Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
Given a dataset P and a preference function f, a top-k query retrieves the k tuples in P with the highest scores according to f. Even though the problem is well-studied in convent...
For melodic theme retrieval there is a fundamental tradeoff between retrieval performance and retrieval speed. Melodic representations of large dimension yield the best retrieval ...
Norman H. Adams, Daniela Marquez, Gregory H. Wakef...
- The use of a PDA with ad-hoc built-in information retrieval functionalities can help people in visiting an historical site in a natural manner instead of traditional audio/visual...
Antonella Santangelo, Agnese Augello, Antonio Gent...
Search and recommendation systems must include contextual information to effectively model users’ interests. In this paper, we present a systematic study of the effectiveness of...