skip to main content
10.1145/3308558acmotherconferencesBook PagePublication PagesthewebconfConference Proceedingsconference-collections
WWW '19: The World Wide Web Conference
ACM2019 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
WWW '19: The Web Conference San Francisco CA USA May 13 - 17, 2019
ISBN:
978-1-4503-6674-8
Published:
13 May 2019
In-Cooperation:
IW3C2
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 17 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to The Web Conference 2019. The Web Conference is the premier venue focused on understanding the current state and the evolution of the Web through the lens of computer science, computational social science, economics, policy, and many other disciplines. The 2019 edition of the conference is a reflection point as we celebrate the 30th anniversary of the Web.

research-article
Deep Learning for Solving Important Problems

In this keynote we describe progress in work that our research teams have been doing over the past years, including advances in difficult problems in artificial intelligence, on building large-scale computer systems for machine learning research, and, ...

research-article
The Law of the Horse at 20: Phases of the Net

The Internet moves in phases, and we are entering the third in 20 years. In this keynote, using a framework drawn from the Law of the Horse [1], I describe the phase we are entering - the surveillance phase - and the threat it presents to society ...

research-article
Enlisting the Public to Build a Healthier Web Information Commons

Over the past three years, platforms, governments and a plethora of nonprofit initiatives have prioritized fighting online misinformation through a variety of different means. Yet the current framework is too fragmented to deliver global results. The ...

research-article
Addressing Trust Bias for Unbiased Learning-to-Rank

Existing unbiased learning-to-rank models use counterfactual inference, notably Inverse Propensity Scoring (IPS), to learn a ranking function from biased click data. They handle the click incompleteness bias, but usually assume that the clicks are noise-...

research-article
Open Access
Learning Edge Properties in Graphs from Path Aggregations

Graph edges, along with their labels, can represent information of fundamental importance, such as links between web pages, friendship between users, the rating given by users to other users or items, and much more. We introduce LEAP, a trainable, ...

research-article
Open Access
Evaluating User Actions as a Proxy for Email Significance

Email remains a critical channel for communicating information in both personal and work accounts. The number of emails people receive every day can be overwhelming, which in turn creates challenges for efficient information management and consumption. ...

research-article
DDGK: Learning Graph Representations for Deep Divergence Graph Kernels

Can neural networks learn to compare graphs without feature engineering? In this paper, we show that it is possible to learn representations for graph similarity with neither domain knowledge nor supervision (i.e. feature engineering or labeled graphs). ...

research-article
Stereotypical Bias Removal for Hate Speech Detection Task using Knowledge-based Generalizations

With the ever-increasing cases of hate spread on social media platforms, it is critical to design abuse detection mechanisms to pro-actively avoid and control such incidents. While there exist methods for hate speech detection, they stereotype words and ...

research-article
Personalized Bundle List Recommendation

Product bundling, offering a combination of items to customers, is one of the marketing strategies commonly used in online e-commerce and offline retailers. A high-quality bundle generalizes frequent items of interest, and diversity across bundles ...

research-article
Improving Medical Code Prediction from Clinical Text via Incorporating Online Knowledge Sources

Clinical notes contain detailed information about health status of patients for each of their encounters with a health system. Developing effective models to automatically assign medical codes to clinical notes has been a long-standing active research ...

research-article
No Place to Hide: Catching Fraudulent Entities in Tensors

Many approaches focus on detecting dense blocks in the tensor of multimodal data to prevent fraudulent entities (e.g., accounts, links) from retweet boosting, hashtag hijacking, link advertising, etc. However, no existing method is effective to find the ...

research-article
Link Prediction in Networks with Core-Fringe Data

Data collection often involves the partial measurement of a larger system. A common example arises in collecting network data: we often obtain network datasets by recording all of the interactions among a small set of core nodes, so that we end up with ...

research-article
Spiders like Onions: on the Network of Tor Hidden Services

Tor hidden services allow offering and accessing various Internet resources while guaranteeing a high degree of provider and user anonymity. So far, most research work on the Tor network aimed at discovering protocol vulnerabilities to de-anonymize ...

research-article
Be Concise and Precise: Synthesizing Open-Domain Entity Descriptions from Facts

Despite being vast repositories of factual information, cross-domain knowledge graphs, such as Wikidata and the Google Knowledge Graph, only sparsely provide short synoptic descriptions for entities. Such descriptions that briefly identify the most ...

research-article
Navigating the Maze of Wikidata Query Logs

This paper provides an in-depth and diversified analysis of the Wikidata query logs, recently made publicly available. Although the usage of Wikidata queries has been the object of recent studies, our analysis of the query traffic reveals interesting ...

research-article
What happened? The Spread of Fake News Publisher Content During the 2016 U.S. Presidential Election

The spread of content produced by fake news publishers was one of the most discussed characteristics of the 2016 U.S. Presidential Election. Yet, little is known about the prevalence and focus of such content, how its prevalence changed over time, and ...

research-article
Unifying Knowledge Graph Learning and Recommendation: Towards a Better Understanding of User Preferences

Incorporating knowledge graph (KG) into recommender system is promising in improving the recommendation accuracy and explainability. However, existing methods largely assume that a KG is complete and simply transfer the ”knowledge” in KG at the shallow ...

research-article
Enriching News Articles with Related Search Queries

Enriching the content of news articles with auxiliary resources is a technique often employed by online news services to keep articles up-to-date and thereby increase users' engagement. We address the task of enriching news articles with related search ...

research-article
Revisiting Opinion Dynamics with Varying Susceptibility to Persuasion via Non-Convex Local Search

We revisit the opinion susceptibility problem that was proposed by Abebe et al. [1], in which agents influence one another's opinions through an iterative process. Each agent has some fixed innate opinion. In each step, the opinion of an agent is updated ...

research-article
Trajectories of Blocked Community Members: Redemption, Recidivism and Departure

Community norm violations can impair constructive communication and collaboration online. As a defense mechanism, community moderators often address such transgressions by temporarily blocking the perpetrator. Such actions, however, come with the cost ...

research-article
Selling a Single Item with Negative Externalities

We consider the problem of regulating products with negative externalities to a third party that is neither the buyer nor the seller, but where both the buyer and seller can take steps to mitigate the externality. The motivating example to have in mind ...

research-article
Revisiting Mobile Advertising Threats with MAdLife

Online advertising is one of the primary funding sources for various of content, services, and applications on both web and mobile platforms. Mobile in-app advertising reuses many existing web technologies under the same ad-serving model (i.e., users - ...

research-article
Modeling Relational Drug-Target-Disease Interactions via Tensor Factorization with Multiple Web Sources

Modeling the behaviors of drug-target-disease interactions is crucial in the early stage of drug discovery and holds great promise for precision medicine and personalized treatments. The growing availability of new types of data on the internet brings ...

research-article
SamWalker: Social Recommendation with Informative Sampling Strategy

Recommendation from implicit feedback is a highly challenging task due to the lack of reliable negative feedback data. Only positive feedback are observed and the unobserved feedback can be attributed to two reasons: unknow or dislike. Existing methods ...

research-article
How Serendipity Improves User Satisfaction with Recommendations? A Large-Scale User Evaluation

Recommendation serendipity is being increasingly recognized as being equally important as the other beyond-accuracy objectives (such as novelty and diversity), in eliminating the “filter bubble” phenomenon of the traditional recommender systems. However,...

research-article
Emoji-Powered Representation Learning for Cross-Lingual Sentiment Classification

Sentiment classification typically relies on a large amount of labeled data. In practice, the availability of labels is highly imbalanced among different languages, e.g., more English texts are labeled than texts in any other languages, which creates a ...

research-article
Decoupled Smoothing on Graphs

Graph smoothing methods are an extremely popular family of approaches for semi-supervised learning. The choice of graph used to represent relationships in these learning problems is often a more important decision than the particular algorithm or loss ...

research-article
Cross-Network Embedding for Multi-Network Alignment

Recently, data mining through analyzing the complex structure and diverse relationships on multi-network has attracted much attention in both academia and industry. One crucial prerequisite for this kind of multi-network mining is to map the nodes ...

research-article
Improving Treatment Effect Estimators Through Experiment Splitting

We present a method for implementing shrinkage of treatment effect estimators, and hence improving their precision, via experiment splitting. Experiment splitting reduces shrinkage to a standard prediction problem. The method makes minimal ...

research-article
A Semi-Supervised Active-learning Truth Estimator for Social Networks

This paper introduces an active-learning-based truth estimator for social networks, such as Twitter, that enhances estimation accuracy significantly by requesting a well-selected (small) fraction of data to be labeled. Data assessment and truth ...

Cited By

  1. ACM
    Progga F and Rubya S (2025). Women's Perspectives and Challenges in Adopting Perinatal Mental Health Technologies, Proceedings of the ACM on Human-Computer Interaction, 9:1, (1-30), Online publication date: 10-Jan-2025.
  2. Smirnov T and Shabatura Y (2024). Виявлення та ідентифікація групових топологій як внутрішніх мікроструктур у глобальних соціальних мережах, Scientific Bulletin of UNFU, 10.36930/40340709, 34:7, (72-79)
  3. ACM
    Greco S, Zhou K, Capra L, Cerquitelli T and Quercia D (2024). NLPGuard: A Framework for Mitigating the Use of Protected Attributes by NLP Classifiers, Proceedings of the ACM on Human-Computer Interaction, 8:CSCW2, (1-25), Online publication date: 7-Nov-2024.
  4. Wang S, Jiang Y, Chen L, Lu J, Zhang J and Sun N (2024). Knowledge graph self-supervised contrastive learning for recommendation Third International Conference on Electronic Information Engineering, Big Data, and Computer Technology (EIBDCT 2024), 10.1117/12.3031121, 9781510680449, (131)
  5. Geng M, Lu J and Davidrajuh R (2024). Enhancing entity resolution with multichannel BERT: a comprehensive approach 3rd International Conference on Algorithms, Microchips and Network Applications (AMNA 2024), 10.1117/12.3031934, 9781510680098, (17)
  6. Xia X, Zhao G, Freris N and Chen L (2023). Telecom package recommendation model based on convolutional neural network 2023 2nd International Symposium on Computer Applications and Information Systems (ISCAIS 2023), 10.1117/12.2683672, 9781510666665, (73)
  7. Liao D, Yu H and Beligiannis G (2023). PEVGraphRec: a PEV method-based graph neural networks for social recommendations International Conference on Statistics, Data Science, and Computational Intelligence (CSDSCI 2022), 10.1117/12.2656825, 9781510661325, (33)
  8. Li Y, Huang J, Wang J, Zhao W and Yan Y (2022). A survey of hybrid knowledge reasoning oriented to KG International Conference on Computer, Artificial Intelligence, and Control Engineering (CAICE 2022), 10.1117/12.2641006, 9781510655942, (56)
  9. Chen H, Li Z, Yao Y and Zhu L (2022). Multi-agent reinforcement learning for fleet management: a survey 2nd International Conference on Artificial Intelligence, Automation, and High-Performance Computing (AIAHPC 2022), 10.1117/12.2641877, 9781510657717, (145)
  10. GuangZe Y, Yong W and Tiwari R (2022). A social recommendation based on GCN improved by social sampling International Conference on Neural Networks, Information, and Communication Engineering (NNICE 2022), 10.1117/12.2640519, 9781510655171, (110)
  11. ACM
    Srba I, Pecher B, Tomlein M, Moro R, Stefancova E, Simko J and Bielikova M Monant Medical Misinformation Dataset Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, (2949-2959)
  12. Li X, Zhang X, Wang P and Cao Z (2022). Web services recommendation based on Metapath-guided graph attention network, The Journal of Supercomputing, 78:10, (12621-12647), Online publication date: 1-Jul-2022.
  13. Xie J, Jiang J, Xiao J, Guan Y, Lu Y and Cheng C (2022). Neighbor-T: neighborhood transformer aggregation for enhancing representation of out-of-knowledge-base entities International Conference on Computer Application and Information Security, 10.1117/12.2637402, 9781510655218, (27)
  14. Liu F, Yang J, Li M, Wang K and Mehmood Z (2022). MCT-TTE, Scientific Programming, 2022, Online publication date: 1-Jan-2022.
Contributors

Recommendations

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%
YearSubmittedAcceptedRate
WWW '181,15517015%
WWW '1796616417%
WWW '17 Companion96616417%
WWW '1672711516%
WWW '16 Companion72711516%
WWW '1592913114%
WWW '146458413%
WWW '13 Companion1,25083166%
WWW '1383112515%
Overall8,1961,89923%