Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information worth spreading: An exploration of information sharing from social q&a to other social media platforms., and . ASIST, volume 53 of Proc. Assoc. Inf. Sci. Technol., page 1-5. Wiley, (2016)Cognitively Biased Users Interacting with Algorithmically Biased Results in Whole-Session Search on Controversial Topics., and . CoRR, (2024)Understanding users' dynamic perceptions of search gain and cost in sessions: An expectation confirmation model., and . J. Assoc. Inf. Sci. Technol., 75 (9): 937-956 (September 2024)Improving Conversational Recommendation Systems via Bias Analysis and Language-Model-Enhanced Data Augmentation., , , and . EMNLP (Findings), page 3609-3622. Association for Computational Linguistics, (2023)Interactive IR User Study Design, Evaluation, and Reporting, and . Synthesis Lectures on Information Concepts, Retrieval, and Services Morgan & Claypool Publishers, (2019)A Reference-Dependent Model for Web Search Evaluation: Understanding and Measuring the Experience of Boundedly Rational Users., , and . WWW, page 3396-3405. ACM, (2023)Matching Search Result Diversity with User Diversity Acceptance in Web Search Sessions., and . SIGIR, page 2473-2477. ACM, (2022)5 - 4 ≠ 4 - 3: On the Uneven Gaps between Different Levels of Graded User Satisfaction in Interactive Information Retrieval Evaluation., and . HICSS, page 4171-4180. ScholarSpace, (2023)Information Retrieval Research in Academia and Industry: A Preliminary Analysis of Productivity, Authorship, Impact, and Topic Distribution., , and . iConference (2), volume 13972 of Lecture Notes in Computer Science, page 360-370. Springer, (2023)Decoy Effect In Search Interaction: Understanding User Behavior and Measuring System Vulnerability., , , , , and . CoRR, (2024)