
Elissa M. Redmiles and
Eszter Hargittai New Phone, Who Dis? Modeling
Millennials' Backup Behavior . . . . . . 4:1--4:??
Patrice Calegari and
Marc Levrier and
Pawe\l Balczy\'nski Web Portals for High-performance
Computing: a Survey . . . . . . . . . . 5:1--5:??
Daniel M. Romero and
Brian Uzzi and
Jon Kleinberg Social Networks under Stress:
Specialized Team Roles and Their
Communication Structure . . . . . . . . 6:1--6:??
Zafar Gilani and
Reza Farahbakhsh and
Gareth Tyson and
Jon Crowcroft A Large-scale Behavioural Analysis of
Bots and Humans on Twitter . . . . . . . 7:1--7:??
Steffen Thoma and
Andreas Thalhammer and
Andreas Harth and
Rudi Studer FusE: Entity-Centric Data Fusion on
Linked Data . . . . . . . . . . . . . . 8:1--8:??
Julián Alarte and
Josep Silva and
Salvador Tamarit What Web Template Extractor Should I
Use? A Benchmarking and Comparison for
Five Template Extractors . . . . . . . . 9:1--9:??
Michela Del Vicario and
Walter Quattrociocchi and
Antonio Scala and
Fabiana Zollo Polarization and Fake News: Early
Warning of Potential Misinformation
Targets . . . . . . . . . . . . . . . . 10:1--10:??
Stefano Cresci and
Fabrizio Lillo and
Daniele Regoli and
Serena Tardelli and
Maurizio Tesconi Cashtag Piggybacking: Uncovering Spam
and Bot Activity in Stock Microblogs on
Twitter . . . . . . . . . . . . . . . . 11:1--11:??
Willian Massami Watanabe and
Giovana Lázaro Amêndola and
Fagner Christian Paes Layout Cross-Platform and Cross-Browser
Incompatibilities Detection using
Classification of DOM Elements . . . . . 12:1--12:??
Stephan Sigg and
Eemil Lagerspetz and
Ella Peltonen and
Petteri Nurmi and
Sasu Tarkoma Exploiting Usage to Predict
Instantaneous App Popularity: Trend
Filters and Retention Rates . . . . . . 13:1--13:??
Wafa Alorainy and
Pete Burnap and
Han Liu and
Matthew L. Williams ``The Enemy Among Us'': Detecting Cyber
Hate Speech with Threats-based Othering
Language Embeddings . . . . . . . . . . 14:1--14:??
Liping Zhao and
Pericles Loucopoulos and
Evangelia Kavakli and
Keletso J. Letsholo User Studies on End-User Service
Composition: a Literature Review and a
Design Framework . . . . . . . . . . . . 15:1--15:??
Despoina Chatzakou and
Ilias Leontiadis and
Jeremy Blackburn and
Emiliano De Cristofaro and
Gianluca Stringhini and
Athena Vakali and
Nicolas Kourtellis Detecting Cyberbullying and
Cyberaggression in Social Media . . . . 17:1--17:??
Diego Perino and
Matteo Varvello and
Claudio Soriente Long-term Measurement and Analysis of
the Free Proxy Ecosystem . . . . . . . . 18:1--18:??
Daxin Liu and
Gong Cheng and
Qingxia Liu and
Yuzhong Qu Fast and Practical Snippet Generation
for RDF Datasets . . . . . . . . . . . . 19:1--19:??
Edimar Manica and
Carina Friedrich Dorneles and
Renata Galante Combining URL and HTML Features for
Entity Discovery in the Web . . . . . . 20:1--20:??
Weiren Yu and
Julie McCann and
Chengyuan Zhang Efficient Pairwise Penetrating-rank
Similarity Retrieval . . . . . . . . . . 21:1--21:??
Sukru Eraslan and
Yeliz Yesilada and
Simon Harper ``The Best of Both Worlds!'':
Integration of Web Page and Eye Tracking
Data Driven Approaches for Automatic AOI
Detection . . . . . . . . . . . . . . . 1:1--1:31
Ankit Shah and
Rajesh Ganesan and
Sushil Jajodia and
Hasan Cam An Outsourcing Model for Alert Analysis
in a Cybersecurity Operations Center . . 2:1--2:22
Muhammad Abulaish and
Ashraf Kamal and
Mohammed J. Zaki A Survey of Figurative Language and Its
Computational Detection in Online Social
Networks . . . . . . . . . . . . . . . . 3:1--3:52
Masoud Hassanpour and
Seyed Amir Hoseinitabatabaei and
Payam Barnaghi and
Rahim Tafazolli Improving the Accuracy of the Video
Popularity Prediction Models through
User Grouping and Video Popularity
Classification . . . . . . . . . . . . . 4:1--4:28
Guohui Li and
Qi Chen and
Bolong Zheng and
Nguyen Quoc Viet Hung and
Pan Zhou and
Guanfeng Liu Time-aspect-sentiment Recommendation
Models Based on Novel Similarity Measure
Methods . . . . . . . . . . . . . . . . 5:1--5:26
Claudio Carpineto and
Giovanni Romano An Experimental Study of Automatic
Detection and Measurement of Counterfeit
in Brand Search Results . . . . . . . . 6:1--6:35
Ashwini Tonge and
Cornelia Caragea Image Privacy Prediction Using Deep
Neural Networks . . . . . . . . . . . . 7:1--7:32
Pierre Laperdrix and
Nataliia Bielova and
Benoit Baudry and
Gildas Avoine Browser Fingerprinting: a Survey . . . . 8:1--8:33
Min Shi and
Yufei Tang and
Xingquan Zhu and
Jianxun Liu Topic-aware Web Service Representation
Learning . . . . . . . . . . . . . . . . 9:1--9:23
Zhijun Xiao and
Cuiping Li and
Hong Chen PatternRank+NN: a Ranking Framework
Bringing User Behaviors into Entity Set
Expansion from Web Search Queries . . . 10:1--10:15
Huijun Wu and
Chen Wang and
Richard Nock and
Wei Wang and
Jie Yin and
Kai Lu and
Liming Zhu SMINT: Toward Interpretable and Robust
Model Sharing for Deep Neural Networks 11:1--11:28
Soumi Chattopadhyay and
Ansuman Banerjee QoS-aware Automatic Web Service
Composition with Multiple Objectives . . 12:1--12:38
Zhiang Wu and
Changsheng Li and
Jie Cao and
Yong Ge On Scalability of Association-rule-based
Recommendation: a Unified
Distributed-computing Framework . . . . 13:1--13:21
Yun Ma and
Ziniu Hu and
Diandian Gu and
Li Zhou and
Qiaozhu Mei and
Gang Huang and
Xuanzhe Liu Roaming Through the Castle Tunnels: an
Empirical Analysis of Inter-app
Navigation of Android Apps . . . . . . . 14:1--14:24
Hyuk-Jin Jeong and
Inchang Jeong and
Soo-Mook Moon Dynamic Offloading of Web Application
Execution Using Snapshot . . . . . . . . 15:1--15:24
Amir Javed and
Pete Burnap and
Matthew L. Williams and
Omer F. Rana Emotions Behind Drive-by Download
Propagation on Twitter . . . . . . . . . 16:1--16:26
Alexandros Mittos and
Savvas Zannettou and
Jeremy Blackburn and
Emiliano De Cristofaro Analyzing Genetic Testing Discourse on
the Web Through the Lens of Twitter,
Reddit, and 4chan . . . . . . . . . . . 17:1--17:38
Arkaitz Zubiaga and
Aiqi Jiang Early Detection of Social Media Hoaxes
at Scale . . . . . . . . . . . . . . . . 18:1--18:23
Pramit Mazumdar and
Bidyut Kr. Patra and
Korra Sathya Babu Cold-start Point-of-interest
Recommendation through Crowdsourcing . . 19:1--19:36
Jian Cao and
Tingjie Jia and
Shiyou Qian and
Haiyan Zhao and
Jie Wang CBPCS: a Cache-block-based Service
Process Caching Strategy to Accelerate
the Execution of Service Processes . . . 1:1--1:29
Sandeep Vidyapu and
Vijaya Saradhi Vedula and
Samit Bhattacharya Investigating and Modeling the Web
Elements' Visual Feature Influence on
Free-viewing Attention . . . . . . . . . 2:1--2:27
Xu Chen and
Jiangchao Yao and
Maosen Li and
Ya Zhang and
Yanfeng Wang Decoupled Variational Embedding for
Signed Directed Networks . . . . . . . . 3:1--3:31
Wei Wang and
Jiaying Liu and
Tao Tang and
Suppawong Tuarob and
Feng Xia and
Zhiguo Gong and
Irwin King Attributed Collaboration Network
Embedding for Academic Relationship
Mining . . . . . . . . . . . . . . . . . 4:1--4:20
Shawn Bailey and
Yue Zhang and
Arti Ramesh and
Jennifer Golbeck and
Lise Getoor A Structured and Linguistic Approach to
Understanding Recovery and Relapse in AA 5:1--5:35
Qingyuan Gong and
Yang Chen and
Xinlei He and
Yu Xiao and
Pan Hui and
Xin Wang and
Xiaoming Fu Cross-site Prediction on Social
Influence for Cold-start Users in Online
Social Networks . . . . . . . . . . . . 6:1--6:23
Amal Alhosban and
Zaki Malik and
Khayyam Hashmi and
Brahim Medjahed and
Hassan Al-Ababneh A Two Phases Self-healing Framework for
Service-oriented Systems . . . . . . . . 7:1--7:25
Marcel Flores and
Andrew Kahn and
Marc Warrior and
Alan Mislove and
Aleksandar Kuzmanovic Utilizing Web Trackers for Sybil Defense 8:1--8:19
Soumyadeep Roy and
Shamik Sural and
Niyati Chhaya and
Anandhavelu Natarajan and
Niloy Ganguly An Integrated Approach for Improving
Brand Consistency of Web Content:
Modeling, Analysis, and Recommendation 9:1--9:25
Jifeng Zhang and
Wenjun Jiang and
Jinrui Zhang and
Jie Wu and
Guojun Wang Exploring Weather Data to Predict
Activity Attendance in Event-based
Social Network: From the Organizer's
View . . . . . . . . . . . . . . . . . . 10:1--10:25
Ryen W. White Welcome Message from the New
Editor-in-Chief . . . . . . . . . . . . 11e:1--11e:1
Shuo Zhang and
Krisztian Balog Semantic Table Retrieval Using Keyword
and Table Queries . . . . . . . . . . . 11:1--11:33
Gioia Boschi and
Anthony P. Young and
Sagar Joglekar and
Chiara Cammarota and
Nishanth Sastry Who Has the Last Word? Understanding How
to Sample Online Discussions . . . . . . 12:1--12:25
Wenjun Jiang and
Jing Chen and
Xiaofei Ding and
Jie Wu and
Jiawei He and
Guojun Wang Review Summary Generation in Online
Systems: Frameworks for Supervised and
Unsupervised Scenarios . . . . . . . . . 13:1--13:33
Charalampos Chelmis and
Daphney-Stavroula Zois Dynamic, Incremental, and Continuous
Detection of Cyberbullying in Online
Social Media . . . . . . . . . . . . . . 14:1--14:33
Sajib Mistry and
Sheik Mohammad Mostakim Fattah and
Athman Bouguettaya Sequential Learning-based IaaS
Composition . . . . . . . . . . . . . . 15:1--15:37
Peng Zhang and
Baoxi Liu and
Xianghua Ding and
Tun Lu and
Hansu Gu and
Ning Gu Studying and Understanding
Characteristics of Post-Syncing Practice
and Goal in Social Network Sites . . . . 16:1--16:26
Pulkit Parikh and
Harika Abburi and
Niyati Chhaya and
Manish Gupta and
Vasudeva Varma Categorizing Sexism and Misogyny through
Neural Approaches . . . . . . . . . . . 17:1--17:31
Simiao Jiao and
Zihui Xue and
Xiaowei Chen and
Yuedong Xu Sampling Graphlets of Multiplex
Networks: a Restricted Random Walk
Approach . . . . . . . . . . . . . . . . 18:1--18:31
Huan Wang and
Chunming Qiao and
Xuan Guo and
Lei Fang and
Ying Sha and
Zhiguo Gong Identifying and Evaluating Anomalous
Structural Change-based Nodes in
Generalized Dynamic Social Networks . . 19:1--19:22
Bang Liu and
Hanlin Zhang and
Linglong Kong and
Di Niu Factorizing Historical User Actions for
Next-Day Purchase Prediction . . . . . . 1:1--1:26
Yiji Zhao and
Youfang Lin and
Zhihao Wu and
Yang Wang and
Haomin Wen Context-aware Distance Measures for
Dynamic Networks . . . . . . . . . . . . 2:1--2:34
Kyle Crichton and
Nicolas Christin and
Lorrie Faith Cranor How Do Home Computer Users Browse the
Web? . . . . . . . . . . . . . . . . . . 3:1--3:27
Nampoina Andriamilanto and
Tristan Allard and
Gaëtan Le Guelvouit and
Alexandre Garel A Large-scale Empirical Analysis of
Browser Fingerprints Properties for Web
Authentication . . . . . . . . . . . . . 4:1--4:62
Marinos Poiitis and
Athena Vakali and
Nicolas Kourtellis On the Aggression Diffusion Modeling and
Minimization in Twitter . . . . . . . . 5:1--5:24
Michael Nelson and
Sridhar Radhakrishnan and
Chandra Sekharan and
Amlan Chatterjee and
Sudhindra Gopal Krishna Queryable Compression on Time-evolving
Web and Social Networks with Streaming 6:1--6:21
Kai Wang and
Jun Pang and
Dingjie Chen and
Yu Zhao and
Dapeng Huang and
Chen Chen and
Weili Han A Large-scale Empirical Analysis of
Ransomware Activities in Bitcoin . . . . 7:1--7:29
Arpita Biswas and
Gourab K. Patro and
Niloy Ganguly and
Krishna P. Gummadi and
Abhijnan Chakraborty Toward Fair Recommendation in Two-sided
Platforms . . . . . . . . . . . . . . . 8:1--8:34
Gabriel Magno and
Virgilio Almeida Measuring International Online Human
Values with Word Embeddings . . . . . . 9:1--9:38
Dimitra Karanatsiou and
Pavlos Sermpezis and
Dritjon Gruda and
Konstantinos Kafetsios and
Ilias Dimitriadis and
Athena Vakali My Tweets Bring All the Traits to the
Yard: Predicting Personality and
Relational Traits in Online Social
Networks . . . . . . . . . . . . . . . . 10:1--10:26
Xin Qian and
Ryan A. Rossi and
Fan Du and
Sungchul Kim and
Eunyee Koh and
Sana Malik and
Tak Yeon Lee and
Nesreen K. Ahmed Personalized Visualization
Recommendation . . . . . . . . . . . . . 11:1--11:??
Simone Raponi and
Zeinab Khalifa and
Gabriele Oligeri and
Roberto Di Pietro Fake News Propagation: a Review of
Epidemic Models, Datasets, and Insights 12:1--12:??
Anna Squicciarini and
Sarah Rajtmajer and
Yang Gao and
Justin Semonsen and
Andrew Belmonte and
Pratik Agarwal An Extended Ultimatum Game for
Multi-Party Access Control in Social
Networks . . . . . . . . . . . . . . . . 13:1--13:??
C. Oswald and
Sona Elza Simon and
Arnab Bhattacharya SpotSpam: Intention Analysis-driven SMS
Spam Detection Using BERT Embeddings . . 14:1--14:??
Nikhil Jha and
Martino Trevisan and
Luca Vassio and
Marco Mellia The Internet with Privacy Policies:
Measuring The Web Upon Consent . . . . . 15:1--15:??
Riccardo Frosini and
Alexandra Poulovassilis and
Peter T. Wood and
Andrea Calí Optimisation Techniques for Flexible
SPARQL Queries . . . . . . . . . . . . . 16:1--16:??
Moumena Chaqfeh and
Russell Coke and
Jacinta Hu and
Waleed Hashmi and
Lakshmi Subramanian and
Talal Rahwan and
Yasir Zaki \pkgJSAnalyzer: a Web Developer Tool for
Simplifying Mobile Web Pages through
Non-critical JavaScript Elimination . . 17:1--17:??
Apoorva Upadhyaya and
Joydeep Chandra Spotting Flares: The Vital Signs of the
Viral Spread of Tweets Made During
Communal Incidents . . . . . . . . . . . 18:1--18:??
Qi Chen and
Guohui Li and
Quan Zhou and
Si Shi and
Deqing Zou Double Attention Convolutional Neural
Network for Sequential Recommendation 19:1--19:??
Xi Wang and
Iadh Ounis and
Craig Macdonald \pkgBanditProp: Bandit Selection of
Review Properties for Effective
Recommendation . . . . . . . . . . . . . 20:1--20:??
Taegeun Moon and
Hyoungshick Kim and
Sangwon Hyun \pkgMutexion: Mutually Exclusive
Compression System for Mitigating
Compression Side-Channel Attacks . . . . 21:1--21:??
Waqar Haider and
Yeliz Yesilada Classification of Layout vs. Relational
Tables on the Web: Machine Learning with
Rendered Pages . . . . . . . . . . . . . 1:1--1:??
Yunming Xiao and
Matteo Varvello and
Marc Warrior and
Aleksandar Kuzmanovic Decoding the Kodi Ecosystem . . . . . . 2:1--2:??
Xiao Wang and
Craig MacDonald and
Nicola Tonellotto and
Iadh Ounis ColBERT-PRF: Semantic Pseudo-Relevance
Feedback for Dense Passage and Document
Retrieval . . . . . . . . . . . . . . . 3:1--3:??
Lixin Zou and
Weixue Lu and
Yiding Liu and
Hengyi Cai and
Xiaokai Chu and
Dehong Ma and
Daiting Shi and
Yu Sun and
Zhicong Cheng and
Simiu Gu and
Shuaiqiang Wang and
Dawei Yin Pre-trained Language Model-based
Retrieval and Ranking for Web Search . . 4:1--4:??
Lei Chen and
Jie Cao and
Weichao Liang and
Jia Wu and
Qiaolin Ye Keywords-enhanced Deep Reinforcement
Learning Model for Travel Recommendation 5:1--5:??
Yingxu Wang and
Xiaoru Chen and
Jinyuan Fang and
Zaiqiao Meng and
Shangsong Liang Enhancing Conversational Recommendation
Systems with Representation Fusion . . . 6:1--6:??
Chung-Chi Chen and
Hen-Hsen Huang and
Hiroya Takamura and
Makoto P. Kato and
Yu-Lieh Huang FinTech on the Web: an Overview . . . . 7:1--7:??
Gary Ang and
Ee-Peng Lim Investment and Risk Management with
Online News and Heterogeneous Networks 8:1--8:??
Mohamed Reda Bouadjenek and
Scott Sanner and
Ga Wu A User-Centric Analysis of Social Media
for Stock Market Prediction . . . . . . 9:1--9:??
Stefan Kitzler and
Friedhelm Victor and
Pietro Saggese and
Bernhard Haslhofer Disentangling Decentralized Finance
(DeFi) Compositions . . . . . . . . . . 10:1--10:??
Tiziano Piccardi and
Martin Gerlach and
Akhil Arora and
Robert West A Large-Scale Characterization of How
Readers Browse Wikipedia . . . . . . . . 11:1--11:??
Chang-Ai Sun and
An Fu and
Jingting Jia and
Meng Li and
Jun Han Improving Conformance of Web Services: a
Constraint-based Model-driven Approach 12:1--12:??
Lokesh Jain and
Rahul Katarya and
Shelly Sachdeva Opinion Leaders for Information
Diffusion Using Graph Neural Network in
Online Social Networks . . . . . . . . . 13:1--13:??
Hao Peng and
Jian Yang and
Jia Wu and
Philip S. Yu Introduction to the Special Issue on
Advanced Graph Mining on the Web:
Theory, Algorithms, and Applications:
Part 1 . . . . . . . . . . . . . . . . . 14:1--14:??
Yingguang Yang and
Renyu Yang and
Yangyang Li and
Kai Cui and
Zhiqin Yang and
Yue Wang and
Jie Xu and
Haiyong Xie RoSGAS: Adaptive Social Bot Detection
with Reinforced Self-supervised GNN
Architecture Search . . . . . . . . . . 15:1--15:??
Haohua Du and
Yue Wang and
Xiaoya Xu and
Mingsheng Liu Niffler: Real-time Device-level
Anomalies Detection in Smart Home . . . 16:1--16:??
Li Sun and
Yang Du and
Shuai Gao and
Junda Ye and
Feiyang Wang and
Fuxin Ren and
Mingchen Liang and
Yue Wang and
Shuhai Wang GroupAligner: a Deep Reinforcement
Learning with Domain Adaptation for
Social Group Alignment . . . . . . . . . 17:1--17:??
Guixiang Zhu and
Jie Cao and
Lei Chen and
Youquan Wang and
Zhan Bu and
Shuxin Yang and
Jianqing Wu and
Zhiping Wang A Multi-Task Graph Neural Network with
Variational Graph Auto-Encoders for
Session-Based Travel Packages
Recommendation . . . . . . . . . . . . . 18:1--18:??
Usman Ahmed and
Jerry Chun-Wei Lin and
Gautam Srivastava Graph Attention Network for Text
Classification and Detection of Mental
Disorder . . . . . . . . . . . . . . . . 19:1--19:??
Qian Li and
Jianxin Li and
Lihong Wang and
Cheng Ji and
Yiming Hei and
Jiawei Sheng and
Qingyun Sun and
Shan Xue and
Pengtao Xie Type Information Utilized Event
Detection via Multi-Channel GNNs in
Electrical Power Systems . . . . . . . . 20:1--20:??
Shuhai Wang and
Xin Liu and
Xiao Pan and
Hanjie Xu and
Mingrui Liu Heterogeneous Graph Transformer for
Meta-structure Learning with Application
in Text Classification . . . . . . . . . 21:1--21:??
Jibing Gong and
Yao Wan and
Ye Liu and
Xuewen Li and
Yi Zhao and
Cheng Wang and
Yuting Lin and
Xiaohan Fang and
Wenzheng Feng and
Jingyi Zhang and
Jie Tang Reinforced MOOCs Concept Recommendation
in Heterogeneous Information Networks 22:1--22:??
Zhihua Shang and
Hongtao Xie and
Lingyun Yu and
Zhengjun Zha and
Yongdong Zhang Constructing Spatio-Temporal Graphs for
Face Forgery Detection . . . . . . . . . 23:1--23:??
Aida Sheshbolouki and
M. Tamer Özsu sGrow: Explaining the Scale-Invariant
Strength Assortativity of Streaming
Butterflies . . . . . . . . . . . . . . 24:1--24:??
Ashlee Milton and
Maria Soledad Pera Into the Unknown: Exploration of Search
Engines' Responses to Users with
Depression and Anxiety . . . . . . . . . 25:1--25:??
Daichi Amagata and
Takahiro Hara Reverse Maximum Inner Product Search:
Formulation, Algorithms, and Analysis 26:1--26:??
Luca Pajola and
Dongkai Chen and
Mauro Conti and
V. S. Subrahmanian A Novel Review Helpfulness Measure Based
on the User-Review-Item Paradigm . . . . 27:1--27:??
John Berlin and
Mat Kelly and
Michael L. Nelson and
Michele C. Weigle To Re-experience the Web: a Framework
for the Transformation and Replay of
Archived Web Pages . . . . . . . . . . . 28:1--28:??
Zhenfang Liu and
Jianxiong Ye and
Zhaonian Zou Closeness Centrality on Uncertain Graphs 29:1--29:??
Yasir Kilic and
Ali Inan Privacy Scoring over OSNs: Shared Data
Granularity as a Latent Dimension . . . 30:1--30:??
Ke Sun and
Tieyun Qian and
Chenliang Li and
Xuan Ma and
Qing Li and
Ming Zhong and
Yuanyuan Zhu and
Mengchi Liu Pre-Training Across Different Cities for
Next POI Recommendation . . . . . . . . 31:1--31:??
Willian Massami Watanabe and
Danilo Alves dos Santos and
Claiton de Oliveira Layout Cross-Browser Failure
Classification for Mobile Responsive
Design Web Applications: Combining
Classification Models Using Feature
Selection . . . . . . . . . . . . . . . 32:1--32:??
Bin Wu and
Zaiqiao Meng and
Shangsong Liang Dynamic Bayesian Contrastive Predictive
Coding Model for Personalized Product
Search . . . . . . . . . . . . . . . . . 33:1--33:??
Chenye Zhao and
Cornelia Caragea Deep Gated Multi-modal Fusion for Image
Privacy Prediction . . . . . . . . . . . 34:1--34:??
Royal Pathak and
Francesca Spezzano and
Maria Soledad Pera Understanding the Contribution of
Recommendation Algorithms on
Misinformation Recommendation and
Misinformation Dissemination on Social
Networks . . . . . . . . . . . . . . . . 35:1--35:??
Erdinç Uzun Scraping Relevant Images from Web Pages
without Download . . . . . . . . . . . . 1:1--1:??
Huizi Wu and
Cong Geng and
Hui Fang Causality and Correlation Graph Modeling
for Effective and Explainable
Session-Based Recommendation . . . . . . 2:1--2:??
Shawn M. Jones and
Martin Klein and
Michele C. Weigle and
Michael L. Nelson Summarizing Web Archive Corpora via
Social Media Storytelling by
Automatically Selecting and Visualizing
Exemplars . . . . . . . . . . . . . . . 3:1--3:??
Lei Zhang and
Wuji Zhang and
Likang Wu and
Ming He and
Hongke Zhao SHGCN: Socially Enhanced Heterogeneous
Graph Convolutional Network for
Multi-behavior Prediction . . . . . . . 4:1--4:??
Frank Emmert-Streib and
Shailesh Tripathi and
Matthias Dehmer Human Team Behavior and Predictability
in the Massively Multiplayer Online Game
WOT Blitz . . . . . . . . . . . . . . . 5:1--5:??
Anu Shrestha and
Jason Duran and
Francesca Spezzano and
Edoardo Serra Joint Credibility Estimation of News,
User, and Publisher via Role-relational
Graph Convolutional Networks . . . . . . 6:1--6:??
Zubair Ahmad and
Samuele Casarin and
Stefano Calzavara An Empirical Analysis of Web Storage and
Its Applications to Web Tracking . . . . 7:1--7:28
Trishie Sharma and
Rachit Agarwal and
Sandeep Kumar Shukla Understanding Rug Pulls: an In-depth
Behavioral Analysis of Fraudulent NFT
Creators . . . . . . . . . . . . . . . . 8:1--8:??
Qingqing Li and
Huifang Ma and
Zhixin Li and
Liang Chang Multiresolution Local Spectral
Attributed Community Search . . . . . . 9:1--9:??
Vibhor Agarwal and
Anthony P. Young and
Sagar Joglekar and
Nishanth Sastry A Graph-Based Context-Aware Model to
Understand Online Conversations . . . . 10:1--10:??
Guangliang Gao and
Weichao Liang and
Ming Yuan and
Hanwei Qian and
Qun Wang and
Jie Cao Triangle-oriented Community Detection
Considering Node Features and Network
Topology . . . . . . . . . . . . . . . . 11:1--11:??
Yutao Ma and
Zesheng Wang and
Liwei Huang and
Jian Wang CLHHN: Category-aware Lossless
Heterogeneous Hypergraph Neural Network
for Session-based Recommendation . . . . 12:1--12:??
Fuqi Lin and
Xuan Lu and
Wei Ai and
Huoran Li and
Yun Ma and
Yulian Yang and
Hongfei Deng and
Qingxiang Wang and
Qiaozhu Mei and
Xuanzhe Liu Adoption of Recurrent Innovations: a
Large-Scale Case Study on Mobile App
Updates . . . . . . . . . . . . . . . . 13:1--13:??
Asma Belhadi and
Man Zhang and
Andrea Arcuri Random Testing and Evolutionary Testing
for Fuzzing GraphQL APIs . . . . . . . . 14:1--14:??
Ninghan Chen and
Xihui Chen and
Zhiqiang Zhong and
Jun Pang Bridging Performance of X (formerly
known as Twitter) Users: a Predictor of
Subjective Well-Being During the
Pandemic . . . . . . . . . . . . . . . . 15:1--15:??
Hao Peng and
Jian Yang and
Jia Wu and
Philip S. Yu Introduction to the Special Issue on
Advanced Graph Mining on the Web:
Theory, Algorithms, and Applications:
Part 2 . . . . . . . . . . . . . . . . . 16:1--16:??
Luzhi Wang and
Yizhen Zheng and
Di Jin and
Fuyi Li and
Yongliang Qiao and
Shirui Pan Contrastive Graph Similarity Networks 17:1--17:??
Ziyue Qiao and
Pengyang Wang and
Pengfei Wang and
Zhiyuan Ning and
Yanjie Fu and
Yi Du and
Yuanchun Zhou and
Jianqiang Huang and
Xian-Sheng Hua and
Hui Xiong A Dual-channel Semi-supervised Learning
Framework on Graphs via Knowledge
Transfer and Meta-learning . . . . . . . 18:1--18:??
Xiaolin Zheng and
Rui Wu and
Zhongxuan Han and
Chaochao Chen and
Linxun Chen and
Bing Han Heterogeneous Information Crossing on
Graphs for Session-Based Recommender
Systems . . . . . . . . . . . . . . . . 19:1--19:??
Pengfei Luo and
Xi Zhu and
Tong Xu and
Yi Zheng and
Enhong Chen Semantic Interaction Matching Network
for Few-Shot Knowledge Graph Completion 20:1--20:??
Mei Yu and
Kun Zhu and
Mankun Zhao and
Jian Yu and
Tianyi Xu and
Di Jin and
Xuewei Li and
Ruiguo Yu Learning Neighbor User Intention on
User-Item Interaction Graphs for Better
Sequential Recommendation . . . . . . . 21:1--21:??
Pengfei Wang and
Daqing Wu and
Chong Chen and
Kunpeng Liu and
Yanjie Fu and
Jianqiang Huang and
Yuanchun Zhou and
Jianfeng Zhan and
Xiansheng Hua Deep Adaptive Graph Clustering via von
Mises--Fisher Distributions . . . . . . 22:1--22:??
Haorui Zhu and
Fei Xiong and
Hongshu Chen and
Xi Xiong and
Liang Wang Incorporating a Triple Graph Neural
Network with Multiple Implicit Feedback
for Social Recommendation . . . . . . . 23:1--23:??
Mukesh Kumar and
Shivansh Mishra and
Shashank Sheshar Singh and
Bhaskar Biswas Community-enhanced Link Prediction in
Dynamic Networks . . . . . . . . . . . . 24:1--24:??
Mingyi Liu and
Zhiying Tu and
Tonghua Su and
Xianzhi Wang and
Xiaofei Xu and
Zhongjie Wang BehaviorNet: a Fine-grained
Behavior-aware Network for Dynamic Link
Prediction . . . . . . . . . . . . . . . 25:1--25:??
Chunjing Xiao and
Wanlin Ji and
Yuxiang Zhang and
Shenkai Lv PIDKG: Propagating Interaction Influence
on the Dynamic Knowledge Graph for
Recommendation . . . . . . . . . . . . . 26:1--26:??
Alisa Rieger and
Tim Draws and
Mariët Theune and
Nava Tintarev Nudges to Mitigate Confirmation Bias
during Web Search on Debated Topics:
Support vs. Manipulation . . . . . . . . 27:1--27:??
Fangyu Yu and
Peng Zhang and
Xianghua Ding and
Tun Lu and
Ning Gu BNoteHelper: a Note-based Outline
Generation Tool for Structured Learning
on Video-sharing Platforms . . . . . . . 28:1--28:??
Peng Zhang and
Qi Zhou and
Tun Lu and
Hansu Gu and
Ning Gu DeLink: an Adversarial Framework for
Defending against Cross-site User
Identity Linkage . . . . . . . . . . . . 29:1--29:??
Lingyao Li and
Lizhou Fan and
Shubham Atreja and
Libby Hemphill ``HOT'' ChatGPT: The Promise of ChatGPT
in Detecting and Discriminating Hateful,
Offensive, and Toxic Comments on Social
Media . . . . . . . . . . . . . . . . . 30:1--30:??
Muhammad Umair and
Athman Bouguettaya and
Abdallah Lakhdari and
Mourad Ouzzani and
Yuyun Liu Exif2Vec: a Framework to Ascertain
Untrustworthy Crowdsourced Images Using
Metadata . . . . . . . . . . . . . . . . 31:1--31:??
Ahmad Zareie and
Rizos Sakellariou Fuzzy Influence Maximization in Social
Networks . . . . . . . . . . . . . . . . 32:1--32:??
Chirag Shah and
Emily M. Bender Envisioning Information Access Systems:
What Makes for Good Tools and a Healthy
Web? . . . . . . . . . . . . . . . . . . 33:1--33:??
Guangping Zhang and
Dongsheng Li and
Hansu Gu and
Tun Lu and
Ning Gu Heterogeneous Graph Neural Network with
Personalized and Adaptive Diversity for
News Recommendation . . . . . . . . . . 34:1--34:??
Soham Poddar and
Rajdeep Mukherjee and
Azlaan Samad and
Niloy Ganguly and
Saptarshi Ghosh MuLX-QA: Classifying Multi-Labels and
Extracting Rationale Spans in Social
Media Posts . . . . . . . . . . . . . . 35:1--35:??
Maël Maceiras and
Kavous Salehzadeh Niksirat and
Gaël Bernard and
Benoit Garbinato and
Mauro Cherubini and
Mathias Humbert and
Kévin Huguenin Know their Customers: an Empirical Study
of Online Account Enumeration Attacks 37:1--37:??
Gary Ang and
Ee-Peng Lim Learning Dynamic Multimodal Network Slot
Concepts from the Web for Forecasting
Environmental, Social and Governance
Ratings . . . . . . . . . . . . . . . . 38:1--38:??
Nikhil Jha and
Martino Trevisan and
Emilio Leonardi and
Marco Mellia Re-Identification Attacks against the
Topics API . . . . . . . . . . . . . . . 39:1--39:??
Erjon Skenderi and
Jukka Huhtamäki and
Salla-Maaria Laaksonen and
Kostas Stefanidis INCEPT: a Framework for Duplicate Posts
Classification with Combined Text
Representations . . . . . . . . . . . . 40:1--40:??
Wenqiang Lei and
Richang Hong and
Hamed Zamani and
Pawel Budzianowski and
Vanessa Murdock and
Emine Yilmaz Special Issue on Conversational
Information Seeking . . . . . . . . . . 41:1--41:??
Ophir Frieder and
Ida Mele and
Cristina Ioana Muntean and
Franco Maria Nardini and
Raffaele Perego and
Nicola Tonellotto Caching Historical Embeddings in
Conversational Search . . . . . . . . . 42:1--42:??
Arpit Rana and
Scott Sanner and
Mohamed Reda Bouadjenek and
Ronald Di Carlantonio and
Gary Farmaner User Experience and the Role of
Personalization in Critiquing-Based
Conversational Recommendation . . . . . 43:1--43:??
L. An-An and
Lu Zimu and
Xu Ning and
Liu Min and
Yan Chenggang and
Zheng Bolun and
Lv Bo and
Duan Yulong and
Shao Zhuang and
Li Xuanya Multi-stage reasoning on introspecting
and revising bias for visual question
answering . . . . . . . . . . . . . . . 44:1--44:??
Miaoran Li and
Baolin Peng and
Jianfeng Gao and
Zhu Zhang OPERA: Harmonizing Task-Oriented Dialogs
and Information Seeking Experience . . . 45:1--45:??
Hongjian Shi and
Meng Zhang and
Ruhui Ma and
Liwei Lin and
Rui Zhang and
Haibing Guan Edge Caching Placement Strategy based on
Evolutionary Game for Conversational
Information Seeking in Edge Cloud
Computing . . . . . . . . . . . . . . . 46:1--46:??
Sunil Kumar Meena and
Shashank Sheshar Singh and
Kuldeep Singh DCDIMB: Dynamic Community-based
Diversified Influence Maximization using
Bridge Nodes . . . . . . . . . . . . . . 47:1--47:??
Kai Wang and
Michael Tong and
Jun Pang and
Jitao Wang and
Weili Han XRAD: Ransomware Address Detection
Method based on Bitcoin Transaction
Relationships . . . . . . . . . . . . . 48:1--48:??
Sunil Kumar Meena and
Shashank Sheshar Singh and
Kuldeep Singh Cuckoo Search Optimization-Based
Influence Maximization in Dynamic Social
Networks . . . . . . . . . . . . . . . . 49:1--49:??
Ruihong Zeng and
Jinyuan Fang and
Siwei Liu and
Zaiqiao Meng and
Shangsong Liang Enhancing Graph Neural Networks via
Memorized Global Information . . . . . . 50:1--50:??
Jingyi Qiu and
Aibo Song and
Jiahui Jin and
Jiaoyan Chen and
Xinyu Zhang and
Xiaolin Fang and
Tianbo Zhang Matching Tabular Data to Knowledge Graph
with Effective Core Column Set
Discovery. . . . . . . . . . . . . . . . 51:1--51:??
Bo Yin and
Peng Zhang and
Tingxuan Chen Efficient State Sharding in Blockchain
via Density-based Graph Partitioning . . 1:1--1:??
Jiaqi Wang and
Ricky Y. K. Kwok and
Edith C. H. Ngai Fragment of Interest: Personalized Video
Fragment Recommendation with
Inter-Fragment & Intra-Fragment
Contextual Effect . . . . . . . . . . . 2:1--2:??
Danielle Caled and
Paula Carvalho and
Francisco Sousa and
Mário Silva DOMAIN: Explainable Credibility
Assessment Tools for Empowering Online
Readers Coping with Misinformation . . . 3:1--3:??
Yihong Zhang and
Masumi Shirakawa and
Takahiro Hara Word-Level Political Sentiments Inferred
From Social Media and Application in
Recommendation Diversification . . . . . 4:1--4:??
Nivedita Singh and
Yejin Do and
Yongsang Yu and
Imane Fouad and
Jungrae Kim and
Hyoungshick Kim Crumbled Cookies: Exploring E-commerce
Websites' Cookie Policies with Data
Protection Regulations . . . . . . . . . 5:1--5:??
Harun Oz and
Güliz Seray Tuncay and
Ahmet Aris and
Abbas Acar and
Leonardo Babun and
Selcuk Uluagac Ransomware Over Modern Web Browsers: a
Novel Strain and a New Defense Mechanism 6:1--6:??
Shashank Sheshar Singh and
Samya Muhuri and
Sumit Kumar and
Jayendra Barua From Nodes to Knowledge: Exploring
Social Network Analysis in Education . . 7:1--7:??
Ninghan Chen and
Xihui Chen and
Zhiqiang Zhong and
Jun Pang ``Double vaccinated, 5G boosted!'':
Learning Attitudes towards COVID-19
Vaccination from Social Media . . . . . 8:1--8:??
Piyush Kumar Garg and
Roshni Chakraborty and
Sourav Kumar Dandapat PORTRAIT: a Hybrid Approach to Create
Extractive Ground-truth Summary for
Disaster Event . . . . . . . . . . . . . 9:1--9:??
Ennio Visconti and
Christos Tsigkanos and
Laura Nenzi Automated Monitoring of Web User
Interfaces . . . . . . . . . . . . . . . 10:1--10:??
Raphael Menges and
Steffen Staab and
Christoph Schaefer and
Tina Walber and
Chandan Kumar What Did My Users Experience?
Discovering Visual Stimuli on Graphical
User Interfaces of the Web . . . . . . . 11:1--11:??
Pasquale De Meo and
Ylli Prifti and
Alessandro Provetti Trust Models Go to the Web: Learning How
to Trust Strangers . . . . . . . . . . . 12:1--12:??
Fangyu Yu and
Peng Zhang and
Siyuan Qiao and
Ding, Xianghua (Sharon) and
Tun Lu and
Ning Gu BNoteToDanmu: Category-Guided
Note-to-Danmu Conversion Method for
Learning on Video Sharing Platforms . . 13:1--13:??
Barbara Guidi and
Andrea Michienzi and
Laura Ricci Introduction to the Special Issue on
Advances in Social Media Technologies
and Analysis: Part 1 . . . . . . . . . . 14:1--14:??
Lucio La Cava and
Davide Costa and
Andrea Tagarelli Visually Wired NFTs: Exploring the Role
of Inspiration in Non-Fungible Tokens 15:1--15:??
Meng Zhang and
Xiangyang Luo and
Ningbo Huang and
Yimin Liu and
Shaoyong Du Twitter User Geolocation Based on
Location Feature Enhancement . . . . . . 16:1--16:??
Yinzhou Tang and
Jinghua Piao and
Huandong Wang and
Yue Wang and
Yong Li MSA-Net: a Multi-Scale Information
Diffusion Model Awaring User Activity
Level . . . . . . . . . . . . . . . . . 17:1--17:??
Mirko Franco and
Ombretta Gaggi and
Claudio E. Palazzi Integrating Content Moderation Systems
with Large Language Models . . . . . . . 18:1--18:??
Chao Li and
Runhua Xu and
Balaji Palanisamy and
Li Duan and
Meng Shen and
Jiqiang Liu and
Wei Wang Blockchain Takeovers in Web 3.0: an
Empirical Study on the TRON-Steem
Incident . . . . . . . . . . . . . . . . 19:1--19:??
Haoran Gu and
Shiyuan Zheng and
Xudong Liu and
Hong Xie and
John C. S. Lui Online Incentive Protocol Design for
Reposting Service in Online Social
Networks . . . . . . . . . . . . . . . . 20:1--20:??
Niccol\`o Di Marco and
Sara Brunetti and
Matteo Cinelli and
Walter Quattrociocchi Post-hoc Evaluation of Nodes Influence
in Information Cascades: The Case of
Coordinated Accounts . . . . . . . . . . 21:1--21:??
Massimo La Morgia and
Alessandro Mei and
Alberto Maria Mongardini and
Jie Wu Pretending to be a VIP! Characterization
and Detection of Fake and Clone Channels
on Telegram . . . . . . . . . . . . . . 22:1--22:??
Zohra Beldi and
Malika Bessedik Innovative Integration of Q-learning in
BSO Algorithm for Adaptive Community
Detection in Social Networks . . . . . . 23:1--23:??
Alessia Galdeman and
Cheick Tidiane Ba and
Matteo Zignani and
Sabrina Gaito Exploring Time-Ordered Triadic Closure
in Online Social Networks . . . . . . . 24:1--24:??