Sciweavers

1176 search results - page 138 / 236
» Exploiting Online Games
Sort
View
IV
2006
IEEE
104views Visualization» more  IV 2006»
15 years 5 months ago
Easy Grocery: 3D Visualization in e-Grocery
There are many deficiencies in the traditional electronic commerce schema. The main problem for consideration is the text and picture based design that underpins current HTML syst...
J. Somerville, Liz J. Stuart, N. Barlow
GECCO
2005
Springer
162views Optimization» more  GECCO 2005»
15 years 4 months ago
An autonomous explore/exploit strategy
In reinforcement learning problems it has been considered that neither exploitation nor exploration can be pursued exclusively without failing at the task. The optimal balance bet...
Alex McMahon, Dan Scott, William N. L. Browne
98
Voted
WPES
2003
ACM
15 years 4 months ago
Preserving privacy when preference searching in e-commerce
The idea of using user preferences to assist with information filtering and with providing the most “relevant” answers to queries has recently received some attention from th...
Rhys Smith, Jianhua Shao
ACMICEC
2008
ACM
272views ECommerce» more  ACMICEC 2008»
15 years 22 days ago
Adapting the interaction state model in conversational recommender systems
Conventional conversational recommender systems support interaction strategies that are hard-coded into the system in advance. In this context, Reinforcement Learning techniques h...
Tariq Mahmood, Francesco Ricci
98
Voted
ECWEB
2010
Springer
219views ECommerce» more  ECWEB 2010»
15 years 16 hour ago
Semantic Tag Cloud Generation via DBpedia
Abstract. Many current recommender systems exploit textual annotations (tags) provided by users to retrieve and suggest online contents. The text-based recommendation provided by t...
Roberto Mirizzi, Azzurra Ragone, Tommaso Di Noia, ...