Sciweavers

79 search results - page 11 / 16
» Identifying Inhabitants of an Intelligent Environment Using ...
Sort
View
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
14 years 7 months ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...
UM
2010
Springer
14 years 13 days ago
Detecting Gaming the System in Constraint-Based Tutors
Recently, detectors of gaming the system have been developed for several intelligent tutoring systems where the problem-solving process is reified, and gaming consists of systemati...
Ryan S. J. d. Baker, Antonija Mitrovic, Moffat Mat...
CIMCA
2005
IEEE
13 years 9 months ago
Customised Customer Support Using a Soft Computing Approach
This paper describes the research and development of a methodology to identify the type of information required by the service advisor (CSA) within customer contact centre (CCC) e...
S. Shah, Rajkumar Roy, Ashutosh Tiwari, Basim Maje...
KDD
2009
ACM
185views Data Mining» more  KDD 2009»
14 years 8 months ago
Entity discovery and assignment for opinion mining applications
Opinion mining became an important topic of study in recent years due to its wide range of applications. There are also many companies offering opinion mining services. One proble...
Xiaowen Ding, Bing Liu, Lei Zhang
SIGKDD
2010
259views more  SIGKDD 2010»
13 years 2 months ago
Activity recognition using cell phone accelerometers
Mobile devices are becoming increasingly sophisticated and the latest generation of smart cell phones now incorporates many diverse and powerful sensors. These sensors include GPS...
Jennifer R. Kwapisz, Gary M. Weiss, Samuel Moore