Results 1 - 10
of
225
Modeling multi-step relevance propagation for expert finding
- In CIKM ’08
, 2008
"... An expert finding system allows a user to type a simple text query and retrieve names and contact information of individuals that possess the expertise expressed in the query. This paper proposes a novel approach to expert finding in large enterprises or intranets by modeling candidate experts (pers ..."
Abstract
-
Cited by 32 (3 self)
- Add to MetaCart
of multi-step relevance propagation in topicspecific expertise graphs. We model the process of expert finding by probabilistic random walks of three kinds: finite, infinite and absorbing. Experiments on TREC Enterprise Track data originating from two large organizations show that our methods using multi
Expertise identification using email communications
- In CIKM ’03: Proceedings of the twelfth international conference on Information and knowledge management
, 2003
"... A common method for finding information in an organization is to use social networks—ask people, following referrals until someone with the right information is found. Another way is to automatically mine documents to determine who knows what. Email documents seem particularly well suited to this ta ..."
Abstract
-
Cited by 124 (0 self)
- Add to MetaCart
? Is this approach better than mining message content alone? To find answers to these questions, two algorithms for determining expertise from email were compared: a contentbased approach that takes account only of email text, and a graph-based ranking algorithm (HITS) that takes account both of text
Focused crawling by learning hmm from user’s topic-specific browsing
- In Proceedings of 2004 IEEE/WIC/ACM International Conference on Web Intelligence
, 2004
"... A focused crawler is designed to traverse the Web to gather documents on a specific topic. It is not an easy task to predict which links lead to good pages. In this paper, we present a new approach for prediction of the important links to relevant pages based on a learned user model. In particular, ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
, we first collect pages that a user visits during a learning session, where the user browses the Web and specifically marks which pages she is interested in. We then examine the semantic content of these pages to construct a concept graph, which is used to learn the dominant content and link structure
Inventing Graphing: Meta- Representational Expertise in Children
"... We examine a cooperative activity of a sixth-grade class. The activity took place over 5 days and focused on inventing adequate static representations of motion. In generating, critiquing, and refining numerous representations, we find indications of strong meta-representational competence. In addit ..."
Abstract
- Add to MetaCart
We examine a cooperative activity of a sixth-grade class. The activity took place over 5 days and focused on inventing adequate static representations of motion. In generating, critiquing, and refining numerous representations, we find indications of strong meta-representational competence. In addition to conceptual and design competence, we focus on the structure of activities and find in them an intricate blend of (I) the children's conceptual and interactional skills, (2) their interest in, and sense of ownership over, the inventions, and (3) the teacher's initiation and organization of activities, which is deli-cately balanced with her letting the activities evolve according to student-set directions. 1.
Whom You Know Matters: Venture Capital Networks and Investment Performance,
- Journal of Finance
, 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm's-length, spot-market transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract
-
Cited by 138 (8 self)
- Add to MetaCart
. Contrast this with a ringshaped network, in which all actors are equally central. In the VC market, greater centrality may translate into better access to information, deal flow, deeper pools of capital, expertise, contacts, and so on. Network analysis uses a branch of mathematics called graph theory
Improving bug triage with bug tossing graphs
- In ESEC/FSE ’09: Proceedings of the European Software Engineering Conference and Symposium on the Foundations of Software Engineering
, 2009
"... A bug report is typically assigned to a single developer who is then responsible for fixing the bug. In Mozilla and Eclipse, between 37%-44 % of bug reports are “tossed ” (reassigned) to other devel-opers, for example because the bug has been assigned by accident or another developer with additional ..."
Abstract
-
Cited by 70 (7 self)
- Add to MetaCart
with additional expertise is needed. In any case, tossing increases the time-to-correction for a bug. In this paper, we introduce a graph model based on Markov chains, which captures bug tossing history. This model has sev-eral desirable qualities. First, it reveals developer networks which can be used
Determining Developers ’ Expertise and Role: A Graph Hierarchy-based Approach
"... Abstract—Determining contributors ’ expertise, role, and indi-vidual importance are fundamental for assessing their impact on a software project. Currently-used expertise metrics are agnostic to contributor roles and can lead to incorrect characterizations. To address these issues, we operationalize ..."
Abstract
- Add to MetaCart
operationalize contributor expertise and role. First, we revisit current expertise metrics and show that their use bundles many different aspects, creating ambiguity. Second, we introduce clearly-defined contributor roles, which capture multiple project facets. Third, we propose a graph model, based
Graph-Based Ranking Algorithms for E-mail Expertise Analysis
"... %=g ()I h)/$7 Z!6 ( i> / ']!6<( %-I j! 4 / (K! '$: ..."
Searching For Expertise in Social Networks: A Simulation of Potential Strategies
- Proc. of the 2005 Int. ACM SIGGROUP conf. on Supporting Group Work
, 2005
"... People search for people with suitable expertise all of the time in their social networks – to answer questions or provide help. Recently, efforts have been made to augment this searching. However, relatively little is known about the social characteristics of various algorithms that might be useful ..."
Abstract
-
Cited by 31 (1 self)
- Add to MetaCart
People search for people with suitable expertise all of the time in their social networks – to answer questions or provide help. Recently, efforts have been made to augment this searching. However, relatively little is known about the social characteristics of various algorithms that might
Modeling and exploiting heterogeneous bibliographic networks for expertise ranking
- In Proceedings of the 12th ACM/IEEECS joint conference on Digital Libraries (JCDL’12
, 2012
"... Recently expertise retrieval has received increasing interests in both academia and industry. Finding experts with demonstrated expertise for a given query is a nontrivial task especially from a large-scale Web 2.0 systems, such as question answering and bibliography data, where users are actively p ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
Recently expertise retrieval has received increasing interests in both academia and industry. Finding experts with demonstrated expertise for a given query is a nontrivial task especially from a large-scale Web 2.0 systems, such as question answering and bibliography data, where users are actively
Results 1 - 10
of
225