{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:45:59Z","timestamp":1743014759754,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319930398"},{"type":"electronic","value":"9783319930404"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93040-4_49","type":"book-chapter","created":{"date-parts":[[2018,6,16]],"date-time":"2018-06-16T13:29:41Z","timestamp":1529155781000},"page":"625-637","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Topic-Specific Retweet Count Ranking for Weibo"],"prefix":"10.1007","author":[{"given":"Hangyu","family":"Mao","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiakang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,17]]},"reference":[{"issue":"1","key":"49_CR1","first-page":"31","volume":"23","author":"NA Abdullah","year":"2015","unstructured":"Abdullah, N.A., Nishioka, D., Tanaka, Y., Murayama, Y.: User\u2019s action and decision making of retweet messages towards reducing misinformation spread during disaster. J. Inf. Process. 23(1), 31\u201340 (2015)","journal-title":"J. Inf. Process."},{"issue":"2","key":"49_CR2","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1177\/1081180X07299795","volume":"12","author":"BC Andrew","year":"2007","unstructured":"Andrew, B.C.: Media-generated shortcuts: do newspaper headlines present another roadblock for low-information rationality? Harv. Int. J. Press\/Polit. 12(2), 24\u201343 (2007)","journal-title":"Harv. Int. J. Press\/Polit."},{"key":"49_CR3","first-page":"1137","volume":"3","author":"Y Bengio","year":"2003","unstructured":"Bengio, Y., Ducharme, R., Vincent, P., Janvin, C.: A neural probabilistic language model. J. Mach. Learn. Res. 3, 1137\u20131155 (2003)","journal-title":"J. Mach. Learn. Res."},{"issue":"January","key":"49_CR4","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3(January), 993\u20131022 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"49_CR5","first-page":"23","volume":"11","author":"CJ Burges","year":"2010","unstructured":"Burges, C.J.: From ranknet to lambdarank to lambdamart: an overview. Learning 11, 23\u2013581 (2010)","journal-title":"Learning"},{"key":"49_CR6","doi-asserted-by":"crossref","unstructured":"Can, E.F., Oktay, H., Manmatha, R.: Predicting retweet count using visual cues. In: Proceedings of the 22nd ACM International Conference on Information & Knowledge Management, CIKM 2013, pp. 1481\u20131484. ACM, New York (2013)","DOI":"10.1145\/2505515.2507824"},{"key":"49_CR7","doi-asserted-by":"crossref","unstructured":"Cao, Z., Qin, T., Liu, T.Y., Tsai, M.F., Li, H.: Learning to rank: from pairwise approach to listwise approach. In: Proceedings of the 24th International Conference on Machine Learning, ICML 2007, pp. 129\u2013136. ACM, New York (2007)","DOI":"10.1145\/1273496.1273513"},{"key":"49_CR8","doi-asserted-by":"crossref","unstructured":"Cho, K., Van Merri\u00ebnboer, B., Gulcehre, C., Bahdanau, D., Bougares, F., Schwenk, H., Bengio, Y.: Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078 (2014)","DOI":"10.3115\/v1\/D14-1179"},{"key":"49_CR9","doi-asserted-by":"crossref","unstructured":"Cui, P., Wang, F., Sun, L.: Who should share what?: item-level social influence prediction for users and posts ranking. In: International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 185\u2013194 (2011)","DOI":"10.1145\/2009916.2009945"},{"issue":"5","key":"49_CR10","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1016\/S0378-2166(02)00134-0","volume":"35","author":"D Dor","year":"2003","unstructured":"Dor, D.: On newspaper headlines as relevance optimizers. J. Pragmat. 35(5), 695\u2013721 (2003)","journal-title":"J. Pragmat."},{"key":"49_CR11","doi-asserted-by":"crossref","unstructured":"Feng, W., Wang, J.: Retweet or not?: personalized tweet re-ranking. In: Proceedings of the Sixth ACM International Conference on Web Search and Data Mining, WSDM 2013, pp. 577\u2013586. ACM, New York (2013)","DOI":"10.1145\/2433396.2433470"},{"key":"49_CR12","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1137\/1.9781611972832.63","volume-title":"Proceedings of the 2013 SIAM International Conference on Data Mining","author":"Tuan-Anh Hoang","year":"2013","unstructured":"Hoang, T.A., Lim, E.P.: Retweeting: an act of viral users, susceptible users, or viral topics? In: SIAM International Conference on Data Mining (2013)"},{"issue":"9","key":"49_CR13","doi-asserted-by":"publisher","first-page":"2407","DOI":"10.1109\/TKDE.2016.2562628","volume":"28","author":"TA Hoang","year":"2016","unstructured":"Hoang, T.A., Lim, E.P.: Microblogging content propagation modeling using topic-specific behavioral factors. IEEE Trans. Knowl. Data Eng. 28(9), 2407\u20132422 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"49_CR14","doi-asserted-by":"crossref","unstructured":"Hong, L., Dan, O., Davison, B.D.: Predicting popular messages in Twitter. In: Proceedings of the 20th International Conference Companion on World Wide Web, WWW 2011, pp. 57\u201358. ACM, New York (2011)","DOI":"10.1145\/1963192.1963222"},{"key":"49_CR15","doi-asserted-by":"crossref","unstructured":"Jenders, M., Kasneci, G., Naumann, F.: Analyzing and predicting viral tweets. In: Proceedings of the 22nd International Conference on World Wide Web, WWW 2013 Companion, pp. 657\u2013664. ACM, New York (2013)","DOI":"10.1145\/2487788.2488017"},{"key":"49_CR16","doi-asserted-by":"crossref","unstructured":"Kwak, H., Lee, C., Park, H., Moon, S.: What is Twitter, a social network or a news media? In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 591\u2013600. ACM, New York (2010)","DOI":"10.1145\/1772690.1772751"},{"key":"49_CR17","doi-asserted-by":"crossref","unstructured":"Luo, Z., Osborne, M., Tang, J., Wang, T.: Who will retweet me?: finding retweeters in Twitter. In: International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2013, pp. 869\u2013872. ACM, New York (2013)","DOI":"10.1145\/2484028.2484158"},{"key":"49_CR18","doi-asserted-by":"crossref","unstructured":"Macskassy, S.A., Michelson, M.: Why do people retweet? Anti-homophily wins the day! In: ICWSM, pp. 209\u2013216 (2011)","DOI":"10.1609\/icwsm.v5i1.14110"},{"key":"49_CR19","doi-asserted-by":"crossref","unstructured":"Meier, F., Elsweiler, D., Wilson, M.L.: More than liking and bookmarking? Towards understanding Twitter favouriting behaviour. In: ICWSM (2014)","DOI":"10.1609\/icwsm.v8i1.14541"},{"key":"49_CR20","doi-asserted-by":"crossref","unstructured":"Myers, S.A., Zhu, C., Leskovec, J.: Information diffusion and external influence in networks. In: Proceedings of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2012, pp. 33\u201341. ACM, New York (2012)","DOI":"10.1145\/2339530.2339540"},{"key":"49_CR21","doi-asserted-by":"crossref","unstructured":"Shang, L., Lu, Z., Li, H.: Neural responding machine for short-text conversation. arXiv preprint arXiv:1503.02364 (2015)","DOI":"10.3115\/v1\/P15-1152"},{"key":"49_CR22","doi-asserted-by":"crossref","unstructured":"Uysal, I., Croft, W.B.: User oriented tweet ranking: a filtering approach to microblogs. In: Proceedings of the ACM International Conference on Information and Knowledge Management, CIKM 2011, pp. 2261\u20132264. ACM, New York (2011)","DOI":"10.1145\/2063576.2063941"},{"key":"49_CR23","doi-asserted-by":"crossref","unstructured":"Wang, Y., Xiao, Y., Ma, C., Xiao, Z.: Improving users\u2019 demographic prediction via the videos they talk about. In: Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, Austin, Texas, Association for Computational Linguistics, pp. 1359\u20131368, November 2016","DOI":"10.18653\/v1\/D16-1143"},{"key":"49_CR24","unstructured":"Xiao, Y., Zhao, W.X., Wang, K., Xiao, Z.: Knowledge sharing via social login: exploiting microblogging service for warming up social question answering websites. In: COLING, pp. 656\u2013666. Citeseer (2014)"},{"key":"49_CR25","doi-asserted-by":"crossref","unstructured":"Yang, Z., Guo, J., Cai, K., Tang, J., Li, J., Zhang, L., Su, Z.: Understanding retweeting behaviors in social networks. In: ACM International Conference on Information and Knowledge Management, pp. 1633\u20131636 (2010)","DOI":"10.1145\/1871437.1871691"},{"key":"49_CR26","doi-asserted-by":"crossref","unstructured":"Yuan, N.J., Zhong, Y., Zhang, F., Xie, X., Lin, C.Y., Rui, Y.: Who will reply to\/retweet this tweet?: the dynamics of intimacy from online social interactions. In: Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, WSDM 2016, pp. 3\u201312. ACM, New York (2016)","DOI":"10.1145\/2835776.2835800"},{"key":"49_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Gong, Y., Guo, Y., Huang, X.: Retweet behavior prediction using hierarchical Dirichlet process. In: Twenty-Ninth AAAI Conference on Artificial Intelligence, pp. 403\u2013409 (2015)","DOI":"10.1609\/aaai.v29i1.9152"},{"key":"49_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Gong, Y., Wu, J., Huang, H., Huang, X.: Retweet prediction with attention-based deep neural network. In: ACM International on Conference on Information and Knowledge Management, pp. 75\u201384 (2016)","DOI":"10.1145\/2983323.2983809"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93040-4_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T10:08:56Z","timestamp":1710324536000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-93040-4_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319930398","9783319930404"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93040-4_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"17 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/prada-research.net\/pakdd18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}