Author image not provided
 Elad Yom-Tov

 homepage
 eladatieee.org

  Affiliation history
Bibliometrics: publication history
Average citations per article10.22
Citation Count460
Publication count45
Publication years2004-2017
Available for download26
Average downloads per article393.15
Downloads (cumulative)10,222
Downloads (12 Months)682
Downloads (6 Weeks)75
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author




BOOKMARK & SHARE


45 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 45
Result page: 1 2 3

Sort by:

1
April 2017 WWW '17 Companion: Proceedings of the 26th International Conference on World Wide Web Companion
Publisher: International World Wide Web Conferences Steering Committee
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6,   Downloads (12 Months): 43,   Downloads (Overall): 43

Full text available: PDFPDF
People are moved to act following exposure to media coverage of specific events. For example, the ``Werther Effect" is the popular term for the observed increase in suicides following media coverage of suicides. Here we develop a fine-grained method for assessing the effect of news stories on the intentions of ...
Keywords: temporal correlates, news, query intent

2
April 2017 WWW '17: Proceedings of the 26th International Conference on World Wide Web
Publisher: International World Wide Web Conferences Steering Committee
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7,   Downloads (12 Months): 86,   Downloads (Overall): 86

Full text available: PDFPDF
Internet data has surfaced as a primary source for investigation of different aspects of human behavior. A crucial step in such studies is finding a suitable cohort (i.e., a set of users) that shares a common trait of interest to researchers. However, direct identification of users sharing this trait is ...
Keywords: disease screening, query log analysis, health informatics

3
April 2017 WWW '17 Companion: Proceedings of the 26th International Conference on World Wide Web Companion
Publisher: International World Wide Web Conferences Steering Committee
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 11,   Downloads (12 Months): 53,   Downloads (Overall): 53

Full text available: PDFPDF
When a new treatment is considered for use, whether a pharmaceutical drug or a search engine ranking algorithm, a typical question that arises is, will its performance exceed that of the current treatment? The conventional way to answer this counterfactual question is to estimate the effect of the new treatment ...
Keywords: supervised learning, web search ranking, counterfactual prediction, randomized controlled trials, rcts, classification, kernel methods, machine learning, regression

4
April 2016 Information Retrieval: Volume 19 Issue 1-2, April 2016
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 3

The majority of Internet users search for medical information online; however, many do not have an adequate medical vocabulary. Users might have difficulties finding the most authoritative and useful information because they are unfamiliar with the appropriate medical expressions describing their condition; consequently, they are unable to adequately satisfy their ...
Keywords: Query clarification, Health search, Personalized search, Medical informatics

5
March 2016
Bibliometrics:
Citation Count: 0

Most of us have gone online to search for information about health. What are the symptoms of a migraine? How effective is this drug? Where can I find more resources for cancer patients? Could I have an STD? Am I fat? A Pew survey reports more than 80 percent of ...

6
September 2015 ECML PKDD 2015: Proceedings, Part III, of the European Conference on Machine Learning and Knowledge Discovery in Databases - Volume 9286
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Cloud computing resources are sometimes hijacked for fraudulent use. While some fraudulent use manifests as a small-scale resource consumption, a more serious type of fraud is that of fraud storms, which are events of large-scale fraudulent use. These events begin when fraudulent users discover new vulnerabilities in the sign up ...

7
September 2015 ECMLPKDD'15: Proceedings of the 2015th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part III
Publisher: Springer
Bibliometrics:
Citation Count: 0

Cloud computing resources are sometimes hijacked for fraudulent use. While some fraudulent use manifests as a small-scale resource consumption, a more serious type of fraud is that of fraud storms, which are events of large-scale fraudulent use. These events begin when fraudulent users discover new vulnerabilities in the sign up ...

8
September 2015 Data Mining and Knowledge Discovery: Volume 29 Issue 5, September 2015
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 4

Assessing the effect of a health-oriented intervention by traditional epidemiological methods is commonly based only on population segments that use healthcare services. Here we introduce a complementary framework for evaluating the impact of a targeted intervention, such as a vaccination campaign against an infectious disease, through a statistical analysis of ...
Keywords: Gaussian Process, Infectious diseases, Search query logs, Supervised learning, Intervention, Social media, User-generated content

9 published by ACM
August 2015 SIGIR '15: Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 29,   Downloads (Overall): 174

Full text available: PDFPDF
We present an algorithm for identifying users who share a common condition from anonymized search engine logs. Input to the algorithm is a set of seed phrases that identify users with the condition of interest with high precision albeit at a very low recall. We expand the set of seed ...
Keywords: temporal ordering, clustering queries, modularity-based clustering, user condition, users clicks

10 published by ACM
May 2015 DH '15: Proceedings of the 5th International Conference on Digital Health 2015
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 1,   Downloads (12 Months): 25,   Downloads (Overall): 139

Full text available: PDFPDF
Syndromic surveillance refers to the analysis of medical information for the purpose of detecting outbreaks of disease earlier than would have been possible otherwise and to estimate the prevalence of the disease in a population. Internet data, especially search engine queries and social media postings, have shown promise in contributing ...
Keywords: ebola, syndromic surveillance, query logs

11 published by ACM
February 2015 WSDM '15: Proceedings of the Eighth ACM International Conference on Web Search and Data Mining
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 33,   Downloads (Overall): 190

Full text available: PDFPDF
Surveys show that around 70% of US Internet users consult the Internet when they require medical information. People seek this information using both traditional search engines and via social media. The information created using the search process offers an unprecedented opportunity for applications to monitor and improve the quality of ...
Keywords: medicine, machine learning, information retrieval, user-generated data

12
December 2014
Bibliometrics:
Citation Count: 12

User engagement refers to the quality of the user experience that emphasizes the positive aspects of interacting with an online application and, in particular, the desire to use that application longer and repeatedly. User engagement is a key concept in the design of online applications (whether for desktop, tablet or ...

13
April 2014 Social Science Computer Review: Volume 32 Issue 2, April 2014
Publisher: Sage Publications, Inc.
Bibliometrics:
Citation Count: 1

In the last decade, social networks have emerged as a significant media platform for dissemination of political information. In this article, we characterize linguistic factors that affect the dissemination of a political message on Twitter. This is important because characterization of messages that were posted by users from both political ...
Keywords: quantitative politics, linguistic factors, Twitter

14
April 2014 Social Science Computer Review: Volume 32 Issue 2, April 2014
Publisher: Sage Publications, Inc.
Bibliometrics:
Citation Count: 5

The ability of modern web services such as news aggregators and search engines to tailor their results to the tastes of individuals, together with people's preference for reading opinions which reinforce their own viewpoints, have raised concerns that people are nowadays exposed to a narrow range of view-points, a phenomenon ...
Keywords: selective exposure, information retrieval, media bias, political discourse, diversity, search engines, filter bubble

15 published by ACM
November 2013 UEO '13: Proceedings of the 1st workshop on User engagement optimization
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6,   Downloads (12 Months): 31,   Downloads (Overall): 111

Full text available: PDFPDF
Online providers frequently offer a variety of services, ranging from news to mail. These providers endeavour to keep users accessing and interacting with the sites offering these services, that is to engage users by spending time on these sites and returning regularly to them. The standard approach to evaluate engagement ...
Keywords: networks of sites, user engagement, metrics, web traffic

16 published by ACM
July 2013 SIGIR '13: Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 21,   Downloads (Overall): 137

Full text available: PDFPDF
This workshop brings together researchers and practitioners from industry and academia to discuss search and discovery in the medi-cal domain. The event focuses on ways to make medical and health information more accessible to laypeople (including enhancements to ranking algorithms and search interfaces), and how we can dis-cover new medical ...
Keywords: data mining, health seeking, medical discovery

17
March 2013 ECIR'13: Proceedings of the 35th European conference on Advances in Information Retrieval
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 13

During unexpected events such as natural disasters, individuals rely on the information generated by news outlets to form their understanding of these events. This information, while often voluminous, is frequently degraded by the inclusion of unimportant, duplicate, or wrong information. It is important to be able to present users with ...

18 published by ACM
January 2013 ACM SIGIR Forum: Volume 47 Issue 2, December 2013
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 4,   Downloads (12 Months): 9,   Downloads (Overall): 62

Full text available: PDFPDF
The workshop brought together 40 researchers and practitioners from academia and industry to discuss search and discovery in the medical domain. Presentations and discussions spanned several challenging and important topics, including directions improving the accessibility of medical and health information for lay people (with associated enhancements to result ranking algorithms ...

19 published by ACM
January 2013 ACM Transactions on Information Systems (TOIS): Volume 31 Issue 1, January 2013
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 5,   Downloads (12 Months): 23,   Downloads (Overall): 356

Full text available: PDFPDF
The information need of users and the documents which answer this need are frequently contingent on the different characteristics of users. This is especially evident during natural disasters, such as earthquakes and violent weather incidents, which create a strong transient information need. In this article, we investigate how the information ...
Keywords: Social, information, need, distance, physical

20
September 2012 SOCIALCOM-PASSAT '12: Proceedings of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 6

Internet users notoriously take an assumed identity or masquerade as someone else, for reasons such as financial profit or social benefit. But often the converse is also observed, where people choose to reveal true features of their identity, including deeply intimate details. This work attempts to explore several of the ...
Keywords: Social question answering, Truthfulness, Anonymity



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us