<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462022000100195</article-id>
<article-id pub-id-type="doi">10.13053/cys-26-1-4164</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Treemap Visualization: A Hierarchical Method for Discovering User Profiles on Twitter]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[López-Ornelas]]></surname>
<given-names><![CDATA[Erick]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Abascal-Mena]]></surname>
<given-names><![CDATA[Rocío]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Autónoma Metropolitana Information Technology Department ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Autónoma Metropolitana Information Technology Department ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2022</year>
</pub-date>
<volume>26</volume>
<numero>1</numero>
<fpage>195</fpage>
<lpage>202</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462022000100195&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462022000100195&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462022000100195&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: People use microblogging platforms like Twitter to involve with other users for a wide range of interests and practices. Twitter profiles run by different types of users such as humans, bots, spammers, businesses and professionals. This research uses a treemap visualization to identify different users profile on Twitter. For this purpose, we exploit users' profile and tweeting behavior information. We evaluate our approach by visualizing the different Twitter profiles. This treemap visualization technique can be used to identify easily the different users&#8217; profile in a wide range of users. We focus just on user activity, ignoring the content of messages. We take into consideration both social interactions and tweeting patterns, which allow us to profile users according to their activity patterns using treemaps.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Treemaps]]></kwd>
<kwd lng="en"><![CDATA[Hierarchical visualization]]></kwd>
<kwd lng="en"><![CDATA[Twitter]]></kwd>
<kwd lng="en"><![CDATA[User profile]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tu]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Yuille]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Shape matching and registration by data-driven EM]]></article-title>
<source><![CDATA[Computer Vision and Image Understanding]]></source>
<year>2008</year>
<volume>109</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>290-304</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yin]]></surname>
<given-names><![CDATA[P. Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A tabu search approach to polygonal approximation of digital curves]]></article-title>
<source><![CDATA[International Journal of Pattern Recognition and Artificial Intelligence]]></source>
<year>2000</year>
<volume>14</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>243-55</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fischer]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Reuber]]></surname>
<given-names><![CDATA[A. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social interaction via new social media: (how) can interactions on twitter affect effectual thinking and behavior?]]></article-title>
<source><![CDATA[Journal of business venturing]]></source>
<year>2011</year>
<volume>26</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-18</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Benevenuto]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Magno]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodrigues]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Almeida]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Detecting spammers on twitter]]></source>
<year>2010</year>
<volume>6</volume>
<conf-name><![CDATA[ Collaboration, electronic messaging, anti-abuse and spam conference (CEAS)]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hannon]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Bennett]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Smyth]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Recommending twitter users to follow using content and collaborative filtering approaches]]></source>
<year>2010</year>
<conf-name><![CDATA[ fourth ACM conference on Recommender systems]]></conf-name>
<conf-loc> </conf-loc>
<page-range>199-206</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Castillo]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Mendoza]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Poblete]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Information credibility on twitter]]></source>
<year>2011</year>
<conf-name><![CDATA[ 20th international conference on World Wide Web]]></conf-name>
<conf-loc> </conf-loc>
<page-range>675-84</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Paul]]></surname>
<given-names><![CDATA[S. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hong]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Chi]]></surname>
<given-names><![CDATA[E. H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Is twitter a good place for asking questions? A characterization study]]></source>
<year>2011</year>
<conf-name><![CDATA[ ICWSM]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pennacchiotti]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Popescu]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[A machine learning approach to twitter user classification]]></source>
<year>2011</year>
<conf-name><![CDATA[ ICWSM]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Millen]]></surname>
<given-names><![CDATA[D. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Patterson]]></surname>
<given-names><![CDATA[J. F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Stimulating social engagement in a community network]]></source>
<year>2002</year>
<conf-name><![CDATA[ ACM Conference on Computer-Supported Cooperative Work]]></conf-name>
<conf-loc> </conf-loc>
<page-range>306-13</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Krauss]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Nann]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Simon]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Fischbach]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Gloor]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Predicting movie success and academy awards through sentiment and social network analysis]]></source>
<year>2008</year>
<conf-name><![CDATA[ 16th European Conference on Information Systems ECIS]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leskovec]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Mcglohon]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Faloutsos]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Glance]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Hurst]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Information propagation and network evolution on the web]]></source>
<year>2009</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Naveed]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Gottron]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Kunegis]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Alhadi]]></surname>
<given-names><![CDATA[A. C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Bad news travel fast: A content-based analysis of interestingness on twitter]]></source>
<year>2011</year>
<conf-name><![CDATA[ ACM WebSci&#8217;11]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-7</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Counts]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Predicting the speed, scale, and range of information diffusion in twitter]]></source>
<year>2010</year>
<conf-name><![CDATA[ International AAAI Conference on Weblogs and Social Media]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chu]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Gianvecchio]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Jajodia]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Who is tweeting on twitter: Human, bot, or cyborg?]]></source>
<year>2010</year>
<conf-name><![CDATA[ 26th Annual Computer Security Applications Conference]]></conf-name>
<conf-loc> </conf-loc>
<page-range>21-30</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Java]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Finin]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Song]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Tseng]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Why we twitter: Understanding microblogging usage and communities]]></source>
<year>2007</year>
<conf-name><![CDATA[ Joint 9th WEBKDD and 1st SNA-KDD Workshop]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pennacchiotti]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Popescu]]></surname>
<given-names><![CDATA[A.-M.]]></given-names>
</name>
</person-group>
<source><![CDATA[A machine learning approach to twitter user classification]]></source>
<year>2011</year>
<conf-name><![CDATA[ Fifth International AAAI Conference on Weblogs and Social Media]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cha]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Haddadi]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Benevenuto]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Gummadi]]></surname>
<given-names><![CDATA[K. P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Measuring user influence in twitter: The million follower fallacy]]></source>
<year>2010</year>
<conf-name><![CDATA[ 4th International AAAI Conference on Weblogs and Social Media ICWSM]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Petrovic]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Osborne]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Lavrenko]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Rt to win! Predicting message propagation in twitter]]></source>
<year>2011</year>
<conf-name><![CDATA[ International Conference on Weblogs and Social Media ICWSM]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gomez-Rodriguez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Leskovec]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Krause]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Inferring networks of diffusion and influence]]></source>
<year>2010</year>
<page-range>1019-28</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shneiderman]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Tree visualization with treemaps: A 2d space-filling approach]]></article-title>
<source><![CDATA[Technical report]]></source>
<year>1991</year>
<publisher-name><![CDATA[HCI Lab University of Maryland]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bruls]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Huizing]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[van Wijk]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Squarified treemap]]></source>
<year>2000</year>
<conf-name><![CDATA[ Joint Eurographics/IEEE TVCG Symp. Visualization, VisSym]]></conf-name>
<conf-loc> </conf-loc>
<page-range>33-42</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
