A growing number of users in Web 2.0 based social network sites and photo sharing portals upload millions of images per day. In many cases, this leads to serious privacy threats. ...
Thorben Burghardt, Andreas Walter, Erik Buchmann, ...
This paper presents a novel method for automatic evaluation of conversational agents. In the method, information about users’ attitudes and sentiments to conversational agents a...
Michal Ptaszynski, Pawel Dybala, Shinsuke Higuchi,...
This paper presents a social and personal context modeling method on mobile device. It infers user’s contexts, such as amity with others and emotional state, from uncertain logs...
The recent emergence of location-based social networking services is revolutionizing web-based social networking allowing users to share real-life experiences via geo-tagged user-...
Our work is focused on alleviating the workload for designers of adaptive courses on the complexity task of authoring adaptive learning designs adjusted to specific user character...
Silvia Baldiris, Olga C. Santos, David Huerva, Ram...
Communication networks, such as networks formed by phone calls and email communications, can be modeled as dynamic graphs with vertices representing agents and edges representing ...
Xiaomeng Wan, Evangelos E. Milios, Nauzer Kalyaniw...
Defeasible logic is a non-monotonic formalism that deals with incomplete and conflicting information. Modal logic deals with necessity and possibility, exhibiting defeasibility; t...
Efstratios Kontopoulos, Nick Bassiliades, Guido Go...
As network and computing technologies have improved, and the number of mobile devices has increased, realizing context-aware personal services has become one of the most important...
In an ambient intelligence environment, the design of applications influences the users behavior heavily. The purpose of this paper is to provide key factors considered necessary...