Sciweavers

IAT
2008
IEEE
13 years 11 months ago
PRIMO - Towards Privacy Aware Image Sharing
A growing number of users in Web 2.0 based social network sites and photo sharing portals upload millions of images per day. In many cases, this leads to serious privacy threats. ...
Thorben Burghardt, Andreas Walter, Erik Buchmann, ...
IAT
2008
IEEE
13 years 11 months ago
Affect as Information about Users' Attitudes to Conversational Agents
This paper presents a novel method for automatic evaluation of conversational agents. In the method, information about users’ attitudes and sentiments to conversational agents a...
Michal Ptaszynski, Pawel Dybala, Shinsuke Higuchi,...
IAT
2008
IEEE
13 years 11 months ago
Social and Personal Context Modeling for Contact List Recommendation on Mobile Device
This paper presents a social and personal context modeling method on mobile device. It infers user’s contexts, such as amity with others and emotional state, from uncertain logs...
Jun-Ki Min, Hee-Taek Kim, Sung-Bae Cho
IAT
2008
IEEE
13 years 11 months ago
Integrating Trust with Public Reputation in Location-Based Social Networks for Recommendation Making
The recent emergence of location-based social networking services is revolutionizing web-based social networking allowing users to share real-life experiences via geo-tagged user-...
Touhid Bhuiyan, Yue Xu, Audun Jøsang
IAT
2008
IEEE
13 years 11 months ago
Multidimensional Adaptations for Open Learning Management Systems
Our work is focused on alleviating the workload for designers of adaptive courses on the complexity task of authoring adaptive learning designs adjusted to specific user character...
Silvia Baldiris, Olga C. Santos, David Huerva, Ram...
IAT
2008
IEEE
13 years 11 months ago
Link-Based Anomaly Detection in Communication Networks
Communication networks, such as networks formed by phone calls and email communications, can be modeled as dynamic graphs with vertices representing agents and edges representing ...
Xiaomeng Wan, Evangelos E. Milios, Nauzer Kalyaniw...
IAT
2008
IEEE
13 years 11 months ago
Extending a Defeasible Reasoner with Modal and Deontic Logic Operators
Defeasible logic is a non-monotonic formalism that deals with incomplete and conflicting information. Modal logic deals with necessity and possibility, exhibiting defeasibility; t...
Efstratios Kontopoulos, Nick Bassiliades, Guido Go...
IAT
2008
IEEE
13 years 11 months ago
A Pragmatic Approach to Realizing Context-Aware Personal Services
As network and computing technologies have improved, and the number of mobile devices has increased, realizing context-aware personal services has become one of the most important...
Sangkeun Lee, Dongjoo Lee, Seungseok Kang, Sang-go...
IAT
2008
IEEE
13 years 11 months ago
Extracting Key Factors to Design Applications in Ambient Intelligence Environment
In an ambient intelligence environment, the design of applications influences the users behavior heavily. The purpose of this paper is to provide key factors considered necessary...
Hiroaki Kimura, Tatsuo Nakajima
IAT
2008
IEEE
13 years 11 months ago
Vector Opinion Dynamics: An Extended Model for Consensus in Social Networks
Alya Alaali, Maryam Purvis, Bastin Tony Roy Savari...