Search Results - "Cautis, Bogdan"
-
1
Visual Explanations of Differentiable Greedy Model Predictions on the Influence Maximization Problem
Published in Big data and cognitive computing (01-09-2023)“…Social networks have become important objects of study in recent years. Social media marketing has, for example, greatly benefited from the vast literature…”
Get full text
Journal Article -
2
The ARCOMEM Architecture for Social- and Semantic-Driven Web Archiving
Published in Future internet (01-12-2014)“…The constantly growing amount ofWeb content and the success of the SocialWeb lead to increasing needs for Web archiving. These needs go beyond the pure…”
Get full text
Journal Article -
3
Model-free inference of diffusion networks using RKHS embeddings
Published in Data mining and knowledge discovery (01-03-2019)“…We revisit in this paper the problem of inferring a diffusion network from information cascades. In our study, we make no assumptions on the underlying…”
Get full text
Journal Article -
4
IGNiteR: News Recommendation in Microblogging Applications
Published in 2022 IEEE International Conference on Data Mining (ICDM) (01-11-2022)“…As social media, and particularly microblogging applications like Twitter or Weibo, gains popularity as platforms for news dissemination, personalized news…”
Get full text
Conference Proceeding -
5
IGNiteR: News Recommendation in Microblogging Applications (Extended Version)
Published 04-10-2022“…News recommendation is one of the most challenging tasks in recommender systems, mainly due to the ephemeral relevance of news to users. As social media, and…”
Get full text
Journal Article -
6
Reasoning about XML update constraints
Published in Journal of computer and system sciences (01-09-2009)“…We introduce in this paper a class of constraints for describing how an XML document can evolve, namely XML update constraints. For these constraints, we study…”
Get full text
Journal Article -
7
Snooping Wikipedia vandals with MapReduce
Published in 2015 IEEE International Conference on Communications (ICC) (01-06-2015)“…In this paper, we present and validate an algorithm able to accurately identify anomalous behaviors on online and collaborative social networks, based on their…”
Get full text
Conference Proceeding -
8
Querying Data Sources that Export Infinite Sets of Views
Published in Theory of computing systems (01-08-2011)“…We study the problem of querying data sources that accept only a limited set of queries, such as sources accessible by Web services which can implement very…”
Get full text
Journal Article -
9
Querying Data Sources that Export Infinite Sets ofViews
Published in Theory of computing systems (01-08-2011)“…We study the problem of querying data sources that accept only a limited set of queries, such as sources accessible by Web services which can implement very…”
Get full text
Journal Article -
10
Influence Maximization via Graph Neural Bandits
Published 18-06-2024“…We consider a ubiquitous scenario in the study of Influence Maximization (IM), in which there is limited knowledge about the topology of the diffusion network…”
Get full text
Journal Article -
11
Scalable Continuous-time Diffusion Framework for Network Inference and Influence Estimation
Published 05-03-2024“…The study of continuous-time information diffusion has been an important area of research for many applications in recent years. When only the diffusion traces…”
Get full text
Journal Article -
12
Contextual Bandits for Advertising Campaigns: A Diffusion-Model Independent Approach (Extended Version)
Published 13-01-2022“…Motivated by scenarios of information diffusion and advertising in social media, we study an influence maximization problem in which little is assumed to be…”
Get full text
Journal Article -
13
Influence Maximization with Fairness at Scale (Extended Version)
Published 06-06-2023“…In this paper, we revisit the problem of influence maximization with fairness, which aims to select k influential nodes to maximise the spread of information…”
Get full text
Journal Article -
14
Predicting Cascading Failures with a Hyperparametric Diffusion Model
Published 11-06-2024“…In this paper, we study cascading failures in power grids through the lens of information diffusion models. Similar to the spread of rumors or influence in an…”
Get full text
Journal Article -
15
Bandits Under the Influence
Published in 2020 IEEE International Conference on Data Mining (ICDM) (01-11-2020)“…Recommender systems should adapt to user interests as the latter evolve. A prevalent cause for the evolution of user interests is the influence of their social…”
Get full text
Conference Proceeding -
16
Automatic Extraction of Structured Web Data with Domain Knowledge
Published in 2012 IEEE 28th International Conference on Data Engineering (01-04-2012)“…We present in this paper a novel approach for extracting structured data from the Web, whose goal is to harvest real-world items from template-based HTML pages…”
Get full text
Conference Proceeding -
17
Bandits Under The Influence (Extended Version)
Published 21-09-2020“…Recommender systems should adapt to user interests as the latter evolve. A prevalent cause for the evolution of user interests is the influence of their social…”
Get full text
Journal Article -
18
LotusX: A Position-Aware XML Graphical Search System with Auto-Completion
Published in 2012 IEEE 28th International Conference on Data Engineering (01-04-2012)“…The existing query languages for XML (e.g., XQuery) require professional programming skills to be formulated, however, such complex query languages burden the…”
Get full text
Conference Proceeding -
19
HADAD: A Lightweight Approach for Optimizing Hybrid Complex Analytics Queries (Extended Version)
Published 23-03-2021“…Hybrid complex analytics workloads typically include (i) data management tasks (joins, selections, etc. ), easily expressed using relational algebra (RA)-based…”
Get full text
Journal Article -
20
Effective Large-Scale Online Influence Maximization
Published in 2017 IEEE International Conference on Data Mining (ICDM) (01-11-2017)“…In this paper, we study a highly generic version of influence maximization (IM), one of optimizing influence campaigns by sequentially selecting "spread seeds"…”
Get full text
Conference Proceeding