TrendTracker: Temporal, network-based exploration of long-term Twitter trends
Abstract
References
Index Terms
- TrendTracker: Temporal, network-based exploration of long-term Twitter trends
Recommendations
Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
Twitter trends, a timely updated set of top terms in Twitter, have the ability to affect the public agenda of the community and have attracted much attention. Unfortunately, in the wrong hands, Twitter trends can also be abused to mislead people. In ...
Integrating web-based intelligence retrieval and decision-making from the twitter trends knowledge base
SWSM '09: Proceedings of the 2nd ACM workshop on Social web search and miningTwitter as a microblogging platform has vast potential to become a collective source of intelligence that can be used to obtain opinions, ideas, facts, and sentiments. This paper addresses the issue on collective intelligence retrieval with activated ...
Twitter under crisis: can we trust what we RT?
SOMA '10: Proceedings of the First Workshop on Social Media AnalyticsIn this article we explore the behavior of Twitter users under an emergency situation. In particular, we analyze the activity related to the 2010 earthquake in Chile and characterize Twitter in the hours and days following this disaster. Furthermore, we ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In

Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Short-paper
Conference
Acceptance Rates
Upcoming Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 31Total Downloads
- Downloads (Last 12 months)31
- Downloads (Last 6 weeks)4
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in