@book{rihoux2009configurational, address = {Thousand Oaks, Calif. [u.a.]}, author = {Rihoux, Benoit}, format = {book}, interhash = {6089944dda2f848dfd207518b51eca82}, intrahash = {76ac70b1de9a2d85e1bfeb709e66dfc4}, isbn = {9781412942355}, locations = {102599440~$~10259953X~$~10259953X}, partauthors = {Rihoux, Benoit}, publisher = {Sage Publ.}, series = {Applied social research methods series}, shortsubtitle = {: qualitative comparative analysis (QCA) and related techniques}, shorttitle = {Configurational comparative methods : qualitative comparative analysis (QCA) and related techniques}, signatures = {25 Wir AF 0173~$~85 gew B 4.2.1 CON~$~85 gew B 4.2.1CON}, subtitle = {qualitative comparative analysis (QCA) and related techniques / Benoît Rihoux ...}, title = {Configurational comparative methods : qualitative comparative analysis (QCA) and related techniques}, titlestatement = {Benoît Rihoux ...}, uniqueid = {HEB205698220}, url = {http://scans.hebis.de/HEBCGI/show.pl?20569822_toc.pdf}, volume = 51, year = 2009 } @electronic{schneider2012settheoretic, address = {Cambridge}, author = {Schneider, Carsten Q. and Wagemann, Claudius}, format = {ebook}, interhash = {cbc0ba4509c289c3d455b4af0e1d5759}, intrahash = {1633a43d6ace012e5504d79cef1849f1}, isbn = {9781283610834 (Sekundärausgabe)}, partauthors = {Wagemann, Claudius}, primaryauthor = {Schneider, Carsten Q.}, publisher = {Cambridge University Press}, series = {Strategies for social inquiry}, shortsubtitle = {: a guide to qualitative comparative analysis}, shorttitle = {Set-theoretic methods for the social sciences : a guide to qualitative comparative analysis}, subtitle = {[Elektronische Ressource] : a guide to qualitative comparative analysis / Carsten Q. Schneider and Claudius Wagemann}, title = {Set-theoretic methods for the social sciences : a guide to qualitative comparative analysis}, titlestatement = {Carsten Q. Schneider and Claudius Wagemann}, uniqueid = {HEB32198062X}, url = {http://lib.myilibrary.com?id=392328}, year = 2012 } @inproceedings{stumme01conceptualclustering, address = {Universität Dortmund 763}, author = {Stumme, G. and Taouil, R. and Bastide, Y. and Lakhal, L.}, booktitle = {Proc. GI-Fachgruppentreffen Maschinelles Lernen (FGML'01)}, editor = {Klinkenberg, R. and Rüping, S. and Fick, A. and Henze, N. and Herzog, C. and Molitor, R. and Schröder, O.}, interhash = {c99f2ae002435208c58f9244d298a10b}, intrahash = {f4ec21d5f63dbc213a3a6eae076c4b62}, month = {October}, title = {Conceptual Clustering with Iceberg Concept Lattices}, url = {http://www.kde.cs.uni-kassel.de/stumme/papers/2001/FGML01.pdf}, year = 2001 } @article{journals/expert/RehakPGSBC09, author = {Rehák, Martin and Pechoucek, Michal and Grill, Martin and Stiborek, Jan and Bartos, Karel and Celeda, Pavel}, ee = {http://doi.ieeecomputersociety.org/10.1109/MIS.2009.42}, interhash = {878f9ec500bf1b485f337afe0abe1801}, intrahash = {502b8b47f7e3ee930f2d79bde0b29d76}, journal = {IEEE Intelligent Systems}, number = 3, pages = {16-25}, title = {Adaptive Multiagent System for Network Traffic Monitoring.}, url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.149.3921&rep=rep1&type=pdf}, volume = 24, year = 2009 } @article{duartetorres2014analysis, abstract = {The Internet is increasingly used by young children for all kinds of purposes. Nonetheless, there are not many resources especially designed for children on the Internet and most of the content online is designed for grown-up users. This situation is problematic if we consider the large differences between young users and adults since their topic interests, computer skills, and language capabilities evolve rapidly during childhood. There is little research aimed at exploring and measuring the difficulties that children encounter on the Internet when searching for information and browsing for content. In the first part of this work, we employed query logs from a commercial search engine to quantify the difficulties children of different ages encounter on the Internet and to characterize the topics that they search for. We employed query metrics (e.g., the fraction of queries posed in natural language), session metrics (e.g., the fraction of abandoned sessions), and click activity (e.g., the fraction of ad clicks). The search logs were also used to retrace stages of child development. Concretely, we looked for changes in interests (e.g., the distribution of topics searched) and language development (e.g., the readability of the content accessed and the vocabulary size). In the second part of this work, we employed toolbar logs from a commercial search engine to characterize the browsing behavior of young users, particularly to understand the activities on the Internet that trigger search. We quantified the proportion of browsing and search activity in the toolbar sessions and we estimated the likelihood of a user to carry out search on the Web vertical and multimedia verticals (i.e., videos and images) given that the previous event is another search event or a browsing event. We observed that these metrics clearly demonstrate an increased level of confusion and unsuccessful search sessions among children. We also found a clear relation between the reading level of the clicked pages and characteristics of the users such as age and educational attainment. In terms of browsing behavior, children were found to start their activities on the Internet with a search engine (instead of directly browsing content) more often than adults. We also observed a significantly larger amount of browsing activity for the case of teenager users. Interestingly we also found that if children visit knowledge-related Web sites (i.e., information-dense pages such as Wikipedia articles), they subsequently do more Web searches than adults. Additionally, children and especially teenagers were found to have a greater tendency to engage in multimedia search, which calls to improve the aggregation of multimedia results into the current search result pages.}, acmid = {2555595}, address = {New York, NY, USA}, articleno = {7}, author = {Duarte Torres, Sergio and Weber, Ingmar and Hiemstra, Djoerd}, doi = {10.1145/2555595}, interhash = {d424ae624f1065d6616609d7356c4b21}, intrahash = {c3377980acb82b95a518eb7806f9c592}, issn = {1559-1131}, issue_date = {March 2014}, journal = {ACM Transactions on the Web}, month = mar, number = 2, numpages = {54}, pages = {7:1--7:54}, publisher = {ACM}, title = {Analysis of Search and Browsing Behavior of Young Users on the Web}, url = {http://doi.acm.org/10.1145/2555595}, volume = 8, year = 2014 } @article{thomas2014using, abstract = {A user's behaviour when browsing a Web site contains clues to that user's experience. It is possible to record some of these behaviours automatically, and extract signals that indicate a user is having trouble finding information. This allows for Web site analytics based on user experiences, not just page impressions. A series of experiments identified user browsing behaviours—such as time taken and amount of scrolling up a page—which predict navigation difficulty and which can be recorded with minimal or no changes to existing sites or browsers. In turn, patterns of page views correlate with these signals and these patterns can help Web authors understand where and why their sites are hard to navigate. A new software tool, “LATTE,” automates this analysis and makes it available to Web authors in the context of the site itself.}, acmid = {2656343}, address = {New York, NY, USA}, articleno = {24}, author = {Thomas, Paul}, doi = {10.1145/2656343}, interhash = {b570b16074de8ee1b2db9fcf1061d16b}, intrahash = {06035bc4bd2c62d7dba957ad4410d7b3}, issn = {1559-1131}, issue_date = {October 2014}, journal = {ACM Transactions on the Web}, month = nov, number = 4, numpages = {41}, pages = {24:1--24:41}, publisher = {ACM}, title = {Using Interaction Data to Explain Difficulty Navigating Online}, url = {http://doi.acm.org/10.1145/2656343}, volume = 8, year = 2014 } @article{cerinek2015network, abstract = {We analyze the data about works (papers, books) from the time period 1990–2010 that are collected in Zentralblatt MATH database. The data were converted into four 2-mode networks (works }, author = {Cerinšek, Monika and Batagelj, Vladimir}, doi = {10.1007/s11192-014-1419-z}, interhash = {e65f748684210857bb19dc7f69d65f86}, intrahash = {bcba93fd0e6381289c489cbab20bbec7}, issn = {0138-9130}, journal = {Scientometrics}, language = {English}, number = 1, pages = {977-1001}, publisher = {Springer Netherlands}, title = {Network analysis of Zentralblatt MATH data}, url = {http://dx.doi.org/10.1007/s11192-014-1419-z}, volume = 102, year = 2015 } @article{grimmer2013text, author = {Grimmer, Justin and Stewart, Brandon M}, interhash = {eb68e01ef4168a398d79f408042fe529}, intrahash = {76001ebc726700bef81886d2e285b7cf}, journal = {Political Analysis}, pages = {mps028}, publisher = {SPM-PMSAPSA}, title = {Text as data: The promise and pitfalls of automatic content analysis methods for political texts}, year = 2013 } @article{SSQU:SSQU478, abstract = {Objective. This study is an effort to produce a more systematic, empirically-based, historical-comparative understanding of media bias than generally is found in previous works.Methods. The research employs a quantitative measure of ideological bias in a formal content analysis of the United States' two largest circulation news magazines, Time and Newsweek. Findings are compared with the results of an identical examination of two of the nation's leading partisan journals, the conservative National Review and the liberal Progressive.Results. Bias scores reveal stark differences between the mainstream and the partisan news magazines' coverage of four issue areas: crime, the environment, gender, and poverty.Conclusion. Data provide little support for those claiming significant media bias in either ideological direction.}, author = {Covert, Tawnya J. Adkins and Wasburn, Philo C.}, doi = {10.1111/j.1540-6237.2007.00478.x}, interhash = {9276222b3b8684048db1e42c3a9f3409}, intrahash = {81474f00e1605d45462e23f743dc88bb}, issn = {1540-6237}, journal = {Social Science Quarterly}, number = 3, pages = {690--706}, publisher = {Blackwell Publishing Inc}, title = {Measuring Media Bias: A Content Analysis of Time and Newsweek Coverage of Domestic Social Issues, 1975–2000*}, url = {http://dx.doi.org/10.1111/j.1540-6237.2007.00478.x}, volume = 88, year = 2007 } @misc{karampatziakis2013discriminative, abstract = {Representing examples in a way that is compatible with the underlying classifier can greatly enhance the performance of a learning system. In this paper we investigate scalable techniques for inducing discriminative features by taking advantage of simple second order structure in the data. We focus on multiclass classification and show that features extracted from the generalized eigenvectors of the class conditional second moments lead to classifiers with excellent empirical performance. Moreover, these features have attractive theoretical properties, such as inducing representations that are invariant to linear transformations of the input. We evaluate classifiers built from these features on three different tasks, obtaining state of the art results.}, author = {Karampatziakis, Nikos and Mineiro, Paul}, interhash = {befee5ff60893632b4a38edb54e7c975}, intrahash = {47512dd90370c769bfd328d8fd8179ef}, note = {cite arxiv:1310.1934}, title = {Discriminative Features via Generalized Eigenvectors}, url = {http://arxiv.org/abs/1310.1934}, year = 2013 } @inproceedings{Kando99textstructure, abstract = {This paper describes an information retrieval system with the function to support user's use of the retrieved documents using the text-level structure of documents. The text-level structure of each document is described by the occurrence of typical functional components in the text. Automatic detection of the components has been attempted in previous works using surface-level language processing. The proposed system firstly utilizes the text structure to conduct high-precision searches of documents or passages by distinguishing the role or function each concept plays in the text. It also allows browsing or skimming of retrieved texts, creating summaries on-the-fly with various levels of condensation specified by the user. Moreover, the system can search and display any unit of a text such as a sentence, a paragraph or a chapter. Comparison of relevant passages in retrieved documents across multiple texts is helpful for users to examine, analyze, compare and integrate texts and...}, author = {Kando, Noriko}, booktitle = {IN PROCEEDINGS OF THE 4TH INTERNATIONAL WORKSHOP ON INFORMATION RETRIEVAL WITH ASIAN LANGUAGES}, interhash = {7cd913f37b21579ee636dc5036cca292}, intrahash = {94d62d9f3ef51731ea1edc03662616d9}, pages = {126--135}, title = {Text Structure Analysis as a Tool to Make Retrieved Documents Usable}, url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.34.3165}, year = 1999 } @inproceedings{schneider2009understanding, abstract = {Online Social Networks (OSNs) have already attracted more than half a billion users. However, our understanding of which OSN features attract and keep the attention of these users is poor. Studies thus far have relied on surveys or interviews of OSN users or focused on static properties, e. g., the friendship graph, gathered via sampled crawls. In this paper, we study how users actually interact with OSNs by extracting clickstreams from passively monitored network traffic. Our characterization of user interactions within the OSN for four different OSNs (Facebook, LinkedIn, Hi5, and StudiVZ) focuses on feature popularity, session characteristics, and the dynamics within OSN sessions. We find, for example, that users commonly spend more than half an hour interacting with the OSNs while the byte contributions per OSN session are relatively small.}, acmid = {1644899}, address = {New York, NY, USA}, author = {Schneider, Fabian and Feldmann, Anja and Krishnamurthy, Balachander and Willinger, Walter}, booktitle = {Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference}, doi = {10.1145/1644893.1644899}, interhash = {69b16bc81a34c976ea724b5e82ba2d8e}, intrahash = {f7ef42a9ba8edf63b6079a053d6bb9c6}, isbn = {978-1-60558-771-4}, location = {Chicago, Illinois, USA}, numpages = {14}, pages = {35--48}, publisher = {ACM}, series = {IMC '09}, title = {Understanding Online Social Network Usage from a Network Perspective}, url = {http://doi.acm.org/10.1145/1644893.1644899}, year = 2009 } @inproceedings{benevenuto2009characterizing, abstract = {Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, richer studies of social interactions, and improved design of content distribution systems. In this paper, we present a first of a kind analysis of user workloads in online social networks. Our study is based on detailed clickstream data, collected over a 12-day period, summarizing HTTP sessions of 37,024 users who accessed four popular social networks: Orkut, MySpace, Hi5, and LinkedIn. The data were collected from a social network aggregator website in Brazil, which enables users to connect to multiple social networks with a single authentication. Our analysis of the clickstream data reveals key features of the social network workloads, such as how frequently people connect to social networks and for how long, as well as the types and sequences of activities that users conduct on these sites. Additionally, we crawled the social network topology of Orkut, so that we could analyze user interaction data in light of the social graph. Our data analysis suggests insights into how users interact with friends in Orkut, such as how frequently users visit their friends' or non-immediate friends' pages. In summary, our analysis demonstrates the power of using clickstream data in identifying patterns in social network workloads and social interactions. Our analysis shows that browsing, which cannot be inferred from crawling publicly available data, accounts for 92% of all user activities. Consequently, compared to using only crawled data, considering silent interactions like browsing friends' pages increases the measured level of interaction among users.}, acmid = {1644900}, address = {New York, NY, USA}, author = {Benevenuto, Fabr\'{\i}cio and Rodrigues, Tiago and Cha, Meeyoung and Almeida, Virg\'{\i}lio}, booktitle = {Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference}, doi = {10.1145/1644893.1644900}, interhash = {ed9b10d4f36f90ddde9b95ce45b0b0be}, intrahash = {e5e25244e1ca2316a7871727e2df2bb9}, isbn = {978-1-60558-771-4}, location = {Chicago, Illinois, USA}, numpages = {14}, pages = {49--62}, publisher = {ACM}, series = {IMC '09}, title = {Characterizing User Behavior in Online Social Networks}, url = {http://doi.acm.org/10.1145/1644893.1644900}, year = 2009 } @inproceedings{lorince2014supertagger, author = {Lorince, Jared and Zorowitz, Sam and Murdock, Jaimie and Todd, Peter}, interhash = {4af29810e9c882dc18f560527c65de2f}, intrahash = {014abc7dc30e38859c5e8605dce1a8f6}, title = {“Supertagger” Behavior in Building Folksonomies}, year = 2014 } @inproceedings{Sedgewick96, author = {Sedgewick, Robert}, booktitle = {ESA}, editor = {Díaz, Josep and Serna, Maria J.}, ee = {http://dx.doi.org/10.1007/3-540-61680-2_42}, interhash = {0594c31c1838ff65f77a0dca32ca92b6}, intrahash = {a0f574d6dfc03e06162c839c8d46eb9f}, isbn = {3-540-61680-2}, pages = {1-11}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, title = {Analysis of Shellsort and Related Algorithms.}, url = {http://dblp.uni-trier.de/db/conf/esa/esa96.html#Sedgewick96}, volume = 1136, year = 1996 } @article{astrachan2003bubble, author = {Astrachan, O.}, interhash = {a7b4dd529c860c4c616849b8438862f8}, intrahash = {5fcb1d8f6fb02d8894bffd1f8d348c75}, journal = {SIGCSE BULLETIN}, month = {1}, number = {PART 1}, title = {Bubble Sort: An Archaeological Algorithmic Analysis}, uniqueid = {RN128498059|edsbl}, volume = 35, year = 2003 } @incollection{millen2007social, abstract = {In this paper, we explore various search tasks that are supported by a social bookmarking service. These bookmarking services hold great potential to powerfully combine personal tagging of information sources with interactive browsing, resulting in better social navigation. While there has been considerable interest in social tagging systems in recent years, little is known about their actual usage. In this paper, we present the results of a field study of a social bookmarking service that has been deployed in a large enterprise. We present new qualitative and quantitative data on how a corporate social tagging system was used, through both event logs (click level analysis) and interviews. We observed three types of search activities: community browsing, personal search, and explicit search. Community browsing was the most frequently used, and confirms the value of the social aspects of the system. We conclude that social bookmarking services support various kinds of exploratory search, and provide better personal bookmark management and enhance social navigation.}, author = {Millen, David R. and Yang, Meng and Whittaker, Steven and Feinberg, Jonathan}, booktitle = {ECSCW 2007}, doi = {10.1007/978-1-84800-031-5_2}, editor = {Bannon, Liam J. and Wagner, Ina and Gutwin, Carl and Harper, Richard H.R. and Schmidt, Kjeld}, interhash = {8f316838202ce31c603f8576a56532ff}, intrahash = {08aa0611b1f4e01f2dfd760dc5969b82}, isbn = {978-1-84800-030-8}, pages = {21-40}, publisher = {Springer London}, title = {Social bookmarking and exploratory search}, url = {http://dx.doi.org/10.1007/978-1-84800-031-5_2}, year = 2007 } @article{Hoonlor:2013:TCS:2507771.2500892, abstract = {Keywords in the ACM Digital Library and IEEE Xplore digital library and in NSF grants anticipate future CS research.}, acmid = {2500892}, address = {New York, NY, USA}, author = {Hoonlor, Apirak and Szymanski, Boleslaw K. and Zaki, Mohammed J.}, doi = {10.1145/2500892}, interhash = {425133ebceab2bce5f418ffd9917df55}, intrahash = {4a2aee492bfcfcdbbcc7774bdcddd4a2}, issn = {0001-0782}, issue_date = {October 2013}, journal = {Commun. ACM}, month = oct, number = 10, numpages = {10}, pages = {74--83}, publisher = {ACM}, title = {Trends in Computer Science Research}, url = {http://doi.acm.org/10.1145/2500892}, volume = 56, year = 2013 } @article{liu2012fulltext, author = {Liu, Xiaozhong and Zhang, Jinsong and Guo, Chun}, interhash = {011df26355ad51a88947017fd2791a98}, intrahash = {f9c6133bf4503003822f99860f864698}, journal = {Journal of the American Society for Information Science and Technology}, title = {Full-Text Citation Analysis: A New Method to Enhance Scholarly Network}, url = {http://discern.uits.iu.edu:8790/publication/Full%20text%20citation.pdf}, year = 2012 } @book{atzmueller2013ubiquitous, address = {Berlin, Heidelberg}, editor = {Atzmueller, Martin and Chin, Alvin and Helic, Denis and Hotho, Andreas}, interhash = {b0fcec93b875c8b0060087bc07944e89}, intrahash = {1e2d036351662d35ef95719554d37e46}, isbn = {9783642453915 3642453910 9783642453922 3642453929}, publisher = {Imprint: Springer}, refid = {867052137}, title = {Ubiquitous Social Media Analysis Third International Workshops, MUSE 2012, Bristol, UK, September 24, 2012, and MSM 2012, Milwaukee, WI, USA, June 25, 2012, Revised Selected Papers}, url = {http://link.springer.com/book/10.1007/978-3-642-45392-2}, year = 2013 }