{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:16:53Z","timestamp":1729678613478,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/infocom.2016.7524581","type":"proceedings-article","created":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T16:47:54Z","timestamp":1469724474000},"page":"1-9","source":"Crossref","is-referenced-by-count":3,"title":["Adwords management for third-parties in SEM: An optimisation model and the potential of Twitter"],"prefix":"10.1109","author":[{"given":"Dong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhenyu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Gaogang","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Mohamed-Ali","family":"Kaafar","sequence":"additional","affiliation":[]},{"given":"Kave","family":"Salamatian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218618"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207710"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2011.10.562"},{"key":"ref12","article-title":"Tweets and trades: The information content of stock microblogs","author":"sprenger","year":"2013","journal-title":"European Financial Management"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2512938.2512948"},{"year":"2015","key":"ref14","article-title":"Google stop words list"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/srep01684"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2006.104"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341564"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2011.70"},{"key":"ref19","article-title":"You are what you like! Information leakage through users' Interests","author":"chaabane","year":"2012","journal-title":"Proceedings of the 19th Annual Network & Distributed System Security Symposium"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218537"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/90.879343"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339654"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2501040.2501980"},{"year":"0","key":"ref6","article-title":"Quality score"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847967"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2307\/2975974"},{"key":"ref8","first-page":"170","article-title":"The long tail","volume":"12","author":"anderson","year":"2004","journal-title":"Wired Magazine"},{"year":"2015","key":"ref7","article-title":"Google keywordplanner"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2010.12.007"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2010.05.001"},{"article-title":"Internet advertising revenue report 2014 full year results","year":"2015","author":"iab","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.630123"},{"year":"2013","key":"ref22","article-title":"Spyfu statistics"},{"year":"0","key":"ref21","article-title":"Adwords help for keyword setting"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487699"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1090.1054"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339720"},{"key":"ref25","article-title":"Online budgeted matching in random input models with applications to adwords","author":"goel","year":"2008","journal-title":"Proc 9th SODA"}],"event":{"name":"IEEE INFOCOM 2016 - IEEE Conference on Computer Communications","start":{"date-parts":[[2016,4,10]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2016,4,14]]}},"container-title":["IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7515093\/7524326\/07524581.pdf?arnumber=7524581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T19:54:36Z","timestamp":1475178876000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7524581\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/infocom.2016.7524581","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}