Sciweavers

284 search results - page 33 / 57
» Group User Models for Personalized Hyperlink Recommendations
Sort
View
JCP
2007
121views more  JCP 2007»
13 years 8 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
APSCC
2007
IEEE
13 years 10 months ago
Consumer-Friendly Shopping Assistance by Personal Behavior Log Analysis on Ubiquitous Shop Space
: This paper has proposed a shopping assistance service. We provide consumer-friendly services which based on personal behavior log data. The consumer-friendly services are informa...
Somkiat Sae-Ueng, Sineenard Pinyapong, Akihiro Ogi...
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 8 months ago
Personality Trait Based Simulation Model of the E-mail System
Within the area of criminal and terrorist social network analysis, there is little research being done on analysing the communication behavior of criminal and terrorist groups. In...
Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hart...
IUI
2011
ACM
12 years 11 months ago
Groups without tears: mining social topologies from email
As people accumulate hundreds of “friends” in social media, a flat list of connections becomes unmanageable. Interfaces agnostic to social structure hinder the nuanced sharin...
Diana MacLean, Sudheendra Hangal, Seng Keat Teh, M...
SIGMOD
2010
ACM
189views Database» more  SIGMOD 2010»
14 years 1 months ago
Recsplorer: recommendation algorithms based on precedence mining
We study recommendations in applications where there are temporal patterns in the way items are consumed or watched. For example, a student who has taken the Advanced Algorithms c...
Aditya G. Parameswaran, Georgia Koutrika, Benjamin...