{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T07:06:08Z","timestamp":1765609568923,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,10,3]],"date-time":"2013-10-03T00:00:00Z","timestamp":1380758400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,10,3]]},"DOI":"10.1145\/2528394.2528396","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T14:11:56Z","timestamp":1383055916000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Are Some Tweets More Interesting Than Others? #HardQuestion"],"prefix":"10.1145","author":[{"given":"Omar","family":"Alonso","sequence":"first","affiliation":[{"name":"Microsoft Corporation"}]},{"given":"Catherine C.","family":"Marshall","sequence":"additional","affiliation":[{"name":"Microsoft Corporation"}]},{"given":"Marc","family":"Najork","sequence":"additional","affiliation":[{"name":"Microsoft Corporation"}]}],"member":"320","published-online":{"date-parts":[[2013,10,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"CSE (July","author":"Alonso O.","year":"2010","unstructured":"Alonso , O. , Carson , C. , Gerster , D. , Ji , X. , and Nabar , S. U . Detecting Uninteresting Content in Text Streams . In CSE (July 2010 ), 39--42. Alonso, O., Carson, C., Gerster, D., Ji, X., and Nabar, S. U. Detecting Uninteresting Content in Text Streams. In CSE (July 2010), 39--42."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145277"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/6352.001.0001","volume-title":"Sorting Things Out: Classification and Its Consequences","author":"Bowker G. C.","year":"1999","unstructured":"Bowker , G. C. , and Star , S. L . Sorting Things Out: Classification and Its Consequences . MIT Press , 1999 . Bowker, G. C., and Star, S. L. Sorting Things Out: Classification and Its Consequences. MIT Press, 1999."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.412"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2160718.2160736"},{"key":"e_1_3_2_1_7_1","volume-title":"AISB","author":"Colton S.","year":"1999","unstructured":"Colton , S. , and Bundy , A . On the notion of interestingness in automated mathematical creativity . In AISB ( 1999 ), 82--91. Colton, S., and Bundy, A. On the notion of interestingness in automated mathematical creativity. In AISB (1999), 82--91."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145242"},{"key":"e_1_3_2_1_9_1","volume-title":"COLING","author":"Duan Y.","year":"2010","unstructured":"Duan , Y. , Jiang , L. , Qin , T. , Zhou , M. , and Shum , H . -Y. An empirical study on learning to rank of tweets . In COLING ( 2010 ), 295--303. Duan, Y., Jiang, L., Qin, T., Zhou, M., and Shum, H.-Y. An empirical study on learning to rank of tweets. In COLING (2010), 295--303."},{"key":"e_1_3_2_1_10_1","volume-title":"ISIC","author":"Erdelez S.","year":"1997","unstructured":"Erdelez , S. Information encountering: a conceptual framework for accidental information discovery . In ISIC ( 1997 ), 412--421. Erdelez, S. Information encountering: a conceptual framework for accidental information discovery. In ISIC (1997), 412--421."},{"key":"e_1_3_2_1_11_1","volume-title":"Measuring nominal scale agreement among many raters. Psychol.l Bull. 76, 5","author":"Fleiss J. L.","year":"1971","unstructured":"Fleiss , J. L. Measuring nominal scale agreement among many raters. Psychol.l Bull. 76, 5 ( 1971 ), 378--382. Fleiss, J. L. Measuring nominal scale agreement among many raters. Psychol.l Bull. 76, 5 (1971), 378--382."},{"key":"e_1_3_2_1_12_1","volume-title":"WebSci10","author":"Gaffney D.","year":"2010","unstructured":"Gaffney , D. #iranelection : quantifying online activism . In WebSci10 ( 2010 ). Gaffney, D. #iranelection: quantifying online activism. In WebSci10 (2010)."},{"key":"e_1_3_2_1_13_1","volume-title":"Nepotistic relationships in twitter and their impact on rank prestige algorithms. IPM","author":"Gayo-Avello D.","year":"2013","unstructured":"Gayo-Avello , D. Nepotistic relationships in twitter and their impact on rank prestige algorithms. IPM ( 2013 ), 1250--1280. Gayo-Avello, D. Nepotistic relationships in twitter and their impact on rank prestige algorithms. IPM (2013), 1250--1280."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJEM.2009.031564"},{"key":"e_1_3_2_1_15_1","volume-title":"ICWSM","author":"Hurlock J.","year":"2011","unstructured":"Hurlock , J. , and Wilson , M. L . Searching twitter: Separating the tweet from the chaff . In ICWSM ( 2011 ). Hurlock, J., and Wilson, M. L. Searching twitter: Separating the tweet from the chaff. In ICWSM (2011)."},{"key":"e_1_3_2_1_16_1","volume-title":"Content Analysis","author":"Krippendorff K.","year":"2003","unstructured":"Krippendorff , K. Content Analysis , 2 nd ed. Sage Publications , 2003 . Krippendorff, K. Content Analysis, 2nd ed. Sage Publications, 2003.","edition":"2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/382979.383041"},{"key":"e_1_3_2_1_18_1","volume-title":"The Guardian","author":"Lewis P.","year":"2011","unstructured":"Lewis , P. Reading the riots: Investigating England's summer of disorder . The Guardian , September 5, 2011 . Lewis, P. Reading the riots: Investigating England's summer of disorder. The Guardian, September 5, 2011."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646230"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1978975"},{"key":"e_1_3_2_1_21_1","volume-title":"TREC","author":"Metzler D.","year":"2011","unstructured":"Metzler , D. , and Cai , C . USC\/ISI at TREC 2011: Microblog track . In TREC ( 2011 ). Metzler, D., and Cai, C. USC\/ISI at TREC 2011: Microblog track. In TREC (2011)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2467696.2467711"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145274"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21489"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063724"},{"key":"e_1_3_2_1_26_1","volume-title":"TREC","author":"Robertson S. E.","year":"1994","unstructured":"Robertson , S. E. , Walker , S. , Jones , S. , Hancock-Beaulieu , M. , and Gatford , M . Okapi at TREC-3 . In TREC ( 1994 ). Robertson, S. E., Walker, S., Jones, S., Hancock-Beaulieu, M., and Gatford, M. Okapi at TREC-3. In TREC (1994)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772777"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1037\/1528-3542.5.1.89"},{"key":"e_1_3_2_1_29_1","volume-title":"Basics of Qualitative Research","author":"Strauss A.","year":"1998","unstructured":"Strauss , A. , and Corbin , J . Basics of Qualitative Research . Sage Publications , 1998 . Strauss, A., and Corbin, J. Basics of Qualitative Research. Sage Publications, 1998."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063941"},{"key":"e_1_3_2_1_31_1","first-page":"1","article-title":"Detecting spam in a twitter network","volume":"15","author":"Yardi S.","year":"2010","unstructured":"Yardi , S. , Romero , D. , Schoenebeck , G. , and Boyd , D . Detecting spam in a twitter network . First Monday 15 , 1 ( 2010 ). Yardi, S., Romero, D., Schoenebeck, G., and Boyd, D. Detecting spam in a twitter network. First Monday 15, 1 (2010).","journal-title":"First Monday"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1531674.1531710"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063992"}],"event":{"name":"HCIR '13: Symposium on Human-Computer Interaction and Information Retrieval","sponsor":["FX Palo Alto Laboratory, Inc. FX Palo Alto Laboratory, Inc.","Microsoft Research Microsoft Research","ACM SIGIR Special Interest Group on Information Retrieval","GRAND Animation and NewMedia"],"location":"Vancouver BC Canada","acronym":"HCIR '13"},"container-title":["Proceedings of the Symposium on Human-Computer Interaction and Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2528394.2528396","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2528394.2528396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:44Z","timestamp":1750231724000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2528394.2528396"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,3]]},"references-count":32,"alternative-id":["10.1145\/2528394.2528396","10.1145\/2528394"],"URL":"https:\/\/doi.org\/10.1145\/2528394.2528396","relation":{},"subject":[],"published":{"date-parts":[[2013,10,3]]},"assertion":[{"value":"2013-10-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}