Author of the publication

Exploring Patterns of Identity Usage in Tweets: A New Problem, Solution and Case Study.

, , and . WWW, page 401-412. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging media repertoires to create new social ties., , and . UbiComp, page 798-799. ACM, (2012)NeuroTPR: A neuro-net toponym recognition model for extracting locations from social media messages., , and . Trans. GIS, 24 (3): 719-735 (2020)Exploring Patterns of Identity Usage in Tweets: A New Problem, Solution and Case Study., , and . WWW, page 401-412. ACM, (2016)An approach to selecting keywords to track on twitter during a disaster., , and . ISCRAM, ISCRAM Association, (2014)Geo-knowledge-guided GPT models improve the extraction of location descriptions from disaster-related social media messages., , , , , , , , and . CoRR, (2023)Polarized, Together: Comparing Partisan Support for Trump's Tweets Using Survey and Platform-Based Measures., , , , and . ICWSM, page 290-301. AAAI Press, (2019)A Bayesian Graphical Model to Discover Latent Events from Twitter., , , and . ICWSM, page 503-512. AAAI Press, (2015)Girls Rule, Boys Drool: Extracting Semantic and Affective Stereotypes from Twitter., , and . CSCW, page 1362-1374. ACM, (2017)Exploring characteristics of suspended users and network stability on Twitter., , , and . Soc. Netw. Anal. Min., 6 (1): 51:1-51:18 (2016)Theory In, Theory Out: The Uses of Social Theory in Machine Learning for Social Science, and . Frontiers in Big Data, (May 2020)