{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:09:09Z","timestamp":1742944149206,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030185787"},{"type":"electronic","value":"9783030185794"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-18579-4_8","type":"book-chapter","created":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T15:05:36Z","timestamp":1556031936000},"page":"121-138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Retweeting Prediction Using Matrix Factorization with Binomial Distribution and Contextual Information"],"prefix":"10.1007","author":[{"given":"Bo","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Zhigang","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianjun","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Dongxu","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,24]]},"reference":[{"issue":"1","key":"8_CR1","first-page":"31","volume":"23","author":"NA Abdullah","year":"2015","unstructured":"Abdullah, N.A., Nishioka, D., Tanaka, Y., Murayama, Y.: User\u2019s action and decision making of retweet messages towards reducing misinformation spread during disaster. J. Inf. Process. 23(1), 31\u201340 (2015)","journal-title":"J. Inf. Process."},{"issue":"3","key":"8_CR2","first-page":"418","volume":"36","author":"Y Bae","year":"2014","unstructured":"Bae, Y., Ryu, P.-M., Kim, H.: Predicting the lifespan and retweet times of tweets based on multiple feature analysis. J. Electron. Telecommun. Res. Inst. 36(3), 418\u2013428 (2014)","journal-title":"J. Electron. Telecommun. Res. Inst."},{"issue":"3","key":"8_CR3","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1002\/widm.1178","volume":"6","author":"P Bedi","year":"2016","unstructured":"Bedi, P., Sharma, C.: Community detection in social networks. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 6(3), 115\u2013135 (2016)","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"doi-asserted-by":"crossref","unstructured":"Can, E.F., Oktay, H., Manmatha, R.: Predicting retweet count using visual cues. In: CIKM, pp. 1481\u20131484. ACM (2013)","key":"8_CR4","DOI":"10.1145\/2505515.2507824"},{"doi-asserted-by":"crossref","unstructured":"Gao, H., Tang, J., Hu, X., Liu, H.: Content-aware point of interest recommendation on location-based social networks. In: AAAI, pp. 1721\u20131727 (2015)","key":"8_CR5","DOI":"10.1609\/aaai.v29i1.9462"},{"doi-asserted-by":"crossref","unstructured":"Jamali, M., Ester, M.: A matrix factorization technique with trust propagation for recommendation in social networks. In: RecSys, pp. 135\u2013142 (2010)","key":"8_CR6","DOI":"10.1145\/1864708.1864736"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1007\/978-3-319-25255-1_62","volume-title":"Web Technologies and Applications","author":"B Jiang","year":"2015","unstructured":"Jiang, B., Sha, Y., Wang, L.: A multi-view retweeting behaviors prediction in social networks. In: Cheng, R., Cui, B., Zhang, Z., Cai, R., Xu, J. (eds.) APWeb 2015. LNCS, vol. 9313, pp. 756\u2013767. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-25255-1_62"},{"unstructured":"Jiang, M., et al.: Social contextual recommendation. In: CIKM, pp. 45\u201354 (2012)","key":"8_CR8"},{"issue":"3","key":"8_CR9","first-page":"31","volume":"6","author":"K Lee","year":"2015","unstructured":"Lee, K., Mahmud, J., Chen, J., Zhou, M., Nichols, J.: Who will retweet this? Detecting strangers from Twitter to retweet information. ACM Trans. Intell. Syst. Technol. (TIST) 6(3), 31 (2015)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"doi-asserted-by":"crossref","unstructured":"Li, C., Bendersky, M., Garg, V., Ravi, S.: Related event discovery. In: WSDM, pp. 355\u2013364. ACM (2017)","key":"8_CR10","DOI":"10.1145\/3018661.3018713"},{"doi-asserted-by":"crossref","unstructured":"Liu, L., Tang, J., Han, J., Jiang, M., Yang, S.: Mining topic-level influence in heterogeneous networks. In: CIKM, pp. 199\u2013208. ACM (2010)","key":"8_CR11","DOI":"10.1145\/1871437.1871467"},{"doi-asserted-by":"crossref","unstructured":"Luo, Z., Osborne, M., Tang, J., Wang, T.: Who will retweet me? Finding retweeters in Twitter. In: SIGIR, pp. 869\u2013872. ACM (2013)","key":"8_CR12","DOI":"10.1145\/2484028.2484158"},{"issue":"3","key":"8_CR13","first-page":"289","volume":"28","author":"H Ma","year":"2008","unstructured":"Ma, H., Yang, H., Lyu, M.R., King, I.: SoRec: social recommendation using probabilistic matrix factorization. Comput. Intell. 28(3), 289\u2013328 (2008)","journal-title":"Comput. Intell."},{"doi-asserted-by":"crossref","unstructured":"Ma, H., King, I., Lyu, M.R.: Learning to recommend with social trust ensemble. In: SIGIR, pp. 203\u2013210 (2009)","key":"8_CR14","DOI":"10.1145\/1639714.1639746"},{"doi-asserted-by":"crossref","unstructured":"Ma, H., Zhou, D., Liu, C., Lyu, M.R., King, I.: Recommender systems with social regularization. In: WSDM, pp. 287\u2013296. ACM (2011)","key":"8_CR15","DOI":"10.1145\/1935826.1935877"},{"doi-asserted-by":"crossref","unstructured":"Macedo, A.Q., Marinho, L.B., Santos, R.L.T.: Context-aware event recommendation in event-based social networks. In: RecSys, pp. 123\u2013130. ACM (2015)","key":"8_CR16","DOI":"10.1145\/2792838.2800187"},{"doi-asserted-by":"crossref","unstructured":"Mahdavi, M., Asadpour, M., Ghavami, S.M.: A comprehensive analysis of tweet content and its impact on popularity. In: IST, pp. 559\u2013564. IEEE (2016)","key":"8_CR17","DOI":"10.1109\/ISTEL.2016.7881883"},{"doi-asserted-by":"crossref","unstructured":"Metaxas, P.T., Mustafaraj, E., Wong, K., Zeng, L., O\u2019Keefe, M., Finn, S.: What do retweets indicate? Results from user survey and meta-review of research. In: ICWSM, pp. 658\u2013661 (2015)","key":"8_CR18","DOI":"10.1609\/icwsm.v9i1.14661"},{"doi-asserted-by":"crossref","unstructured":"Peng, H.-K., Zhu, J., Piao, D., Yan, R., Zhang, Y.: Retweet modeling using conditional random fields. In: 2011 IEEE 11th International Conference on Data Mining Workshops (ICDMW), pp. 336\u2013343. IEEE (2011)","key":"8_CR19","DOI":"10.1109\/ICDMW.2011.146"},{"unstructured":"Salakhutdinov, R., Mnih, A.: Probabilistic matrix factorization. In: NIPS, pp. 1257\u20131264 (2007)","key":"8_CR20"},{"doi-asserted-by":"crossref","unstructured":"Shao, J., Han, Z., Yang, Q., Zhou, T.: Community detection based on distance dynamics. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2015, New York, NY, USA, pp. 1075\u20131084. ACM (2015)","key":"8_CR21","DOI":"10.1145\/2783258.2783301"},{"doi-asserted-by":"crossref","unstructured":"Shi, J., Chen, G., Lai, K.K.: Factors dominating individuals\u2019 retweeting decisions. In: CyberC, pp. 161\u2013168. IEEE (2016)","key":"8_CR22","DOI":"10.1109\/CyberC.2016.40"},{"doi-asserted-by":"crossref","unstructured":"Suh, B., Hong, L., Pirolli, P., Chi, Ed.H.: Want to be retweeted? Large scale analytics on factors impacting retweet in Twitter network. In: SocialCom (2010)","key":"8_CR23","DOI":"10.1109\/SocialCom.2010.33"},{"doi-asserted-by":"crossref","unstructured":"Tang, J., Gao, H., Liu, H.: mTrust: discerning multi-faceted trust in a connected world, pp. 93\u2013102 (2012)","key":"8_CR24","DOI":"10.1145\/2124295.2124309"},{"doi-asserted-by":"crossref","unstructured":"Wang, C., Li, Q., Wang, L., Zeng, D.D.: Incorporating message embedding into co-factor matrix factorization for retweeting prediction. In: IJCNN, pp. 1265\u20131272. IEEE (2017)","key":"8_CR25","DOI":"10.1109\/IJCNN.2017.7965998"},{"key":"8_CR26","first-page":"10","volume":"2015","author":"M Wang","year":"2015","unstructured":"Wang, M., Zuo, W., Wang, Y.: A multidimensional nonnegative matrix factorization model for retweeting behavior prediction. Math. Probl. Eng. 2015, 10 (2015)","journal-title":"Math. Probl. Eng."},{"doi-asserted-by":"crossref","unstructured":"Wang, X., Lu, W., Ester, M., Wang, C., Chen, C.: Social recommendation with strong and weak ties. In: CIKM, pp. 5\u201314. ACM (2016)","key":"8_CR27","DOI":"10.1145\/2983323.2983701"},{"key":"8_CR28","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-30220-6_3","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"J Xie","year":"2012","unstructured":"Xie, J., Szymanski, B.K.: Towards linear time overlapping community detection in social networks. In: Tan, P.-N., Chawla, S., Ho, C.K., Bailey, J. (eds.) PAKDD 2012. LNCS (LNAI), vol. 7302, pp. 25\u201336. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-30220-6_3"},{"unstructured":"Yang, C., Liu, L., Jiao, Y., Chen, L., Niu, B.: Research on the factors affecting users\u2019 reposts in microblog. In: ICSSSM, pp. 1\u20136. IEEE (2017)","key":"8_CR29"},{"doi-asserted-by":"crossref","unstructured":"Yang, Z., et al.: Understanding retweeting behaviors in social networks. In: CIKM, pp. 1633\u20131636 (2010)","key":"8_CR30","DOI":"10.1145\/1871437.1871691"},{"doi-asserted-by":"crossref","unstructured":"Yin, J., Wang, J.: A Dirichlet multinomial mixture model-based approach for short text clustering. In: KDD, pp. 233\u2013242. ACM (2014)","key":"8_CR31","DOI":"10.1145\/2623330.2623715"},{"issue":"3","key":"8_CR32","first-page":"25","volume":"9","author":"J Zhang","year":"2015","unstructured":"Zhang, J., Tang, J., Li, J., Liu, Y., Xing, C.: Who influenced you? Predicting retweet via social influence locality. ACM Trans. Knowl. Discov. Data (TKDD) 9(3), 25 (2015)","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Q., Gong, Y., Guo, Y., Huang, X.: Retweet behavior prediction using hierarchical Dirichlet process. In: AAAI, pp. 403\u2013409 (2015)","key":"8_CR33","DOI":"10.1609\/aaai.v29i1.9152"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Q., Gong, Y., Wu, J., Huang, H., Huang, X.: Retweet prediction with attention-based deep neural network. In: CIKM, pp. 75\u201384. ACM (2016)","key":"8_CR34","DOI":"10.1145\/2983323.2983809"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-18579-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T08:48:33Z","timestamp":1710233313000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-18579-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030185787","9783030185794"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-18579-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DASFAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database Systems for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chiang Mai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dasfaa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dasfaa2019.eng.cmu.ac.th\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"501","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13 demo papers, 6 tutorial papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}