Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
ACM Transactions on Information Systems
ACM Press
  1-10 of 214 reviews Date Reviewed 
  Joint modeling of user check-in behaviors for real-time point-of-interest recommendation
Yin H., Cui B., Zhou X., Wang W., Huang Z., Sadiq S.  ACM Transactions on Information Systems 35(2): Article No. 11, 2016. Type: Article

In order to predict and recommend the points of interest (POIs) for a given combination of user, current location, and time, a joint probabilistic generative model called the topic region model (TRM) is presented. It combines user interests and us...

Apr 26 2017
  Social question answering: textual, user, and network features for best answer prediction
Molino P., Aiello L., Lops P.  ACM Transactions on Information Systems 35(1): 1-40, 2016. Type: Article

This paper combines a good review of the main techniques used in community question-answering (CQA) systems with an extensive and systematic study that compares the effect of using different sets of features for the task of predicting the best ans...

Nov 11 2016
  Diversifying query auto-completion
Cai F., Reinanda R., De Rijke M.  ACM Transactions on Information Systems 34(4): 1-33, 2016. Type: Article

In an era when many aspects of artificial intelligence (AI) and machine learning (ML) are increasing in popularity because of the proliferation of technology via a range of representational state transfer (REST) application programming interfaces ...

Sep 14 2016
  Digital wildfires: propagation, verification, regulation, and responsible innovation
Webb H., Burnap P., Procter R., Rana O., Stahl B., Williams M., Housley W., Edwards A., Jirotka M.  ACM Transactions on Information Systems 34(3): 1-23, 2016. Type: Article

“Digital wildfire” describes the rapid spread of “rumor and false/malicious information.” The authors provide an excellent review of research concerning how this occurs and where the gaps are in contemporary research. They ...

May 25 2016
  User activity patterns during information search
Cole M., Hendahewa C., Belkin N., Shah C.  ACM Transactions on Information Systems 33(1): 1-39, 2015. Type: Article

The activity pattern analysis methodology is presented to detect different types of search tasks during information searches. The observable data from search task sessions include different page-related activities, such as seeing or revisiting a c...

Sep 28 2015
  Deep dependency substructure-based learning for multidocument summarization
Yan S., Wan X.  ACM Transactions on Information Systems 34(1): 1-24, 2015. Type: Article

Summarization aims to make the information content of a document efficiently accessible. In extractive summarization, sentences of a document are ranked by their importance and top-scoring sentences are selected according to a given summary length...

Sep 28 2015
  Trust prediction via belief propagation
Zhang R., Mao Y.  ACM Transactions on Information Systems 32(3): 1-27, 2014. Type: Article

Assessing trust relationships in social networks is vital for a lot of applications. However, the problem is challenging as trust relationships are often not directly observable. The goal of this paper is to predict trust relationships not yet obs...

Nov 11 2014
  The impacts of structural difference and temporality of tweets on retrieval effectiveness
Jia L., Yu C., Meng W.  ACM Transactions on Information Systems 31(4): 1-38, 2013. Type: Article

A novel method of evaluating tweets is introduced in this paper. Most retrieval algorithms do not differentiate the structure of tweets. The authors show convincingly that it does have an impact on retrieval effectiveness. In their study, two type...

Mar 28 2014
  Improving text classification accuracy by training label cleaning
Esuli A., Sebastiani F.  ACM Transactions on Information Systems 31(4): 1-28, 2013. Type: Article

A large-scale study on the use of training label cleaning (TLC) to improve text classification is described in this paper. The purpose of TLC is to identify potentially mislabeled instances in a training dataset, and to flag them for closer inspec...

Feb 12 2014
  Enriching documents with examples: a corpus mining approach
Kim J., Lee S., Hwang S., Kim S.  ACM Transactions on Information Systems 31(1): 1-27, 2013. Type: Article

For a compiler fan, it’s great seeing a system that parses code into abstract syntax trees (ASTs) to find, relate, and then generate semantically relevant and illustrative code samples. This paper describes a new data mining approach, called...

Aug 13 2013
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy