Page 462 -
P. 462
References 453
Woo, H., Cho, Y., Shim, E., Lee, J.-K., Lee, C.-G., Kim, S.H., 2016. Estimating influenza out-
breaks using both search engine query data and social media data in South Korea. Journal
of Medical Internet Research 18 (7), e177.
Xiang, R., Neville, J., Rogati, M., 2010. Modeling relationship strength in online social net-
works. In: Proceedings of the 19th International Conference on World wide Web. ACM,
Raleigh, NC, pp. 981–990.
Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G., 2012. Analyzing spammers' social net-
works for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings
of the 21st International Conference on World Wide Web. ACM, Lyon, pp. 71–80.
Zeni, M., Zaihrayeu, I., Giunchiglia, F., 2014. Multi-device activity logging. In: Proceedings
of the ACM International Joint Conference on Pervasive and Ubiquitous Computing:
Adjunct Publication. ACM, Seattle, WA, pp. 299–302.
Zhang, X., Chen, Z., Fang, C., Liu, Z., 2016. Guiding the crowds for android testing. In:
Proceedings of the 38th International Conference on Software Engineering Companion.
ACM, Austin, TX, pp. 752–753.
Zhao, R., Wang, J., 2011. Visualizing the research on pervasive and ubiquitous computing.
Scientometrics 86 (3), 593–612.
Zhu, S., Kane, S.K., Feng, J., Sears, A., 2012. A crowdsourcing quality control model for
tasks distributed in parallel. In: CHI '12 extended abstracts on human factors in computing
systems. ACM, Austin, TX, ISBN: 978-1-4503-1016-1, pp. 2501–2506.
Zlatos, B., 2009. Google Purchases Carnegie Mellon University Spin-Off ReCaptcha.
Pittsburgh Tribune-Review.