International world wide web conference



Yüklə 5,19 Mb.
Pdf görüntüsü
səhifə13/26
tarix26.09.2018
ölçüsü5,19 Mb.
#70473
1   ...   9   10   11   12   13   14   15   16   ...   26

P
 
|
 
51
WORKSHOPS
Q4APS2016  – QUESTION ANSWERING AND ACTIVITY ANALYSIS IN PARTICIPATORY SITES  
|
  
ROOM 518B
9:00 am – 12:30 pm & 2:00 pm – 5:30 pm
ORGANIZERS
PHILIPP CIMIANO
JEAN-MICHEL DALLE 
FABIEN GANDON
» Enriching Topic Modelling with Users’ histories for Improving Tag Prediction in Q
&A Systems 
  Johan Loeckx and Glenn Boudaer 
» Which Answer is Best? Predicting Accepted Answers in MOOC Forums 
  Maximilian Jenders, Ralf Krestel and Felix Naumann 
» Identifying user issues and request types in forum question posts based on discourse analysis
  Ágnes Sándor, Nikolaos Lagos, Ngoc-Phuoc-An Vo and Caroline Brun 
»
 OCKTOPUS: an overview 
  Jean-Michel Dalle, Catherine Faron-Zucker , Fabien Gandon, Mathieu Lacage and Zide Meng 
»
 Using Semantics to Search Answers for Unanswered Questions in Q
&A Forums
  Priyanka Singh 
»
 Structural Normalisation Methods for Improving Best Answer Identification in Question Answering Communities
  Gregoire Burel, Paul Mulholland, Harith Alani 
»
 Question Answering on Linked Data: Challenges and Future Directions 
  Saeedeh Shekarpour Knoesis, Denis Lukovnikov, Ashwini Jaya Kuma, Kemele M. Endris, Kuldeep Singh, 
  Harsh Thakkar, Christoph Lange 


W W W 2 0 1 6
 
|
  2 5
T H
  I N T E R N AT I O N A L   W O R L D   W I D E   W E B   C O N F E R E N C E
6
TH
 INTERNATIONAL WORKSHOP ON USAGE ANALYSIS AND THE WEB OF DATA:
THE DIVERSE ECOSYSTEM OF WEB OF DATA ACCESS MECHANISMS  
|
  ROOM 518C
9:00 am – 12:30 pm & 2:00 pm – 5:30 pm
ORGANIZERS
BETTINA BERENDT
LAURA HOLLINK 
MARKUS LUCZAK-ROESCH 
»
 Current directions for Usage Analysis and the Web of Data: The diverse ecosystem of Web of Data  
  access mechanisms 
  Markus Luczak-Roesch, Laura Hollink and Bettina Berendt 
»
 What public transit API logs tell us about travel flows 
  Pieter Colpaert, Alvin Chua,  Ruben Verborgh, Erik Mannens, Rik Van de Walle and Andrew Vande Moere 
»
 Modeling Complex Clickstream Data by Stochastic Models: Theory and Methods
  Choudur Lakshminarayan, Ram Kosuru and Meichun Hsu  
»
 Embedded metadata and the digital lifecycle of images: methodological challenges
  Nathalie Casemajor
THE 4
RD
 INTERNATIONAL WORKSHOP ON THE THEORY AND PRACTICE 
OF SOCIAL MACHINES  
|
  ROOM 520A
9:00 am – 12:30 pm & 2:00 pm – 5:30 pm
ORGANIZERS
DOMINIC DIFRANZO
RAMINE TINATI
KEVIN PAGE
THANASSIS TIROPANIS
ELENA SIMPERL 
NIGEL SHADBOLT
»
 Exploring Cooperation with Social Machines 
  Sally A. Applin and Michael D. Fischer
»
 Model of an Individual in Social Machines 
  Sindhu Kiranmai Ernala, Shivani Poddar, Navjyoti Singh and Ashin Samvara. Towards a Ubiquitous 
»
 Privacy Languages: Are we there yet to enable user controls?
  Jun Zhao, Reuben Binns, Max Van Kleek and Nigel Shadbolt


P
 
|
 
53
WORKSHOPS
»
 Going Meta: Norm Formation and Enactment on the Stack Exchange Network
  Paul Matthews
»
 Observlets: Empowering Analytical Observations on Web Observatory
  Aastha Madaan, Tiropanis Thanassis, Srinath Srinivasa and Wendy Hall
»
 Towards an Understanding of Smart Cities As Social Machines
  Dirk Ahlers
»
 Using the SPENCE model of online/offline community to analyse sociality of social machines
  Caroline Halcrow, Leslie Carr and Susan Halford
»
 The Use of Trust in Social Machines
  Arpit Merchant, Tushant Jha and Navjyoti Singh
WORKSHOP ON EMPIRICAL RESEARCH METHODS IN INFORMATION SECURITY   
|
  ROOM 520E
9:00 am – 12:30 pm & 2:00 pm – 5:30 pm
ORGANIZERS
EDGAR WEIPPL
MICHAEL HUTH
MARTIN GILJE JAATUN
LOTFI BEN OTHMANE
»
 Longitudinal study of the use of client-side security mechanisms on the European Web
  Ping Chen (KU Leuven); Lieven Desmet (KU Leuven); Christophe Huygens (KU Leuven); Wouter Joosen (KU Leuven)
»
 TLScompare: Crowdsourcing Rules for HTTPS Everywhere
  Wilfried Mayer (SBA Research); Martin Schmiedecker (SBA Research)
»
 A Work-Flow for Empirical Exploration of Security Events
  Martin Pirker (St.Pölten University of Applied Sciences); Andreas Nusser (St.Pölten University of Applied Sciences)
»
 Ettu: Analyzing Query Intents in Corporate Databases
   Gökhan Kul (State University of New York at Buffalo); Duc Luong (State University of New York at Buffalo); Ting 
Xie (State University of New York at Buffalo); Patrick Coonan (State University of New York at Buffalo); Varun 
Chandola (State University of New York at Buffalo); Oliver Kennedy (State University of New York at Buffalo); 
Shambhu Upadhyaya (State University of New York at Buffalo)
»
 Empirical Malware Research
  Stefan Marschalek; Manfred Kaiser; Robert Luh;Sebastian Schrittwieser
»
 Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications
  Omar Alrawi; Aziz Mohaisen


Yüklə 5,19 Mb.

Dostları ilə paylaş:
1   ...   9   10   11   12   13   14   15   16   ...   26




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©www.genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə