P
|
51
WORKSHOPS
Q4APS2016 – QUESTION ANSWERING AND ACTIVITY ANALYSIS
IN PARTICIPATORY SITES
|
ROOM 518B
9:00 am – 12:30 pm & 2:00 pm – 5:30 pm
ORGANIZERS
PHILIPP CIMIANO
JEAN-MICHEL DALLE
FABIEN GANDON
»
Enriching Topic Modelling with Users’ histories for Improving Tag Prediction in Q
&A Systems
Johan Loeckx and Glenn Boudaer
»
Which Answer is Best? Predicting Accepted Answers in MOOC Forums
Maximilian Jenders, Ralf Krestel and Felix Naumann
»
Identifying user issues and request types in forum question posts based on discourse analysis
Ágnes Sándor, Nikolaos Lagos, Ngoc-Phuoc-An
Vo and Caroline Brun
»
OCKTOPUS: an overview
Jean-Michel Dalle, Catherine Faron-Zucker , Fabien Gandon, Mathieu Lacage and Zide Meng
»
Using Semantics to Search Answers for Unanswered Questions in Q
&A Forums
Priyanka Singh
»
Structural Normalisation Methods for Improving Best Answer Identification in Question Answering Communities
Gregoire Burel, Paul Mulholland,
Harith Alani
»
Question Answering on Linked Data: Challenges and Future Directions
Saeedeh Shekarpour Knoesis, Denis Lukovnikov, Ashwini Jaya Kuma, Kemele M. Endris, Kuldeep Singh,
Harsh Thakkar, Christoph Lange
W W W 2 0 1 6
|
2 5
T H
I N T E R N AT I O N A L W O R L D W I D E W E B C O N F E R E N C E
6
TH
INTERNATIONAL WORKSHOP ON USAGE ANALYSIS AND THE WEB OF DATA:
THE DIVERSE ECOSYSTEM OF WEB OF DATA ACCESS MECHANISMS
|
ROOM 518C
9:00 am – 12:30 pm & 2:00 pm – 5:30 pm
ORGANIZERS
BETTINA BERENDT
LAURA HOLLINK
MARKUS LUCZAK-ROESCH
»
Current directions for Usage Analysis and the Web of Data: The diverse ecosystem of Web of Data
access mechanisms
Markus Luczak-Roesch, Laura Hollink and Bettina Berendt
»
What public transit API logs tell us about travel flows
Pieter Colpaert, Alvin Chua, Ruben Verborgh,
Erik Mannens, Rik Van de Walle and Andrew Vande Moere
»
Modeling Complex Clickstream Data by Stochastic Models: Theory and Methods
Choudur Lakshminarayan, Ram Kosuru and Meichun Hsu
»
Embedded metadata and the digital lifecycle of images: methodological challenges
Nathalie Casemajor
THE 4
RD
INTERNATIONAL WORKSHOP ON THE THEORY AND PRACTICE
OF
SOCIAL MACHINES
|
ROOM 520A
9:00 am – 12:30 pm & 2:00 pm – 5:30 pm
ORGANIZERS
DOMINIC DIFRANZO
RAMINE TINATI
KEVIN PAGE
THANASSIS TIROPANIS
ELENA SIMPERL
NIGEL SHADBOLT
»
Exploring Cooperation with Social Machines
Sally A. Applin and Michael D. Fischer
»
Model of an Individual in Social Machines
Sindhu Kiranmai Ernala, Shivani Poddar, Navjyoti Singh and Ashin Samvara.
Towards a Ubiquitous
»
Privacy Languages: Are we there yet to enable user controls?
Jun Zhao, Reuben Binns, Max Van Kleek and Nigel Shadbolt
P
|
53
WORKSHOPS
»
Going Meta: Norm Formation and Enactment on the Stack Exchange Network
Paul Matthews
»
Observlets: Empowering Analytical Observations on Web Observatory
Aastha Madaan, Tiropanis Thanassis, Srinath Srinivasa and Wendy Hall
»
Towards an Understanding of Smart Cities As Social Machines
Dirk Ahlers
»
Using the SPENCE model of online/offline community to analyse sociality of social machines
Caroline Halcrow, Leslie Carr and Susan Halford
»
The Use of Trust in Social Machines
Arpit Merchant, Tushant Jha and Navjyoti Singh
WORKSHOP ON EMPIRICAL RESEARCH METHODS IN INFORMATION SECURITY
|
ROOM 520E
9:00 am – 12:30 pm & 2:00 pm – 5:30 pm
ORGANIZERS
EDGAR WEIPPL
MICHAEL HUTH
MARTIN GILJE JAATUN
LOTFI BEN OTHMANE
»
Longitudinal study of the use of client-side security mechanisms on the European Web
Ping Chen (KU Leuven); Lieven Desmet (KU Leuven); Christophe Huygens (KU Leuven); Wouter Joosen (KU Leuven)
»
TLScompare: Crowdsourcing Rules for HTTPS Everywhere
Wilfried Mayer (SBA Research); Martin Schmiedecker (SBA Research)
»
A Work-Flow for Empirical Exploration of Security Events
Martin Pirker (St.Pölten University of Applied Sciences); Andreas Nusser (St.Pölten University of Applied Sciences)
»
Ettu: Analyzing Query Intents in Corporate Databases
Gökhan Kul (State University of New York at Buffalo); Duc Luong (State University of New York at Buffalo); Ting
Xie (State University of New York at Buffalo); Patrick Coonan (State University of New York at Buffalo); Varun
Chandola (State University of New York at Buffalo); Oliver Kennedy (State University of New York at Buffalo);
Shambhu Upadhyaya (State University of New York at Buffalo)
»
Empirical Malware Research
Stefan Marschalek; Manfred Kaiser;
Robert Luh;Sebastian Schrittwieser
»
Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications
Omar Alrawi; Aziz Mohaisen