{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:04:04Z","timestamp":1775325844870,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,7,28]],"date-time":"2013-07-28T00:00:00Z","timestamp":1374969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,7,28]]},"DOI":"10.1145\/2484028.2484035","type":"proceedings-article","created":{"date-parts":[[2013,7,30]],"date-time":"2013-07-30T13:40:50Z","timestamp":1375191650000},"page":"283-292","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":121,"title":["Addressing cold-start in app recommendation"],"prefix":"10.1145","author":[{"given":"Jovian","family":"Lin","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Kazunari","family":"Sugiyama","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Min-Yen","family":"Kan","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Tat-Seng","family":"Chua","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2013,7,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312230"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935845"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281206"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420059458.ch4"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944937"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of the 23rd Annual Conference on Neural Information Processing Systems (NIPS'09)","author":"Boyd-Graber J.","year":"2009","unstructured":"J. Boyd-Graber , J. Chang , S. Gerrish , C. Wang , and D. M. Blei . Reading Tea Leaves: How Humans Interpret Topic Models . In Proc. of the 23rd Annual Conference on Neural Information Processing Systems (NIPS'09) , 2009 . J. Boyd-Graber, J. Chang, S. Gerrish, C. Wang, and D. M. Blei. Reading Tea Leaves: How Humans Interpret Topic Models. In Proc. of the 23rd Annual Conference on Neural Information Processing Systems (NIPS'09), 2009."},{"key":"e_1_3_2_1_8_1","first-page":"43","volume-title":"Proc. of the 14th Conference on Uncertainty in Artificial Intelligence (UAI'98)","author":"Breese J. S.","year":"1998","unstructured":"J. S. Breese , D. Heckerman , and C. Kadie . Empirical Analysis of Predictive Algorithms for Collaborative Filtering . In Proc. of the 14th Conference on Uncertainty in Artificial Intelligence (UAI'98) , pages 43 -- 52 , 1998 . J. S. Breese, D. Heckerman, and C. Kadie. Empirical Analysis of Predictive Algorithms for Collaborative Filtering. In Proc. of the 14th Conference on Uncertainty in Artificial Intelligence (UAI'98), pages 43--52, 1998."},{"key":"e_1_3_2_1_9_1","first-page":"10","volume-title":"Proc. of the 4th International AAAI Conference on Weblogs and Social Media (ICWSM'10)","author":"Cha M.","year":"2010","unstructured":"M. Cha , H. Haddadi , F. Benevenuto , and K. P. Gummadi . Measuring User Influence in Twitter: The Million Follower Fallacy . In Proc. of the 4th International AAAI Conference on Weblogs and Social Media (ICWSM'10) , pages 10 -- 17 , 2010 . M. Cha, H. Haddadi, F. Benevenuto, and K. P. Gummadi. Measuring User Influence in Twitter: The Million Follower Fallacy. In Proc. of the 4th International AAAI Conference on Weblogs and Social Media (ICWSM'10), pages 10--17, 2010."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013203451"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312682"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963774"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1624312.1624317"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864736"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2004.12.037"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401944"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-85820-3_5"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043932.2043943"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1596324.1596332"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2010001"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639720"},{"key":"e_1_3_2_1_24_1","first-page":"130","volume-title":"Proc. of the 4th International AAAI Conference on Weblogs and Social Media (ICWSM'10)","author":"Ramage D.","year":"2010","unstructured":"D. Ramage , S. Dumais , and D. Liebling . Characterizing Microblogs with Topic Models . In Proc. of the 4th International AAAI Conference on Weblogs and Social Media (ICWSM'10) , pages 130 -- 137 , 2010 . D. Ramage, S. Dumais, and D. Liebling. Characterizing Microblogs with Topic Models. In Proc. of the 4th International AAAI Conference on Weblogs and Social Media (ICWSM'10), pages 130--137, 2010."},{"key":"e_1_3_2_1_25_1","first-page":"305","volume-title":"Proc. of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM'11)","author":"Recuero R.","year":"2011","unstructured":"R. Recuero , R. Araujo , and G. Zago . How Does Social Capital Affect Retweets . In Proc. of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM'11) , pages 305 -- 312 , 2011 . R. Recuero, R. Araujo, and G. Zago. How Does Social Capital Affect Retweets. In Proc. of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM'11), pages 305--312, 2011."},{"key":"e_1_3_2_1_26_1","first-page":"1","volume-title":"Proc. of the 2010 Workshop on Social Recommender Systems","author":"Said A.","year":"2010","unstructured":"A. Said , E. W. De Luca , and S. Albayrak . How Social Relationships Affect User Similarities . In Proc. of the 2010 Workshop on Social Recommender Systems , pages 1 -- 4 , 2010 . A. Said, E. W. De Luca, and S. Albayrak. How Social Relationships Affect User Similarities. In Proc. of the 2010 Workshop on Social Recommender Systems, pages 1--4, 2010."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273596"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372071"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/564376.564421"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454008.1454049"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020480"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718520"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963504"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1076034.1076056"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2009961"}],"event":{"name":"SIGIR '13: The 36th International ACM SIGIR conference on research and development in Information Retrieval","location":"Dublin Ireland","acronym":"SIGIR '13","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2484028.2484035","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2484028.2484035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:32Z","timestamp":1750235972000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2484028.2484035"}},"subtitle":["latent user models constructed from twitter followers"],"short-title":[],"issued":{"date-parts":[[2013,7,28]]},"references-count":33,"alternative-id":["10.1145\/2484028.2484035","10.1145\/2484028"],"URL":"https:\/\/doi.org\/10.1145\/2484028.2484035","relation":{},"subject":[],"published":{"date-parts":[[2013,7,28]]},"assertion":[{"value":"2013-07-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}