{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:17:31Z","timestamp":1755926251742,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,17]],"date-time":"2018-10-17T00:00:00Z","timestamp":1539734400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1408944 , CNS- 1513939, and IIS-1629161"],"award-info":[{"award-number":["CNS-1408944 , CNS- 1513939, and IIS-1629161"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,17]]},"DOI":"10.1145\/3269206.3271681","type":"proceedings-article","created":{"date-parts":[[2018,10,22]],"date-time":"2018-10-22T12:08:27Z","timestamp":1540210107000},"page":"637-646","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["JIM"],"prefix":"10.1145","author":[{"given":"Shubhra Kanti","family":"Karmaker Santu","sequence":"first","affiliation":[{"name":"University of Illinois Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Liangda","family":"Li","sequence":"additional","affiliation":[{"name":"Yahoo Research, Sunnyvale, CA, USA"}]},{"given":"Yi","family":"Chang","sequence":"additional","affiliation":[{"name":"Jilin University, Changchun, China"}]},{"given":"ChengXiang","family":"Zhai","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. The Most Popular API: NYtimes Developers Network. https:\/\/developer.nytimes.com\/most_popular_api_v2.json#\/README. Accessed: 2016-07-30.  2016. The Most Popular API: NYtimes Developers Network. https:\/\/developer.nytimes.com\/most_popular_api_v2.json#\/README. Accessed: 2016-07-30."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536274.2536307"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12017"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12275-0_5"},{"key":"e_1_3_2_1_5_1","volume-title":"Modelling Reciprocating Relationships with Hawkes Processes. NIPS","author":"Blundell C.","year":"2012","unstructured":"C. Blundell , K. A Heller , and J. M Beck . 2012. Modelling Reciprocating Relationships with Hawkes Processes. NIPS ( 2012 ). C. Blundell, K. A Heller, and J. M Beck. 2012. Modelling Reciprocating Relationships with Hawkes Processes. NIPS (2012)."},{"key":"e_1_3_2_1_6_1","volume-title":"Tolle","author":"Boggs Paul T.","year":"1995","unstructured":"Paul T. Boggs and Jon W . Tolle . 1995 . Sequential quadratic programming. Acta numerica 4 (1995), 1--51. Paul T. Boggs and Jon W. Tolle. 1995. Sequential quadratic programming. Acta numerica 4 (1995), 1--51."},{"key":"e_1_3_2_1_7_1","volume-title":"Ljung","author":"Box George E. P.","year":"2015","unstructured":"George E. P. Box , Gwilym M. Jenkins , Gregory C. Reinsel , and Greta M . Ljung . 2015 . Time series analysis: forecasting and control. John Wiley & Sons . George E. P. Box, Gwilym M. Jenkins, Gregory C. Reinsel, and Greta M. Ljung. 2015. Time series analysis: forecasting and control. John Wiley & Sons."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619088"},{"volume-title":"The analysis of time series: an introduction","author":"Chatfield Chris","key":"e_1_3_2_1_9_1","unstructured":"Chris Chatfield . 2016. The analysis of time series: an introduction . CRC press . Chris Chatfield. 2016. The analysis of time series: an introduction. CRC press."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0803685105"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.187"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0421-2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/090771272"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2507853"},{"key":"e_1_3_2_1_15_1","first-page":"308","article-title":"Nelder-Mead Simplex Method","volume":"7","author":"Glaudell Rebecca","year":"1965","unstructured":"Rebecca Glaudell , Rogelio Tomas Garcia , and Javier Barranco Garcia . 1965 . Nelder-Mead Simplex Method . Computer Journal 7 (1965), 308 -- 313 . Rebecca Glaudell, Rogelio Tomas Garcia, and Javier Barranco Garcia. 1965. Nelder-Mead Simplex Method. Computer Journal 7 (1965), 308--313.","journal-title":"Computer Journal"},{"key":"e_1_3_2_1_16_1","volume-title":"Spectra of some self-exciting and mutually exciting point processes. Biometrika","author":"Hawkes Alan G.","year":"1971","unstructured":"Alan G. Hawkes . 1971. Spectra of some self-exciting and mutually exciting point processes. Biometrika ( 1971 ), 83--90. Alan G. Hawkes. 1971. Spectra of some self-exciting and mutually exciting point processes. Biometrika (1971), 83--90."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609633"},{"volume-title":"International AAAI Conference on Web and Social Media.","author":"Kairam S.","key":"e_1_3_2_1_18_1","unstructured":"S. Kairam , M. Morris , J. Teevan , D. Liebling , and S. Dumais . 2013. Towards Supporting Search over Trending Events with Social Media . In International AAAI Conference on Web and Social Media. S. Kairam, M. Morris, J. Teevan, D. Liebling, and S. Dumais. 2013. Towards Supporting Search over Trending Events with Social Media. In International AAAI Conference on Web and Social Media."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2741698"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3054188"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935862"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623679"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741092"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741641"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1088\/0266-5611\/27\/11\/115013"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2232817.2232859"},{"key":"e_1_3_2_1_28_1","first-page":"77","article-title":"The TREC-8 Question Answering Track Report","volume":"99","author":"Voorhees Ellen M.","year":"1999","unstructured":"Ellen M. Voorhees 1999 . The TREC-8 Question Answering Track Report . In Trec , Vol. 99. 77 -- 82 . Ellen M. Voorhees et al. 1999. The TREC-8 Question Answering Track Report. In Trec, Vol. 99. 77--82.","journal-title":"Trec"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36973-5_30"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 26th Annual Conference on Learning Theory (COLT","author":"Wang Yining","year":"2013","unstructured":"Yining Wang , Liwei Wang , Yuanzhi Li , Di He , Wei Chen , and Tie-Yan Liu . 2013 . A theoretical analysis of NDCG ranking measures . In Proceedings of the 26th Annual Conference on Learning Theory (COLT 2013). Yining Wang, Liwei Wang, Yuanzhi Li, Di He, Wei Chen, and Tie-Yan Liu. 2013. A theoretical analysis of NDCG ranking measures. In Proceedings of the 26th Annual Conference on Learning Theory (COLT 2013)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1852102.1852106"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488511"},{"key":"e_1_3_2_1_33_1","first-page":"31","article-title":"Point process modelling of the Afghan War Diary","volume":"109","author":"Mangion A.","year":"2012","unstructured":"A. Z.- Mangion , M. Dewarc , V. Kadirkamanathand , and G. Sanguinetti . 2012 . Point process modelling of the Afghan War Diary . PNAS 109 , 31 (July 2012), 12414--12419. A. Z.-Mangion, M. Dewarc, V. Kadirkamanathand, and G. Sanguinetti. 2012. Point process modelling of the Afghan War Diary. PNAS 109, 31 (July 2012), 12414--12419.","journal-title":"PNAS"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the EMNLP","author":"Zhang Ruiqiang","year":"2010","unstructured":"Ruiqiang Zhang , Yuki Konda , Anlei Dong , Pranam Kolari , Yi Chang , and Zhaohui Zheng . 2010 . Learning recurrent event queries for web search . In Proceedings of the EMNLP 2010. Association for Computational Linguistics, 1129--1139. Ruiqiang Zhang, Yuki Konda, Anlei Dong, Pranam Kolari, Yi Chang, and Zhaohui Zheng. 2010. Learning recurrent event queries for web search. In Proceedings of the EMNLP 2010. Association for Computational Linguistics, 1129--1139."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Deyu Zhou Liangyu Chen and Yulan He. 2015. An Unsupervised Framework of Exploring Events on Twitter: Filtering Extraction and Categorization. In AAAI. 2468--2475.   Deyu Zhou Liangyu Chen and Yulan He. 2015. An Unsupervised Framework of Exploring Events on Twitter: Filtering Extraction and Categorization. In AAAI. 2468--2475.","DOI":"10.1609\/aaai.v29i1.9526"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1198\/016214502760046925"}],"event":{"name":"CIKM '18: The 27th ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Torino Italy","acronym":"CIKM '18"},"container-title":["Proceedings of the 27th ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3269206.3271681","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3269206.3271681","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3269206.3271681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:22Z","timestamp":1750207462000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3269206.3271681"}},"subtitle":["Joint Influence Modeling for Collective Search Behavior"],"short-title":[],"issued":{"date-parts":[[2018,10,17]]},"references-count":35,"alternative-id":["10.1145\/3269206.3271681","10.1145\/3269206"],"URL":"https:\/\/doi.org\/10.1145\/3269206.3271681","relation":{},"subject":[],"published":{"date-parts":[[2018,10,17]]},"assertion":[{"value":"2018-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}