@inproceedings{singer2015hyptrails, address = {Firenze, Italy}, author = {Singer, P. and Helic, D. and Hotho, A. and Strohmaier, M.}, booktitle = {24th International World Wide Web Conference (WWW2015)}, interhash = {d33e150aa37dcd618388960286f8a46a}, intrahash = {5d21e53dc91b35a4a6cb6b9ec858045d}, month = {May 18 - May 22}, organization = {ACM}, publisher = {ACM}, title = {Hyptrails: A bayesian approach for comparing hypotheses about human trails}, url = {http://www.www2015.it/documents/proceedings/proceedings/p1003.pdf}, year = 2015 } @article{sun2013social, author = {Sun, Xiaoling and Kaur, Jasleen and Milojevic, Stasa and Flammini, Alessandro and Menczer, Filippo}, comment = {10.1038/srep01069}, interhash = {5cd31392e997555d78596f962044f84b}, intrahash = {ed28353b082f3ccbd23ea85ea9d7c8e5}, journal = {Sci. Rep.}, month = jan, publisher = {Macmillan Publishers Limited. All rights reserved}, title = {Social Dynamics of Science}, url = {http://dx.doi.org/10.1038/srep01069}, volume = 3, year = 2013 } @article{haustein2011applying, abstract = {Web 2.0 technologies are finding their way into academics: specialized social bookmarking services allow researchers to store and share scientific literature online. By bookmarking and tagging articles, academic prosumers generate new information about resources, i.e. usage statistics and content description of scientific journals. Given the lack of global download statistics, the authors propose the application of social bookmarking data to journal evaluation. For a set of 45 physics journals all 13,608 bookmarks from CiteULike, Connotea and BibSonomy to documents published between 2004 and 2008 were analyzed. This article explores bookmarking data in \{STM\} and examines in how far it can be used to describe the perception of periodicals by the readership. Four basic indicators are defined, which analyze different aspects of usage: Usage Ratio, Usage Diffusion, Article Usage Intensity and Journal Usage Intensity. Tags are analyzed to describe a reader-specific view on journal content. }, author = {Haustein, Stefanie and Siebenlist, Tobias}, doi = {http://dx.doi.org/10.1016/j.joi.2011.04.002}, interhash = {13fe59aae3d6ef95b529ffe00ede4126}, intrahash = {c3e49ee7b0ed81ecd126d3ef76d5f407}, issn = {1751-1577}, journal = {Journal of Informetrics }, number = 3, pages = {446 - 457}, title = {Applying social bookmarking data to evaluate journal usage }, url = {http://www.sciencedirect.com/science/article/pii/S1751157711000393}, volume = 5, year = 2011 } @article{steenweg2010publikationsmanagement, abstract = {An den Hochschulen kommt der Förderung einer zeitgemäßen Publikationsumgebung steigende Bedeutung zu. Die Interessenlage ist vielschichtig. Autoren möchten eine komfortable Arbeitsumgebung, die Hochschulpräsidien benötigen Forschungsinformationen und die Bibliotheken wollen passende Informationsinfrastrukturen bereitzustellen. An der Universität Kassel wurde ausgehend vom Bedürfnis des wissenschaftlichen Autors in einem Pilotprojekt (PUMA) versucht, diese Interessen zu einem Publikationsmanagement zu vereinbaren. Für den Autor wird in PUMA bei deutlich geringerem Einsatz ein erheblicher Mehrwert dadurch generiert, dass bei nur einmaligen Anmelden mit dem Bibliotheks-Account ein Social-Bookmarking-System (BibSonomy) zur Verfügung steht, automatisiert Informationen an den Forschungsbericht weitergegeben, Metadaten und Dateien in Repositorien gestellt und Schriftenverzeichnisse (Curriculum Vitae) für Homepages etc. erstellt werden können.}, author = {Steenweg, Helge}, interhash = {f7b1d913b85a3d4b5ae1256c77ffa9e5}, intrahash = {bca65ebab3f638fae16a46620c4fb08a}, journal = {ABI-Technik}, number = 2, pages = {130-138.}, title = {Publikationsmanagement - eine wichtige zukünftige Aufgabe an Hochschulen. Wie sind Forschungsbericht, Institutional Repository und die Interessen des wissenschaftlichen Autors vereinbar? - Das Projekt PUMA}, volume = 30, year = 2010 } @inproceedings{doerfel2014evaluating, author = {Doerfel, Stephan and Zoller, Daniel and Singer, Philipp and Niebler, Thomas and Hotho, Andreas and Strohmaier, Markus}, bibsource = {dblp computer science bibliography, http://dblp.org}, booktitle = {Proceedings of the 16th {LWA} Workshops: KDML, {IR} and FGWM, Aachen, Germany, September 8-10, 2014.}, editor = {Seidl, Thomas and Hassani, Marwan and Beecks, Christian}, interhash = {955cd7c6f7652b7c531b699464925b1f}, intrahash = {4b2e73c82b5a84e1959ad66aaad4a235}, pages = {18--19}, publisher = {CEUR-WS.org}, title = {Evaluating Assumptions about Social Tagging - {A} Study of User Behavior in BibSonomy}, url = {http://ceur-ws.org/Vol-1226/paper06.pdf}, year = 2014 } @article{noy2008challenge, abstract = {The great success of Web 2.0 is mainly fuelled by an infrastructure that allows web users to create, share, tag, and connect content and knowledge easily. The tools for developing structured knowledge in this manner have started to appear as well. However, there are few, if any, user studies that are aimed at understanding what users expect from such tools, what works and what doesn't. We organized the Collaborative Knowledge Construction (CKC) Challenge to assess the state of the art for the tools that support collaborative processes for creation of various forms of structured knowledge. The goal of the Challenge was to get users to try out different tools and to learn what users expect from such tools-features that users need, features that they like or dislike. The Challenge task was to construct structured knowledge for a portal that would provide information about research. The Challenge design contained several incentives for users to participate. Forty-nine users registered for the Challenge; thirty-three of them participated actively by using the tools. We collected extensive feedback from the users where they discussed their thoughts on all the tools that they tried. In this paper, we present the results of the Challenge, discuss the features that users expect from tools for collaborative knowledge constructions, the features on which Challenge participants disagreed, and the lessons that we learned.}, author = {Noy, N F and Chugh, A and Alani, H}, doi = {10.1109/MIS.2008.14}, interhash = {df2e2abfd18d3b415d4b6a7cac970286}, intrahash = {98dcb79390913054e6255e605223f4b2}, journal = {IEEE Intell Syst}, month = {1}, number = 1, pages = {64-68}, pmid = {24683367}, title = {The CKC Challenge: Exploring Tools for Collaborative Knowledge Construction}, url = {http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3966208/}, volume = 23, year = 2008 } @article{Benz:2010:SBP:1921763.1921804, abstract = {Social resource sharing systems are central elements of the Web 2.0 and use the same kind of lightweight knowledge representation, called folksonomy. Their large user communities and ever-growing networks of user-generated content have made them an attractive object of investigation for researchers from different disciplines like Social Network Analysis, Data Mining, Information Retrieval or Knowledge Discovery. In this paper, we summarize and extend our work on different aspects of this branch of Web 2.0 research, demonstrated and evaluated within our own social bookmark and publication sharing system BibSonomy, which is currently among the three most popular systems of its kind. We structure this presentation along the different interaction phases of a user with our system, coupling the relevant research questions of each phase with the corresponding implementation issues. This approach reveals in a systematic fashion important aspects and results of the broad bandwidth of folksonomy research like capturing of emergent semantics, spam detection, ranking algorithms, analogies to search engine log data, personalized tag recommendations and information extraction techniques. We conclude that when integrating a real-life application like BibSonomy into research, certain constraints have to be considered; but in general, the tight interplay between our scientific work and the running system has made BibSonomy a valuable platform for demonstrating and evaluating Web 2.0 research.}, acmid = {1921804}, address = {Secaucus, NJ, USA}, author = {Benz, Dominik and Hotho, Andreas and J\"{a}schke, Robert and Krause, Beate and Mitzlaff, Folke and Schmitz, Christoph and Stumme, Gerd}, doi = {10.1007/s00778-010-0208-4}, interhash = {e65eac84a375ab707492051fadc77db2}, intrahash = {cf9f0462a31f4816126046133bb497e1}, issn = {1066-8888}, issue_date = {December 2010}, journal = {The VLDB Journal}, month = dec, number = 6, numpages = {27}, pages = {849--875}, publisher = {Springer-Verlag New York, Inc.}, title = {The Social Bookmark and Publication Management System Bibsonomy}, url = {http://dx.doi.org/10.1007/s00778-010-0208-4}, volume = 19, year = 2010 } @incollection{benz2010academic, abstract = {The PUMA project fosters the Open Access movement und aims at a better support of the researcher’s publication work. PUMA stands for an integrated solution, where the upload of a publication results automatically in an update of both the personal and institutional homepage, the creation of an entry in a social bookmarking systems like BibSonomy, an entry in the academic reporting system of the university, and its publication in the institutional repository. In this poster, we present the main features of our solution.}, author = {Benz, Dominik and Hotho, Andreas and Jäschke, Robert and Stumme, Gerd and Halle, Axel and Gerlach Sanches Lima, Angela and Steenweg, Helge and Stefani, Sven}, booktitle = {Research and Advanced Technology for Digital Libraries}, doi = {10.1007/978-3-642-15464-5_46}, editor = {Lalmas, Mounia and Jose, Joemon and Rauber, Andreas and Sebastiani, Fabrizio and Frommholz, Ingo}, interhash = {db94bafecb815048ede11f6d28e5a9f1}, intrahash = {5711a3b7425fbae328bf0e755defb7dc}, isbn = {978-3-642-15463-8}, pages = {417-420}, publisher = {Springer Berlin Heidelberg}, series = {Lecture Notes in Computer Science}, title = {Academic Publication Management with PUMA – Collect, Organize and Share Publications}, url = {http://dx.doi.org/10.1007/978-3-642-15464-5_46}, volume = 6273, year = 2010 } @article{noKey, abstract = {Soziale Tagging-Systeme gehören zu den in den vergangenen Jahren entstandenen Web2.0-Systemen. Sie ermöglichen es Anwendern, beliebige Informationen in das Internet einzustellen und untereinander auszutauschen. Je nach Anbieter verlinken Nutzer Videos, Fotos oder Webseiten und beschreiben die eingestellten Medien mit entsprechenden Schlagwörtern (Tags). Die damit einhergehende freiwillige Preisgabe oftmals persönlicher Informationen wirft Fragen im Bereich der informationellen Selbstbestimmung auf. Dieses Grundrecht gewährleistet dem Einzelnen, grundsätzlich selbst über die Preisgabe und Verwendung seiner persönlichen Daten zu bestimmen. Für viele Funktionalitäten, wie beispielsweise Empfehlungsdienste oder die Bereitstellung einer API, ist eine solche Kontrolle allerdings schwierig zu gestalten. Oftmals existieren keine Richtlinien, inwieweit Dienstanbieter und weitere Dritte diese öffentlichen Daten (und weitere Daten, die bei der Nutzung des Systems anfallen) nutzen dürfen. Dieser Artikel diskutiert anhand eines konkreten Systems typische, für den Datenschutz relevante Funktionalitäten und gibt Handlungsanweisungen für eine datenschutzkonforme technische Gestaltung. }, author = {Krause, Beate and Lerch, Hana and Hotho, Andreas and Roßnagel, Alexander and Stumme, Gerd}, doi = {10.1007/s00287-010-0485-8}, interhash = {3fca17b13ee1c002f41d3a2a4594b3e2}, intrahash = {312a16fb92f6f1bc176ef917018d350c}, issn = {0170-6012}, journal = {Informatik-Spektrum}, language = {German}, number = 1, pages = {12-23}, publisher = {Springer-Verlag}, title = {Datenschutz im Web 2.0 am Beispiel des sozialen Tagging-Systems BibSonomy}, url = {http://dx.doi.org/10.1007/s00287-010-0485-8}, volume = 35, year = 2012 } @article{noKey, abstract = {Soziale Tagging-Systeme gehören zu den in den vergangenen Jahren entstandenen Web2.0-Systemen. Sie ermöglichen es Anwendern, beliebige Informationen in das Internet einzustellen und untereinander auszutauschen. Je nach Anbieter verlinken Nutzer Videos, Fotos oder Webseiten und beschreiben die eingestellten Medien mit entsprechenden Schlagwörtern (Tags). Die damit einhergehende freiwillige Preisgabe oftmals persönlicher Informationen wirft Fragen im Bereich der informationellen Selbstbestimmung auf. Dieses Grundrecht gewährleistet dem Einzelnen, grundsätzlich selbst über die Preisgabe und Verwendung seiner persönlichen Daten zu bestimmen. Für viele Funktionalitäten, wie beispielsweise Empfehlungsdienste oder die Bereitstellung einer API, ist eine solche Kontrolle allerdings schwierig zu gestalten. Oftmals existieren keine Richtlinien, inwieweit Dienstanbieter und weitere Dritte diese öffentlichen Daten (und weitere Daten, die bei der Nutzung des Systems anfallen) nutzen dürfen. Dieser Artikel diskutiert anhand eines konkreten Systems typische, für den Datenschutz relevante Funktionalitäten und gibt Handlungsanweisungen für eine datenschutzkonforme technische Gestaltung. }, author = {Krause, Beate and Lerch, Hana and Hotho, Andreas and Roßnagel, Alexander and Stumme, Gerd}, doi = {10.1007/s00287-010-0485-8}, interhash = {3fca17b13ee1c002f41d3a2a4594b3e2}, intrahash = {312a16fb92f6f1bc176ef917018d350c}, issn = {0170-6012}, journal = {Informatik-Spektrum}, language = {German}, number = 1, pages = {12-23}, publisher = {Springer-Verlag}, title = {Datenschutz im Web 2.0 am Beispiel des sozialen Tagging-Systems BibSonomy}, url = {http://dx.doi.org/10.1007/s00287-010-0485-8}, volume = 35, year = 2012 } @article{noKey, abstract = {Soziale Tagging-Systeme gehören zu den in den vergangenen Jahren entstandenen Web2.0-Systemen. Sie ermöglichen es Anwendern, beliebige Informationen in das Internet einzustellen und untereinander auszutauschen. Je nach Anbieter verlinken Nutzer Videos, Fotos oder Webseiten und beschreiben die eingestellten Medien mit entsprechenden Schlagwörtern (Tags). Die damit einhergehende freiwillige Preisgabe oftmals persönlicher Informationen wirft Fragen im Bereich der informationellen Selbstbestimmung auf. Dieses Grundrecht gewährleistet dem Einzelnen, grundsätzlich selbst über die Preisgabe und Verwendung seiner persönlichen Daten zu bestimmen. Für viele Funktionalitäten, wie beispielsweise Empfehlungsdienste oder die Bereitstellung einer API, ist eine solche Kontrolle allerdings schwierig zu gestalten. Oftmals existieren keine Richtlinien, inwieweit Dienstanbieter und weitere Dritte diese öffentlichen Daten (und weitere Daten, die bei der Nutzung des Systems anfallen) nutzen dürfen. Dieser Artikel diskutiert anhand eines konkreten Systems typische, für den Datenschutz relevante Funktionalitäten und gibt Handlungsanweisungen für eine datenschutzkonforme technische Gestaltung. }, author = {Krause, Beate and Lerch, Hana and Hotho, Andreas and Roßnagel, Alexander and Stumme, Gerd}, doi = {10.1007/s00287-010-0485-8}, interhash = {3fca17b13ee1c002f41d3a2a4594b3e2}, intrahash = {312a16fb92f6f1bc176ef917018d350c}, issn = {0170-6012}, journal = {Informatik-Spektrum}, language = {German}, number = 1, pages = {12-23}, publisher = {Springer-Verlag}, title = {Datenschutz im Web 2.0 am Beispiel des sozialen Tagging-Systems BibSonomy}, url = {http://dx.doi.org/10.1007/s00287-010-0485-8}, volume = 35, year = 2012 } @article{noKey, abstract = {Soziale Tagging-Systeme gehören zu den in den vergangenen Jahren entstandenen Web2.0-Systemen. Sie ermöglichen es Anwendern, beliebige Informationen in das Internet einzustellen und untereinander auszutauschen. Je nach Anbieter verlinken Nutzer Videos, Fotos oder Webseiten und beschreiben die eingestellten Medien mit entsprechenden Schlagwörtern (Tags). Die damit einhergehende freiwillige Preisgabe oftmals persönlicher Informationen wirft Fragen im Bereich der informationellen Selbstbestimmung auf. Dieses Grundrecht gewährleistet dem Einzelnen, grundsätzlich selbst über die Preisgabe und Verwendung seiner persönlichen Daten zu bestimmen. Für viele Funktionalitäten, wie beispielsweise Empfehlungsdienste oder die Bereitstellung einer API, ist eine solche Kontrolle allerdings schwierig zu gestalten. Oftmals existieren keine Richtlinien, inwieweit Dienstanbieter und weitere Dritte diese öffentlichen Daten (und weitere Daten, die bei der Nutzung des Systems anfallen) nutzen dürfen. Dieser Artikel diskutiert anhand eines konkreten Systems typische, für den Datenschutz relevante Funktionalitäten und gibt Handlungsanweisungen für eine datenschutzkonforme technische Gestaltung. }, author = {Krause, Beate and Lerch, Hana and Hotho, Andreas and Roßnagel, Alexander and Stumme, Gerd}, doi = {10.1007/s00287-010-0485-8}, interhash = {3fca17b13ee1c002f41d3a2a4594b3e2}, intrahash = {312a16fb92f6f1bc176ef917018d350c}, issn = {0170-6012}, journal = {Informatik-Spektrum}, language = {German}, number = 1, pages = {12-23}, publisher = {Springer-Verlag}, title = {Datenschutz im Web 2.0 am Beispiel des sozialen Tagging-Systems BibSonomy}, url = {http://dx.doi.org/10.1007/s00287-010-0485-8}, volume = 35, year = 2012 } @article{benz2010social, abstract = {Social resource sharing systems are central elements of the Web 2.0 and use the same kind of lightweight knowledge representation, called folksonomy. Their large user communities and ever-growing networks of user-generated content have made them an attractive object of investigation for researchers from different disciplines like Social Network Analysis, Data Mining, Information Retrieval or Knowledge Discovery. In this paper, we summarize and extend our work on different aspects of this branch of Web 2.0 research, demonstrated and evaluated within our own social bookmark and publication sharing system BibSonomy, which is currently among the three most popular systems of its kind. We structure this presentation along the different interaction phases of a user with our system, coupling the relevant research questions of each phase with the corresponding implementation issues. This approach reveals in a systematic fashion important aspects and results of the broad bandwidth of folksonomy research like capturing of emergent semantics, spam detection, ranking algorithms, analogies to search engine log data, personalized tag recommendations and information extraction techniques. We conclude that when integrating a real-life application like BibSonomy into research, certain constraints have to be considered; but in general, the tight interplay between our scientific work and the running system has made BibSonomy a valuable platform for demonstrating and evaluating Web 2.0 research.}, author = {Benz, D and Hotho, A and Jaschke, R and Krause, B and Mitzlaff, F and Schmitz, C and Stumme, G}, interhash = {102300e311e97ef3f7d78c64c347bf14}, intrahash = {3df3df75c079a4b2aa5535048fa59d7f}, journal = {VLDB JOURNAL}, month = {12}, number = 6, title = {The social bookmark and publication management system bibsonomy A platform for evaluating and demonstrating Web 2.0 research}, uniqueid = {000286037700006|edswsc}, volume = 19, year = 2010 } @proceedings{conf/recsys/2013rsweb, booktitle = {RSWeb@RecSys}, editor = {Mobasher, Bamshad and Jannach, Dietmar and Geyer, Werner and Freyne, Jill and Hotho, Andreas and Anand, Sarabjot Singh and Guy, Ido}, ee = {http://ceur-ws.org/Vol-1066}, interhash = {31e724c09d1f4a4bbf013ecb8e1f6685}, intrahash = {aca768068f09003e97b51d48ec092ddc}, publisher = {CEUR-WS.org}, series = {CEUR Workshop Proceedings}, title = {Proceedings of the Fifth ACM RecSys Workshop on Recommender Systems and the Social Web co-located with the 7th ACM Conference on Recommender Systems (RecSys 2013), Hong Kong, China, October 13, 2013.}, url = {http://ceur-ws.org/Vol-1066}, volume = 1066, year = 2013 } @book{atzmueller2013ubiquitous, address = {Berlin, Heidelberg}, editor = {Atzmueller, Martin and Chin, Alvin and Helic, Denis and Hotho, Andreas}, interhash = {b0fcec93b875c8b0060087bc07944e89}, intrahash = {1e2d036351662d35ef95719554d37e46}, isbn = {9783642453915 3642453910 9783642453922 3642453929}, publisher = {Imprint: Springer}, refid = {867052137}, title = {Ubiquitous Social Media Analysis Third International Workshops, MUSE 2012, Bristol, UK, September 24, 2012, and MSM 2012, Milwaukee, WI, USA, June 25, 2012, Revised Selected Papers}, url = {http://link.springer.com/book/10.1007/978-3-642-45392-2}, year = 2013 } @article{journals/corr/MitzlaffABHS13, author = {Mitzlaff, Folke and Atzmueller, Martin and Benz, Dominik and Hotho, Andreas and Stumme, Gerd}, ee = {http://arxiv.org/abs/1309.3888}, interhash = {40aa075d925f2e6e009986fd9e60b11b}, intrahash = {6f8017b9b01047d88b8e092747e25c4b}, journal = {CoRR}, title = {User-Relatedness and Community Structure in Social Interaction Networks.}, url = {http://dblp.uni-trier.de/db/journals/corr/corr1309.html#MitzlaffABHS13}, volume = {abs/1309.3888}, year = 2013 } @inproceedings{heckner2009personal, address = {San Jose, CA, USA}, author = {Heckner, Markus and Heilemann, Michael and Wolff, Christian}, booktitle = {Int'l AAAI Conference on Weblogs and Social Media (ICWSM)}, interhash = {f954e699dc6ca2d0abbe5f6ebe166dc7}, intrahash = {d1074484ea350ad88400fe4fc6984874}, month = may, title = {Personal Information Management vs. Resource Sharing: Towards a Model of Information Behaviour in Social Tagging Systems}, year = 2009 } @techreport{doerfel2014course, abstract = {Social tagging systems have established themselves as an important part in today's web and have attracted the interest from our research community in a variety of investigations. The overall vision of our community is that simply through interactions with the system, i.e., through tagging and sharing of resources, users would contribute to building useful semantic structures as well as resource indexes using uncontrolled vocabulary not only due to the easy-to-use mechanics. Henceforth, a variety of assumptions about social tagging systems have emerged, yet testing them has been difficult due to the absence of suitable data. In this work we thoroughly investigate three available assumptions - e.g., is a tagging system really social? - by examining live log data gathered from the real-world public social tagging system BibSonomy. Our empirical results indicate that while some of these assumptions hold to a certain extent, other assumptions need to be reflected and viewed in a very critical light. Our observations have implications for the design of future search and other algorithms to better reflect the actual user behavior.}, author = {Doerfel, Stephan and Zoller, Daniel and Singer, Philipp and Niebler, Thomas and Hotho, Andreas and Strohmaier, Markus}, interhash = {65f287480af20fc407f7d26677f17b72}, intrahash = {e360f0bd207806e72305efe16491ebe3}, note = {cite arxiv:1401.0629}, title = {Of course we share! Testing Assumptions about Social Tagging Systems}, url = {http://arxiv.org/abs/1401.0629}, year = 2014 } @inproceedings{doerfel2013analysis, abstract = {Since the rise of collaborative tagging systems on the web, the tag recommendation task -- suggesting suitable tags to users of such systems while they add resources to their collection -- has been tackled. However, the (offline) evaluation of tag recommendation algorithms usually suffers from difficulties like the sparseness of the data or the cold start problem for new resources or users. Previous studies therefore often used so-called post-cores (specific subsets of the original datasets) for their experiments. In this paper, we conduct a large-scale experiment in which we analyze different tag recommendation algorithms on different cores of three real-world datasets. We show, that a recommender's performance depends on the particular core and explore correlations between performances on different cores.}, acmid = {2507222}, address = {New York, NY, USA}, author = {Doerfel, Stephan and Jäschke, Robert}, booktitle = {Proceedings of the 7th ACM conference on Recommender systems}, doi = {10.1145/2507157.2507222}, interhash = {3eaf2beb1cdad39b7c5735a82c3338dd}, intrahash = {a73213a865503252caa4b28e88a77108}, isbn = {978-1-4503-2409-0}, location = {Hong Kong, China}, numpages = {4}, pages = {343--346}, publisher = {ACM}, series = {RecSys '13}, title = {An Analysis of Tag-Recommender Evaluation Procedures}, url = {http://doi.acm.org/10.1145/2507157.2507222}, year = 2013 } @inproceedings{doerfel2013analysis, abstract = {Since the rise of collaborative tagging systems on the web, the tag recommendation task -- suggesting suitable tags to users of such systems while they add resources to their collection -- has been tackled. However, the (offline) evaluation of tag recommendation algorithms usually suffers from difficulties like the sparseness of the data or the cold start problem for new resources or users. Previous studies therefore often used so-called post-cores (specific subsets of the original datasets) for their experiments. In this paper, we conduct a large-scale experiment in which we analyze different tag recommendation algorithms on different cores of three real-world datasets. We show, that a recommender's performance depends on the particular core and explore correlations between performances on different cores.}, acmid = {2507222}, address = {New York, NY, USA}, author = {Doerfel, Stephan and Jäschke, Robert}, booktitle = {Proceedings of the 7th ACM conference on Recommender systems}, doi = {10.1145/2507157.2507222}, interhash = {3eaf2beb1cdad39b7c5735a82c3338dd}, intrahash = {aa4b3d79a362d7415aaa77625b590dfa}, isbn = {978-1-4503-2409-0}, location = {Hong Kong, China}, numpages = {4}, pages = {343--346}, publisher = {ACM}, series = {RecSys '13}, title = {An analysis of tag-recommender evaluation procedures}, url = {https://www.kde.cs.uni-kassel.de/pub/pdf/doerfel2013analysis.pdf}, year = 2013 }