Author: Claudia Heß
Publisher: IOS Press
ISBN: 9783898383165
Category : Artificial Intelligence
Languages : en
Pages : 246
Book Description
The huge interest in social networking applications – Friendster.com, for example, has more than 40 million users – led to a considerable research interest in using this data for generating recommendations. Especially recommendation techniques that analyze trust networks were found to provide very accurate and highly personalized results. The main contribution of this thesis is to extend the approach to trust-based recommendations, which up to now have been made for unlinked items such as products or movies, to linked resources, in particular documents. Therefore, a second type of network, namely a document reference network, is considered apart from the trust network. This is, for example, the citation network of scientific publications or the hyperlink graph of webpages. Recommendations for documents are typically made by reference-based visibility measures which consider a document to be the more important, the more often it is referenced by important documents. These two networks, as well as further networks such as organization networks, are integrated in a multi-layer network. This architecture allows for combining classical measures for the visibility of a document with trust-based recommendations, giving trust-enhanced visibility measures. Moreover, an approximation approach is introduced which considers the uncertainty induced by duplicate documents. These measures are evaluated in simulation studies. The trust-based recommender system for scientific publications SPRec implements a two-layer architecture and provides personalized recommendations via a web interface.
Trust-based Recommendations in Multi-layer Networks
Author: Claudia Heß
Publisher: IOS Press
ISBN: 9783898383165
Category : Artificial Intelligence
Languages : en
Pages : 246
Book Description
The huge interest in social networking applications – Friendster.com, for example, has more than 40 million users – led to a considerable research interest in using this data for generating recommendations. Especially recommendation techniques that analyze trust networks were found to provide very accurate and highly personalized results. The main contribution of this thesis is to extend the approach to trust-based recommendations, which up to now have been made for unlinked items such as products or movies, to linked resources, in particular documents. Therefore, a second type of network, namely a document reference network, is considered apart from the trust network. This is, for example, the citation network of scientific publications or the hyperlink graph of webpages. Recommendations for documents are typically made by reference-based visibility measures which consider a document to be the more important, the more often it is referenced by important documents. These two networks, as well as further networks such as organization networks, are integrated in a multi-layer network. This architecture allows for combining classical measures for the visibility of a document with trust-based recommendations, giving trust-enhanced visibility measures. Moreover, an approximation approach is introduced which considers the uncertainty induced by duplicate documents. These measures are evaluated in simulation studies. The trust-based recommender system for scientific publications SPRec implements a two-layer architecture and provides personalized recommendations via a web interface.
Publisher: IOS Press
ISBN: 9783898383165
Category : Artificial Intelligence
Languages : en
Pages : 246
Book Description
The huge interest in social networking applications – Friendster.com, for example, has more than 40 million users – led to a considerable research interest in using this data for generating recommendations. Especially recommendation techniques that analyze trust networks were found to provide very accurate and highly personalized results. The main contribution of this thesis is to extend the approach to trust-based recommendations, which up to now have been made for unlinked items such as products or movies, to linked resources, in particular documents. Therefore, a second type of network, namely a document reference network, is considered apart from the trust network. This is, for example, the citation network of scientific publications or the hyperlink graph of webpages. Recommendations for documents are typically made by reference-based visibility measures which consider a document to be the more important, the more often it is referenced by important documents. These two networks, as well as further networks such as organization networks, are integrated in a multi-layer network. This architecture allows for combining classical measures for the visibility of a document with trust-based recommendations, giving trust-enhanced visibility measures. Moreover, an approximation approach is introduced which considers the uncertainty induced by duplicate documents. These measures are evaluated in simulation studies. The trust-based recommender system for scientific publications SPRec implements a two-layer architecture and provides personalized recommendations via a web interface.
Advances in User Modeling
Author: Liliana Ardissono
Publisher: Springer Science & Business Media
ISBN: 3642285082
Category : Computers
Languages : en
Pages : 425
Book Description
This book constitutes selected papers from the lectures given at the workshops held in conjunction with the User Modeling, Adaptation and Personalization Conference, UMAP 2011, Girona, Spain, in July 2011. The 40 papers presented were carefully reviewed and selected for inclusion in this book. For each workshop there is an overview paper summarizing the workshop themes, the accepted contributions and the future research trends. In addition the volume presents a selection of the best poster papers of UMAP 2011. The workshops included are: AST, adaptive support for team collaboration; AUM, augmenting user models with real worlds experiences to enhance personalization and adaptation; DEMRA, decision making and recommendation acceptance issues in recommender systems; PALE, personalization approaches in learning environments; SASWeb, semantic adaptive social web; TRUM, trust, reputation and user modeling; UMADR, user modeling and adaptation for daily routines: providing assistance to people with special and specific needs; UMMS, user models for motivational systems: the affective and the rational routes to persuasion.
Publisher: Springer Science & Business Media
ISBN: 3642285082
Category : Computers
Languages : en
Pages : 425
Book Description
This book constitutes selected papers from the lectures given at the workshops held in conjunction with the User Modeling, Adaptation and Personalization Conference, UMAP 2011, Girona, Spain, in July 2011. The 40 papers presented were carefully reviewed and selected for inclusion in this book. For each workshop there is an overview paper summarizing the workshop themes, the accepted contributions and the future research trends. In addition the volume presents a selection of the best poster papers of UMAP 2011. The workshops included are: AST, adaptive support for team collaboration; AUM, augmenting user models with real worlds experiences to enhance personalization and adaptation; DEMRA, decision making and recommendation acceptance issues in recommender systems; PALE, personalization approaches in learning environments; SASWeb, semantic adaptive social web; TRUM, trust, reputation and user modeling; UMADR, user modeling and adaptation for daily routines: providing assistance to people with special and specific needs; UMMS, user models for motivational systems: the affective and the rational routes to persuasion.
An Agent Control Perspective on Qualitative Spatial Reasoning
Author: Frank Dylla
Publisher: IOS Press
ISBN: 9783898383202
Category : Knowledge representation (Information theory)
Languages : en
Pages : 202
Book Description
Publisher: IOS Press
ISBN: 9783898383202
Category : Knowledge representation (Information theory)
Languages : en
Pages : 202
Book Description
WASABI
Author: Christian Becker-Asano
Publisher: IOS Press
ISBN: 9783898383196
Category : Artificial intelligence
Languages : en
Pages : 208
Book Description
Publisher: IOS Press
ISBN: 9783898383196
Category : Artificial intelligence
Languages : en
Pages : 208
Book Description
Web Information Systems Engineering -- WISE 2013
Author: Xuemin Lin
Publisher: Springer
ISBN: 3642412300
Category : Computers
Languages : en
Pages : 550
Book Description
This book constitutes the proceedings of the 14th International Conference on Web Information Systems Engineering, WISE 2013, held in Nanjing, China, in October 2013. The 48 full papers, 29 short papers, and 10 demo and 5 challenge papers, presented in the two-volume proceedings LNCS 8180 and 8181, were carefully reviewed and selected from 198 submissions. They are organized in topical sections named: Web mining; Web recommendation; Web services; data engineering and database; semi-structured data and modeling; Web data integration and hidden Web; challenge; social Web; information extraction and multilingual management; networks, graphs and Web-based business processes; event processing, Web monitoring and management; and innovative techniques and creations.
Publisher: Springer
ISBN: 3642412300
Category : Computers
Languages : en
Pages : 550
Book Description
This book constitutes the proceedings of the 14th International Conference on Web Information Systems Engineering, WISE 2013, held in Nanjing, China, in October 2013. The 48 full papers, 29 short papers, and 10 demo and 5 challenge papers, presented in the two-volume proceedings LNCS 8180 and 8181, were carefully reviewed and selected from 198 submissions. They are organized in topical sections named: Web mining; Web recommendation; Web services; data engineering and database; semi-structured data and modeling; Web data integration and hidden Web; challenge; social Web; information extraction and multilingual management; networks, graphs and Web-based business processes; event processing, Web monitoring and management; and innovative techniques and creations.
Applied Informatics and Communication, Part I
Author: Dehuai Zheng
Publisher: Springer Science & Business Media
ISBN: 3642232132
Category : Computers
Languages : en
Pages : 765
Book Description
The five volume set CCIS 224-228 constitutes the refereed proceedings of the International conference on Applied Informatics and Communication, ICAIC 2011, held in Xi'an, China in August 2011. The 446 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover a broad range of topics in computer science and interdisciplinary applications including control, hardware and software systems, neural computing, wireless networks, information systems, and image processing.
Publisher: Springer Science & Business Media
ISBN: 3642232132
Category : Computers
Languages : en
Pages : 765
Book Description
The five volume set CCIS 224-228 constitutes the refereed proceedings of the International conference on Applied Informatics and Communication, ICAIC 2011, held in Xi'an, China in August 2011. The 446 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover a broad range of topics in computer science and interdisciplinary applications including control, hardware and software systems, neural computing, wireless networks, information systems, and image processing.
On the Move to Meaningful Internet Systems: OTM 2016 Conferences
Author: Christophe Debruyne
Publisher: Springer
ISBN: 3319484729
Category : Computers
Languages : en
Pages : 1003
Book Description
This volume constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2016, Ontologies, Databases, and Applications of Semantics, ODBASE 2016, and Cloud and Trusted Computing, C&TC, held as part of OTM 2016 in October 2016 in Rhodes, Greece. The 45 full papers presented together with 16 short papers were carefully reviewed and selected from 133 submissions. The OTM program every year covers data and Web semantics, distributed objects, Web services, databases, information systems, enterprise workow and collaboration, ubiquity, interoperability, mobility,grid and high-performance computing.
Publisher: Springer
ISBN: 3319484729
Category : Computers
Languages : en
Pages : 1003
Book Description
This volume constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2016, Ontologies, Databases, and Applications of Semantics, ODBASE 2016, and Cloud and Trusted Computing, C&TC, held as part of OTM 2016 in October 2016 in Rhodes, Greece. The 45 full papers presented together with 16 short papers were carefully reviewed and selected from 133 submissions. The OTM program every year covers data and Web semantics, distributed objects, Web services, databases, information systems, enterprise workow and collaboration, ubiquity, interoperability, mobility,grid and high-performance computing.
Advances in Wireless Sensor Networks
Author: Ruchuan Wang
Publisher: Springer
ISBN: 3642362524
Category : Computers
Languages : en
Pages : 769
Book Description
This book constitutes the refereed proceedings of the 6th China Conference on Advances in Wireless Sensor Networks, held in Huangshan, China, in October 2012. The 70 revised full papers were carefully reviewed and selected from 458 submissions. The papers cover a wide range of topics including in the wireless sensor network fields nodes systems, infrastructures, communication protocols, and data management.
Publisher: Springer
ISBN: 3642362524
Category : Computers
Languages : en
Pages : 769
Book Description
This book constitutes the refereed proceedings of the 6th China Conference on Advances in Wireless Sensor Networks, held in Huangshan, China, in October 2012. The 70 revised full papers were carefully reviewed and selected from 458 submissions. The papers cover a wide range of topics including in the wireless sensor network fields nodes systems, infrastructures, communication protocols, and data management.
Trusted Computing and Information Security
Author: Huanguo Zhang
Publisher: Springer
ISBN: 981135913X
Category : Computers
Languages : en
Pages : 420
Book Description
This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2018, held in Wuhan, China, in October 2018. The 24 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, and network security.
Publisher: Springer
ISBN: 981135913X
Category : Computers
Languages : en
Pages : 420
Book Description
This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2018, held in Wuhan, China, in October 2018. The 24 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, and network security.
Machine Learning for Cyber Security
Author: Xiaofeng Chen
Publisher: Springer Nature
ISBN: 3030624633
Category : Computers
Languages : en
Pages : 570
Book Description
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi’an, China in October 2020. The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence.
Publisher: Springer Nature
ISBN: 3030624633
Category : Computers
Languages : en
Pages : 570
Book Description
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi’an, China in October 2020. The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence.