Filters








365,936 Hits in 3.7 sec

Multiple domain user personalization

Yucheng Low, Deepak Agarwal, Alexander J. Smola
2011 Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '11  
Content personalization is a key tool in creating attractive websites. Synergies can be obtained by integrating personalization between several internet properties.  ...  Our model allows the integration of multiple properties without changing the overall structure, which makes it easily extensible across large internet portals.  ...  In this paper, we propose a solution to the cold-start problem by combining user information across multiple domains(properties).  ... 
doi:10.1145/2020408.2020434 dblp:conf/kdd/LowAS11 fatcat:3hnffnf6jfchvix5zn73m3znve

Privacy Preserving Health Record System in Cloud Computing using Attribute based Encryption

Kushal P.Kulkarni, A.M.Dixit A.M.Dixit
2015 International Journal of Computer Applications  
Cloud Provider: It can be a person, organization or institute that provides the services to the users.  ...  ABE is an extension of IBE scheme in that multiple public known attributes as the public key.  ...  users in the personal domain.  ... 
doi:10.5120/21798-5102 fatcat:uwazjbcglbhjbfgem4eeujucki

Factic: Personalized Exploratory Search in the Semantic Web [chapter]

Michal Tvarožek, Mária Bieliková
2010 Lecture Notes in Computer Science  
We combine and extend personalization approaches, faceted browsers, graph-based visualization and tree-based history visualization in order to provide users with advanced information exploration and discovery  ...  We present our personalized exploratory browser Factic as a unique client-side tool for effective Semantic Web exploration.  ...  -User interface generation -(semi)automated generation of the browser's user interface based on semantic metadata from the domain ontology to facilitate use in multiple or changing information domains  ... 
doi:10.1007/978-3-642-13911-6_44 fatcat:dfxcdogvmbhxhond7ltznlog7a

Tutorial on cross-domain recommender systems

Iván Cantador, Paolo Cremonesi
2014 Proceedings of the 8th ACM Conference on Recommender systems - RecSys '14  
Cross-domain recommender systems aim to generate or enhance personalized recommendations in a target domain by exploiting knowledge (mainly user preferences) form other source domains.  ...  This may beneficial for generating better recommendations, e.g. mitigating the cold-start and sparsity problems in a target domain, and enabling personalized cross-selling for items from multiple domains  ...  Large e-commerce sites like Amazon and eBay, however, often store user feedback for items from multiple domains, and in social networks users often provide feedback for a variety of topics.  ... 
doi:10.1145/2645710.2645777 dblp:conf/recsys/CantadorC14 fatcat:uut6h7xanzal7h4mgz65w3ocqi

Requirement emergence computation of networked software

Keqing He, Peng Liang, Rong Peng, Bing Li, Jing Liu
2007 Frontiers of Computer Science in China  
With the substantial increase in scale and complexity of network-based information systems, the uncertain user requirements from the Internet and personalized application requirement result in the frequent  ...  Five scales and the evolutionary growth mechanism in requirement emergence computation of networked software are given with focus on user-dominant and domain-oriented requirement, and the rules and predictability  ...  modeling and emergence computation for domain-oriented software driven by "personalized" and "multiple" user requirement.  ... 
doi:10.1007/s11704-007-0031-2 fatcat:ii53vx7tqrhwlclydfzmz7gx4u

Personalized semantic assistance for the curation of biochemical literature

Fedor Bakalov, Marie-Jean Meurs, Birgitta Konig-Ries, Bahar Sateli, Rene Witte, Greg Butler, Adrian Tsang
2012 2012 IEEE International Conference on Bioinformatics and Biomedicine  
Personalization Service (PS)  Personalization Rules Resource Metadata Introspective Views Introduction Architecture User Interface Conclusion System Architecture II Domain Modeling  ...  Service (DMS)  Domain Ontology Resource Management Service (RMS)  User Modeling Service (UMS)  User Model Personalization Service (PS) Introduction Architecture User Interface  ...  Listing Portlet request various types of semantic assistance view a list of named entities extracted from the publications access Semantic Assistants menu decide how to display results access personalization  ... 
doi:10.1109/bibm.2012.6392735 dblp:conf/bibm/BakalovMKSWBT12 fatcat:ni76spbbinawpnn3uynxeqjxme

Personal information management with SEMEX

Yuhan Cai, Xin Luna Dong, Alon Halevy, Jing Michelle Liu, Jayant Madhavan
2005 Proceedings of the 2005 ACM SIGMOD international conference on Management of data - SIGMOD '05  
Domain model: Semex users and applications interact with the system through a domain model of personal information.  ...  Clearly, one of the important features of a PIM system is that users be able to personalize their domain models.  ... 
doi:10.1145/1066157.1066289 dblp:conf/sigmod/CaiDHLM05 fatcat:xcnn2kqxcrdoznd5j3edc5f3fq

Secure Sharing of Personal Health Record in Server with On-track ECG Monitoring

Dona Mary Thomas
2014 IOSR Journal of Computer Engineering  
It focuses on the multiple data owner scenario, and divides the users in the PHR system into multiple security domain that greatly reduces the key management complexity for owners and users.  ...  Personal Health Record (PHR) paved the way to the patient centric model of health information exchange.  ...  access privileges, and revocation of a personal domain user.  ... 
doi:10.9790/0661-16573340 fatcat:7s7wvzev2re75d6zegnzszww4a

Secure Sharing of Personal Health Records in Cloud Computing using Encryption

Sabna A B, Harsha T D
2015 International Journal of Computer Applications Technology and Research  
Personal health record (PHR) is considered as an emerging patient-centric model of health information exchange, where people can share their health information to other people.  ...  Since there are wide privacy concerns about the health records and due to high operational cost, users stored at a third party server called as Cloud Server.  ...  The PHR data should support the users from personal domain as well as public domain.  ... 
doi:10.7753/ijcatr0401.1011 fatcat:2y35caqigneaneodupdnijthuu

Efficient data retrieval using corrugated search technique

Vishnupriya V, Shameema Parveen A, Rithra R, Shanmugasundaram M, Manimegalai R
2012 International Journal of Advances in Computing and Information Technology  
After login, the search term is given by the user. The search term can be part of a single domain or multiple domains.  ...  If the search term is available in multiple domains, the final result will be shown according to the user preference.  ... 
doi:10.6088/ijacit.12.10014 fatcat:7fe2vbojhffsdedewdcvqxn7rq

A Unified Framework for Cross-Domain and Cross-System Recommendations [article]

Feng Zhu, Yan Wang, Jun Zhou, Chaochao Chen, Longfei Li, Guanfeng Liu
2021 arXiv   pre-print
Cross-Domain Recommendation (CDR) and Cross-System Recommendation (CSR) have been proposed to improve the recommendation accuracy in a target dataset (domain/system) with the help of a source one with  ...  In GA, we first construct separate heterogeneous graphs to generate more representative user and item embeddings.  ...  CH3: how to avoid negative transfer when combining the embeddings of common users from multiple domains?  ... 
arXiv:2108.07976v1 fatcat:gfie4f5b4ncuvotz7wiqlhaice

Access of Encrypted Personal Record in Cloud

Shwetambari G.Pundkar
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
Cloud ensures that personal record availability to the necessary user at any p oint of time.  ...  In maintaining Personal Record, cloud computing plays an important role, since minor organizations are not affordable to keep own servers to maintain the personal record for cost and security aims.  ...  Different from previous works in secure data, the main focus on the multiple data owner consequence, and divide the users in the record system into multiple security domains that greatly reduces the key  ... 
doi:10.17762/ijritcc2321-8169.150166 fatcat:lortrasfizbcpgqpdoqhtbi2vi

Second workshop on information heterogeneity and fusion in recommender systems (HetRec2011)

Ivan Cantador, Peter Brusilovsky, Tsvi Kuflik
2011 Proceedings of the fifth ACM conference on Recommender systems - RecSys '11  
Almost all current recommender systems are designed for specific domains and applications, and thus usually attempt to make best use of a local user model, using a single kind of personal data, and without  ...  feature spaces; d) and ranked recommendation lists could be diverse according to particular user preferences and resource attributes, oriented to groups of users, and driven by multiple user evaluation  ...  Almost all current recommender systems are designed for specific domains and applications, and thus usually attempt to make best use of a local user model, using a single kind of personal data, and without  ... 
doi:10.1145/2043932.2044016 dblp:conf/recsys/CantadorBK11 fatcat:b5qc7nhikncvlbn7iovbspnn4y

EXPERIMENTAL STUDY ON CLOUD SECURITY FOR PERSONAL HEALTH RECORDS OVER PATIENT CENTRIC DATA

BIRRU DEVENDER, SYED ABDUL SATTAR
2019 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY  
Using this service user can outsource his data and whenever required he can download or he can share with others.  ...  The key idea sniff out slice management into legion freedom domains consider bypass from high key care intricacy respectively proprietor and user (specifically, community domains and personal domains (  ...  Within health domain can access the health records, unauthorized users can't access the owner's personal health records.  ... 
doi:10.34218/ijcet.10.1.2019.009 fatcat:7lou2qxkhvduzip7dzdlpqklsa

Ensuring Privacy and Security in Data Sharing under Cloud Environment

Shilpa Elsa Abraham, R. Gokulavanan
2013 International Journal of Computer Applications Technology and Research  
Data update and key management operations are tuned for multi user access environment.  ...  Multiple owners are allowed to access the same data values.  ...  Fig 1 . 1 Sharing of PHR First, the system is divided into multiple security domains like personal domain (PSD) and public domain(PUD). Each domain controls only a subset of its users.  ... 
doi:10.7753/ijcatr0202.1021 fatcat:7mtww73s7fdu5mc2cujspfjf4q
« Previous Showing results 1 — 15 out of 365,936 results