{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:44:23Z","timestamp":1760708663947,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,2,24]],"date-time":"2014-02-24T00:00:00Z","timestamp":1393200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,2,24]]},"DOI":"10.1145\/2557500.2557526","type":"proceedings-article","created":{"date-parts":[[2014,2,18]],"date-time":"2014-02-18T14:10:41Z","timestamp":1392732641000},"page":"17-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Improving business rating predictions using graph based features"],"prefix":"10.1145","author":[{"given":"Amit","family":"Tiroshi","sequence":"first","affiliation":[{"name":"University of Haifa, Haifa, Israel"}]},{"given":"Shlomo","family":"Berkovsky","sequence":"additional","affiliation":[{"name":"National ICT Australia, Sydney, Australia"}]},{"given":"Mohamed Ali","family":"Kaafar","sequence":"additional","affiliation":[{"name":"National ICT Australia, Sydney, Australia"}]},{"given":"David","family":"Vallet","sequence":"additional","affiliation":[{"name":"National ICT Australia, Sydney, Australia"}]},{"given":"Terence","family":"Chen","sequence":"additional","affiliation":[{"name":"National ICT Australia, Sydney, Australia"}]},{"given":"Tsvi","family":"Kuflik","sequence":"additional","affiliation":[{"name":"The University of Haifa, Haifa, Israel"}]}],"member":"320","published-online":{"date-parts":[[2014,2,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-85820-3_7"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-85820-3_2"},{"key":"e_1_3_2_1_3_1","volume-title":"CIDR","author":"Anderson M.","year":"2013","unstructured":"M. Anderson , D. Antenucci , V. Bittorf , M. Burgess , M. J. Cafarella , A. Kumar , F. Niu , Y. Park , C. R\u00e9 , and C. Zhang . Brainwash: A data system for feature engineering . In CIDR , 2013 . M. Anderson, D. Antenucci, V. Bittorf, M. Burgess, M. J. Cafarella, A. Kumar, F. Niu, Y. Park, C. R\u00e9, and C. Zhang. Brainwash: A data system for feature engineering. In CIDR, 2013."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0400087101"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11768012_4"},{"key":"e_1_3_2_1_6_1","volume-title":"Analyzing Affiliation Networks","author":"Borgatti S. P.","year":"2011","unstructured":"S. P. Borgatti and D. S. Halgin . Analyzing Affiliation Networks . The Sage handbook of social network analysis, 2011 . S. P. Borgatti and D. S. Halgin. Analyzing Affiliation Networks. The Sage handbook of social network analysis, 2011."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2229012.2229034"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-011-9108-6"},{"key":"e_1_3_2_1_10_1","volume-title":"LANL","author":"Hagberg A.","year":"2008","unstructured":"A. Hagberg , P. Swart , and D. S Chult . Exploring network structure, dynamics, and function using networkx. Technical report , LANL , 2008 . A. Hagberg, P. Swart, and D. S Chult. Exploring network structure, dynamics, and function using networkx. Technical report, LANL, 2008."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2009.36"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.06.034"},{"key":"e_1_3_2_1_13_1","first-page":"806","volume-title":"AAAI\/IAAI","volume":"1","author":"Hu Y.-J.","year":"1996","unstructured":"Y.-J. Hu and D. Kibler . Generation of attributes for learning algorithms . In AAAI\/IAAI , Vol. 1 , pages 806 -- 811 , 1996 . Y.-J. Hu and D. Kibler. Generation of attributes for learning algorithms. In AAAI\/IAAI, Vol. 1, pages 806--811, 1996."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_2_1_15_1","volume-title":"Social Networks","author":"Latapy M.","year":"2008","unstructured":"M. Latapy , C. Magnien , and N. D. Vecchio . Basic notions for the analysis of large two-mode networks . Social Networks , 2008 . M. Latapy, C. Magnien, and N. D. Vecchio. Basic notions for the analysis of large two-mode networks. Social Networks, 2008."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555400.1555433"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30284-8_16"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014046307775"},{"key":"e_1_3_2_1_19_1","volume-title":"Seventh International AAAI Conference on Weblogs and Social Media","author":"Mukherjee A.","year":"2013","unstructured":"A. Mukherjee , V. Venkataraman , B. Liu , and N. Glance . What yelp fake review filter might be doing . In Seventh International AAAI Conference on Weblogs and Social Media , 2013 . A. Mukherjee, V. Venkataraman, B. Liu, and N. Glance. What yelp fake review filter might be doing. In Seventh International AAAI Conference on Weblogs and Social Media, 2013."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007369909943"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1768197.1768209"},{"key":"e_1_3_2_1_23_1","first-page":"27","volume-title":"HCI (2)","author":"Pohl W.","year":"1997","unstructured":"W. Pohl . Labour-machine learning for user modeling . In HCI (2) , pages 27 -- 30 . Citeseer , 1997 . W. Pohl. Labour-machine learning for user modeling. In HCI (2), pages 27--30. Citeseer, 1997."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-85820-3_8"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2507157.2507206"},{"key":"e_1_3_2_1_26_1","volume-title":"Knowledge-based recommender systems. Encyclopedia of library and information science, 69(Supplement 32):69","author":"Trewin S.","year":"2000","unstructured":"S. Trewin . Knowledge-based recommender systems. Encyclopedia of library and information science, 69(Supplement 32):69 , 2000 . S. Trewin. Knowledge-based recommender systems. Encyclopedia of library and information science, 69(Supplement 32):69, 2000."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011117102175"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011175525451"}],"event":{"name":"IUI'14: IUI'14 19th International Conference on Intelligent User Interfaces","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Haifa Israel","acronym":"IUI'14"},"container-title":["Proceedings of the 19th international conference on Intelligent User Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557500.2557526","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557500.2557526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:42Z","timestamp":1750232082000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557500.2557526"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,24]]},"references-count":27,"alternative-id":["10.1145\/2557500.2557526","10.1145\/2557500"],"URL":"https:\/\/doi.org\/10.1145\/2557500.2557526","relation":{},"subject":[],"published":{"date-parts":[[2014,2,24]]},"assertion":[{"value":"2014-02-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}