2015
DOI: 10.1016/j.knosys.2015.09.008
|View full text |Cite
|
Sign up to set email alerts
|

Predicting individual retweet behavior by user similarity: A multi-task learning approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
24
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(30 citation statements)
references
References 11 publications
0
24
0
Order By: Relevance
“…Much extant research uses statistical modeling to predict retweeting (e.g., Rudat, Buder, & Hesse, ; Suh, Hong, Pirolli, & Chi, ; Tang, Miao, Quan, Tang, & Deng, ; Webberley, Allen, & Whitaker, ), but these researchers provide minimal discussion of why particular tweets are retweeted and fail to consider the implications for social media practitioners. Extant research focuses on using easily appended and analyzed variables including structural elements of a tweet (e.g., the number of hashtags in the tweet) or certain tweet sender characteristics (e.g., number of sender's followers).…”
mentioning
confidence: 99%
“…Much extant research uses statistical modeling to predict retweeting (e.g., Rudat, Buder, & Hesse, ; Suh, Hong, Pirolli, & Chi, ; Tang, Miao, Quan, Tang, & Deng, ; Webberley, Allen, & Whitaker, ), but these researchers provide minimal discussion of why particular tweets are retweeted and fail to consider the implications for social media practitioners. Extant research focuses on using easily appended and analyzed variables including structural elements of a tweet (e.g., the number of hashtags in the tweet) or certain tweet sender characteristics (e.g., number of sender's followers).…”
mentioning
confidence: 99%
“…Dimensión OSN e ID Número Referencias de artículos analizados Sugerencia de conductas 3 (Agrawal et al, 2011), (Aragon et al, 2013, (Chelmis et al, 2013), (Chelmis et al 2014), (Crowne et al, 2015), (Garg et al, 2011), (Heimbach & Hinz, 2016), (Jiang et al, 2014), (Korzynski, 2014), (Levy et al, 2016), (Li et al, 2016), (Liang et al, 2016), (Lim et al, 2011), (Lin et al, 2012), (Lin et al, 2014), (Lipizzi et al, 2016), (Mozafari & Hamzeh, 2015), (Palacios -Marquez et al, 2016), (Roy & Zeng, 2015), (Sankar & Ravindran, 2015), (Smith, 2013), (Subires-Mancera & Olmedo Salar, 2013), (Tang et al, 2015), (Wadhwa & Bhatia, 2015), , (Wu et al, 2015), (Zaglia et al, 2015), (Zhang, 2015), (Zhao et al, 2011), (Zinoviev, 2011).…”
Section: Análisis De Datosmentioning
confidence: 99%
“…Liu and Terzi [10] approached the privacy issues raised in online social networks from the individual users viewpoint: they proposed a framework to compute the privacy score of a user. Tang et al [20] adopted a "microeconomics" approach to a model and predicted the individual retweet behavior. Xu et al [22] introduced several methods to identify online communities with similar sentiments in online social networks.…”
Section: Introductionmentioning
confidence: 99%