Sciweavers

KDD
2000
ACM
97views Data Mining» more  KDD 2000»
13 years 9 months ago
Towards an effective cooperation of the user and the computer for classification
Decision trees have been successfully used for the task of classification. However, state-of-the-art algorithms do not incorporate the user in the tree construction process. This ...
Mihael Ankerst, Martin Ester, Hans-Peter Kriegel
ISMIR
2000
Springer
157views Music» more  ISMIR 2000»
13 years 9 months ago
Using User Models in Music Information Retrieval Systems
To make multimedia data easily retrieved, we use metadata to describe the information, so that search engines or other information filter tools can effectively and efficiently loc...
Wei Chai, Barry Vercoe
ERCIMDL
2000
Springer
118views Education» more  ERCIMDL 2000»
13 years 9 months ago
Evaluating a User-Model Based Personalisation Architecture for Digital News Services
Abstract. An architecture that provides personalised filtering and dissemination of news items is presented. It is based on user profiles and it provides mechanisms that allow the ...
Alberto Díaz Esteban, Pablo Gervás G...
CGI
2003
IEEE
13 years 10 months ago
Consistent Visualization and Querying of GIS Databases by a Location-Aware Mobile Agent
Location-aware mobile users need to access, query, and visualize, geographic information in a wide variety of applications including tourism, navigation, environmental management,...
Suresh K. Lodha, Nikolai M. Faaland, Grant Wong, A...
ESWS
2006
Springer
13 years 10 months ago
Interactive Ontology-Based User Knowledge Acquisition: A Case Study
On the Semantic Web personalization technologies are needed to deal with user diversity. Our research aims at maximising the automation of acquisition of user knowledge, thus provi...
Lora Aroyo, Ronald Denaux, Vania Dimitrova, Michae...
DEXAW
2006
IEEE
138views Database» more  DEXAW 2006»
13 years 10 months ago
Lightweight Ontology-Based Service Discovery in Mobile Environments
The current ever-growing evolution of mobile technologies suggests the possibility of accessing services, in an itinerant and ubiquitous way, through many kinds of mobile devices ...
Devis Bianchini, Valeria De Antonellis, Michele Me...
ACSAC
2004
IEEE
13 years 10 months ago
Tracing the Root of "Rootable" Processes
In most existing systems, the authorization check for system resource access is based on the user ID of the running processes. Such systems are vulnerable to password stealing/cra...
Amit Purohit, Vishnu Navda, Tzi-cker Chiueh
EXPCS
2007
13 years 10 months ago
The user in experimental computer systems research
Experimental computer systems research typically ignores the end-user, modeling him, if at all, in overly simple ways. We argue that this (1) results in inadequate performance eva...
Peter A. Dinda, Gokhan Memik, Robert P. Dick, Bin ...
CSE
2009
IEEE
13 years 10 months ago
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing
A user stores his personal files in a cloud, and retrieves them wherever and whenever he wants. For the sake of protecting the user data privacy and the user queries privacy, a use...
Qin Liu, Guojun Wang, Jie Wu
CIKM
2007
Springer
13 years 10 months ago
Web search personalization with ontological user profiles
Every user has a distinct background and a specific goal when searching for information on the Web. The goal of Web search personalization is to tailor search results to a particu...
Ahu Sieg, Bamshad Mobasher, Robin D. Burke