It is our great pleasure to welcome you to The Web Conference 2019. The Web Conference is the premier venue focused on understanding the current state and the evolution of the Web through the lens of computer science, computational social science, economics, policy, and many other disciplines. The 2019 edition of the conference is a reflection point as we celebrate the 30th anniversary of the Web.
Proceeding Downloads
Deep Learning for Solving Important Problems
In this keynote we describe progress in work that our research teams have been doing over the past years, including advances in difficult problems in artificial intelligence, on building large-scale computer systems for machine learning research, and, ...
The Law of the Horse at 20: Phases of the Net
The Internet moves in phases, and we are entering the third in 20 years. In this keynote, using a framework drawn from the Law of the Horse [1], I describe the phase we are entering - the surveillance phase - and the threat it presents to society ...
Enlisting the Public to Build a Healthier Web Information Commons
Over the past three years, platforms, governments and a plethora of nonprofit initiatives have prioritized fighting online misinformation through a variety of different means. Yet the current framework is too fragmented to deliver global results. The ...
Addressing Trust Bias for Unbiased Learning-to-Rank
Existing unbiased learning-to-rank models use counterfactual inference, notably Inverse Propensity Scoring (IPS), to learn a ranking function from biased click data. They handle the click incompleteness bias, but usually assume that the clicks are noise-...
Learning Edge Properties in Graphs from Path Aggregations
Graph edges, along with their labels, can represent information of fundamental importance, such as links between web pages, friendship between users, the rating given by users to other users or items, and much more. We introduce LEAP, a trainable, ...
Evaluating User Actions as a Proxy for Email Significance
Email remains a critical channel for communicating information in both personal and work accounts. The number of emails people receive every day can be overwhelming, which in turn creates challenges for efficient information management and consumption. ...
DDGK: Learning Graph Representations for Deep Divergence Graph Kernels
Can neural networks learn to compare graphs without feature engineering? In this paper, we show that it is possible to learn representations for graph similarity with neither domain knowledge nor supervision (i.e. feature engineering or labeled graphs). ...
Stereotypical Bias Removal for Hate Speech Detection Task using Knowledge-based Generalizations
With the ever-increasing cases of hate spread on social media platforms, it is critical to design abuse detection mechanisms to pro-actively avoid and control such incidents. While there exist methods for hate speech detection, they stereotype words and ...
Personalized Bundle List Recommendation
Product bundling, offering a combination of items to customers, is one of the marketing strategies commonly used in online e-commerce and offline retailers. A high-quality bundle generalizes frequent items of interest, and diversity across bundles ...
Improving Medical Code Prediction from Clinical Text via Incorporating Online Knowledge Sources
Clinical notes contain detailed information about health status of patients for each of their encounters with a health system. Developing effective models to automatically assign medical codes to clinical notes has been a long-standing active research ...
No Place to Hide: Catching Fraudulent Entities in Tensors
Many approaches focus on detecting dense blocks in the tensor of multimodal data to prevent fraudulent entities (e.g., accounts, links) from retweet boosting, hashtag hijacking, link advertising, etc. However, no existing method is effective to find the ...
Link Prediction in Networks with Core-Fringe Data
Data collection often involves the partial measurement of a larger system. A common example arises in collecting network data: we often obtain network datasets by recording all of the interactions among a small set of core nodes, so that we end up with ...
Spiders like Onions: on the Network of Tor Hidden Services
Tor hidden services allow offering and accessing various Internet resources while guaranteeing a high degree of provider and user anonymity. So far, most research work on the Tor network aimed at discovering protocol vulnerabilities to de-anonymize ...
Be Concise and Precise: Synthesizing Open-Domain Entity Descriptions from Facts
Despite being vast repositories of factual information, cross-domain knowledge graphs, such as Wikidata and the Google Knowledge Graph, only sparsely provide short synoptic descriptions for entities. Such descriptions that briefly identify the most ...
Navigating the Maze of Wikidata Query Logs
This paper provides an in-depth and diversified analysis of the Wikidata query logs, recently made publicly available. Although the usage of Wikidata queries has been the object of recent studies, our analysis of the query traffic reveals interesting ...
What happened? The Spread of Fake News Publisher Content During the 2016 U.S. Presidential Election
The spread of content produced by fake news publishers was one of the most discussed characteristics of the 2016 U.S. Presidential Election. Yet, little is known about the prevalence and focus of such content, how its prevalence changed over time, and ...
Unifying Knowledge Graph Learning and Recommendation: Towards a Better Understanding of User Preferences
Incorporating knowledge graph (KG) into recommender system is promising in improving the recommendation accuracy and explainability. However, existing methods largely assume that a KG is complete and simply transfer the ”knowledge” in KG at the shallow ...
Enriching News Articles with Related Search Queries
Enriching the content of news articles with auxiliary resources is a technique often employed by online news services to keep articles up-to-date and thereby increase users' engagement. We address the task of enriching news articles with related search ...
Revisiting Opinion Dynamics with Varying Susceptibility to Persuasion via Non-Convex Local Search
We revisit the opinion susceptibility problem that was proposed by Abebe et al. [1], in which agents influence one another's opinions through an iterative process. Each agent has some fixed innate opinion. In each step, the opinion of an agent is updated ...
Trajectories of Blocked Community Members: Redemption, Recidivism and Departure
Community norm violations can impair constructive communication and collaboration online. As a defense mechanism, community moderators often address such transgressions by temporarily blocking the perpetrator. Such actions, however, come with the cost ...
Selling a Single Item with Negative Externalities
We consider the problem of regulating products with negative externalities to a third party that is neither the buyer nor the seller, but where both the buyer and seller can take steps to mitigate the externality. The motivating example to have in mind ...
Revisiting Mobile Advertising Threats with MAdLife
Online advertising is one of the primary funding sources for various of content, services, and applications on both web and mobile platforms. Mobile in-app advertising reuses many existing web technologies under the same ad-serving model (i.e., users - ...
Modeling Relational Drug-Target-Disease Interactions via Tensor Factorization with Multiple Web Sources
Modeling the behaviors of drug-target-disease interactions is crucial in the early stage of drug discovery and holds great promise for precision medicine and personalized treatments. The growing availability of new types of data on the internet brings ...
SamWalker: Social Recommendation with Informative Sampling Strategy
Recommendation from implicit feedback is a highly challenging task due to the lack of reliable negative feedback data. Only positive feedback are observed and the unobserved feedback can be attributed to two reasons: unknow or dislike. Existing methods ...
How Serendipity Improves User Satisfaction with Recommendations? A Large-Scale User Evaluation
Recommendation serendipity is being increasingly recognized as being equally important as the other beyond-accuracy objectives (such as novelty and diversity), in eliminating the “filter bubble” phenomenon of the traditional recommender systems. However,...
Emoji-Powered Representation Learning for Cross-Lingual Sentiment Classification
Sentiment classification typically relies on a large amount of labeled data. In practice, the availability of labels is highly imbalanced among different languages, e.g., more English texts are labeled than texts in any other languages, which creates a ...
Decoupled Smoothing on Graphs
Graph smoothing methods are an extremely popular family of approaches for semi-supervised learning. The choice of graph used to represent relationships in these learning problems is often a more important decision than the particular algorithm or loss ...
Cross-Network Embedding for Multi-Network Alignment
Recently, data mining through analyzing the complex structure and diverse relationships on multi-network has attracted much attention in both academia and industry. One crucial prerequisite for this kind of multi-network mining is to map the nodes ...
Improving Treatment Effect Estimators Through Experiment Splitting
We present a method for implementing shrinkage of treatment effect estimators, and hence improving their precision, via experiment splitting. Experiment splitting reduces shrinkage to a standard prediction problem. The method makes minimal ...
A Semi-Supervised Active-learning Truth Estimator for Social Networks
This paper introduces an active-learning-based truth estimator for social networks, such as Twitter, that enhances estimation accuracy significantly by requesting a well-selected (small) fraction of data to be labeled. Data assessment and truth ...
Cited By
- Progga F and Rubya S (2025). Women's Perspectives and Challenges in Adopting Perinatal Mental Health Technologies, Proceedings of the ACM on Human-Computer Interaction, 9:1, (1-30), Online publication date: 10-Jan-2025.
-
Smirnov T and Shabatura Y (2024). Виявлення та ідентифікація групових топологій як внутрішніх мікроструктур у глобальних соціальних мережах, Scientific Bulletin of UNFU, 10.36930/40340709, 34:7, (72-79)
- Greco S, Zhou K, Capra L, Cerquitelli T and Quercia D (2024). NLPGuard: A Framework for Mitigating the Use of Protected Attributes by NLP Classifiers, Proceedings of the ACM on Human-Computer Interaction, 8:CSCW2, (1-25), Online publication date: 7-Nov-2024.
-
Wang S, Jiang Y, Chen L, Lu J, Zhang J and Sun N (2024). Knowledge graph self-supervised contrastive learning for recommendation Third International Conference on Electronic Information Engineering, Big Data, and Computer Technology (EIBDCT 2024), 10.1117/12.3031121, 9781510680449, (131)
-
Geng M, Lu J and Davidrajuh R (2024). Enhancing entity resolution with multichannel BERT: a comprehensive approach 3rd International Conference on Algorithms, Microchips and Network Applications (AMNA 2024), 10.1117/12.3031934, 9781510680098, (17)
-
Xia X, Zhao G, Freris N and Chen L (2023). Telecom package recommendation model based on convolutional neural network 2023 2nd International Symposium on Computer Applications and Information Systems (ISCAIS 2023), 10.1117/12.2683672, 9781510666665, (73)
-
Liao D, Yu H and Beligiannis G (2023). PEVGraphRec: a PEV method-based graph neural networks for social recommendations International Conference on Statistics, Data Science, and Computational Intelligence (CSDSCI 2022), 10.1117/12.2656825, 9781510661325, (33)
-
Li Y, Huang J, Wang J, Zhao W and Yan Y (2022). A survey of hybrid knowledge reasoning oriented to KG International Conference on Computer, Artificial Intelligence, and Control Engineering (CAICE 2022), 10.1117/12.2641006, 9781510655942, (56)
-
Chen H, Li Z, Yao Y and Zhu L (2022). Multi-agent reinforcement learning for fleet management: a survey 2nd International Conference on Artificial Intelligence, Automation, and High-Performance Computing (AIAHPC 2022), 10.1117/12.2641877, 9781510657717, (145)
-
GuangZe Y, Yong W and Tiwari R (2022). A social recommendation based on GCN improved by social sampling International Conference on Neural Networks, Information, and Communication Engineering (NNICE 2022), 10.1117/12.2640519, 9781510655171, (110)
- Srba I, Pecher B, Tomlein M, Moro R, Stefancova E, Simko J and Bielikova M Monant Medical Misinformation Dataset Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, (2949-2959)
- Li X, Zhang X, Wang P and Cao Z (2022). Web services recommendation based on Metapath-guided graph attention network, The Journal of Supercomputing, 78:10, (12621-12647), Online publication date: 1-Jul-2022.
-
Xie J, Jiang J, Xiao J, Guan Y, Lu Y and Cheng C (2022). Neighbor-T: neighborhood transformer aggregation for enhancing representation of out-of-knowledge-base entities International Conference on Computer Application and Information Security, 10.1117/12.2637402, 9781510655218, (27)
- Liu F, Yang J, Li M, Wang K and Mehmood Z (2022). MCT-TTE, Scientific Programming, 2022, Online publication date: 1-Jan-2022.
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
WWW '18 | 1,155 | 170 | 15% |
WWW '17 | 966 | 164 | 17% |
WWW '17 Companion | 966 | 164 | 17% |
WWW '16 | 727 | 115 | 16% |
WWW '16 Companion | 727 | 115 | 16% |
WWW '15 | 929 | 131 | 14% |
WWW '14 | 645 | 84 | 13% |
WWW '13 Companion | 1,250 | 831 | 66% |
WWW '13 | 831 | 125 | 15% |
Overall | 8,196 | 1,899 | 23% |