Sciweavers

308 search results - page 8 / 62
» Capturing User Interests by Both Exploitation and Exploratio...
Sort
View
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
13 years 11 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
IV
2003
IEEE
113views Visualization» more  IV 2003»
14 years 1 months ago
Visualisation of Ontological Inferences for User Control of Personal Web Agents
This paper describes a visualisation tool, VlUM, designed to support users in scrutinising models of their interests, preferences and knowledge. We also describe MECUREO, a tool f...
Trent Apted, Judy Kay, Andrew Lum, James Uther
CIG
2005
IEEE
14 years 1 months ago
Forcing Neurocontrollers to Exploit Sensory Symmetry Through Hard-wired Modularity in the Game of Cellz
Several attempts have been made in the past to construct encoding schemes that allow modularity to emerge in evolving systems, but success is limited. We believe that in order to c...
Julian Togelius, Simon M. Lucas
CHI
2007
ACM
13 years 11 months ago
Capturing, sharing, and using local place information
With new technology, people can share information about everyday places they go; the resulting data helps others find and evaluate places. Recent applications like Dodgeball and S...
Pamela J. Ludford, Reid Priedhorsky, Ken Reily, Lo...
EWCBR
2008
Springer
13 years 9 months ago
Conversational Case-Based Recommendations Exploiting a Structured Case Model
There are case-based recommender systems that generate personalized recommendations for users exploiting the knowledge contained in past recommendation cases. These systems assume ...
Quang Nhat Nguyen, Francesco Ricci