• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 9,016
Next 10 →

Classifying latent user attributes in Twitter

by Delip Rao, David Yarowsky, Abhishek Shreevats, Manaswi Gupta - In Proc. of SMUC , 2010
"... Social media outlets such as Twitter have become an important forum for peer interaction. Thus the ability to classify latent user attributes, including gender, age, regional origin, and political orientation solely from Twitter user language or similar highly informal content has important applicat ..."
Abstract - Cited by 83 (4 self) - Add to MetaCart
Social media outlets such as Twitter have become an important forum for peer interaction. Thus the ability to classify latent user attributes, including gender, age, regional origin, and political orientation solely from Twitter user language or similar highly informal content has important

Users ’ Attributes Users ’ Pictures

by unknown authors
"... Building a Facebook application to investigate how people tag pictures Victor Hartanto Wibisono (U4644427) ..."
Abstract - Add to MetaCart
Building a Facebook application to investigate how people tag pictures Victor Hartanto Wibisono (U4644427)

Attribute-based encryption for fine-grained access control of encrypted data

by Vipul Goyal, Amit Sahai, Omkant Pandey, Brent Waters - In Proc. of ACMCCS’06 , 2006
"... As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key). We develop ..."
Abstract - Cited by 522 (23 self) - Add to MetaCart
develop a new cryptosystem for fine-grained sharing of encrypted data that we call Key-Policy Attribute-Based Encryption (KP-ABE). In our cryptosystem, ciphertexts are labeled with sets of attributes and private keys are associated with access structures that control which ciphertexts a user is able

Discovering User Attribute Stylistic Differences via Paraphrasing

by Wei Xu, Lyle Ungar
"... User attribute prediction from social media text has proven successful and useful for downstream tasks. In previous studies, differences in user trait language use have been limited primarily to the presence or absence of words that indicate topical preferences. In this study, we aim to find linguis ..."
Abstract - Add to MetaCart
User attribute prediction from social media text has proven successful and useful for downstream tasks. In previous studies, differences in user trait language use have been limited primarily to the presence or absence of words that indicate topical preferences. In this study, we aim to find

MATRIX FACTORIZATION TECHNIQUES FOR RECOMMENDER SYSTEMS

by Yehuda Koren, Robert Bell, Chris Volinsky - IEEE COMPUTER , 2009
"... As the Netflix Prize competition has demonstrated, matrix factorization models are superior to classic nearest-neighbor techniques for producing product recommendations, allowing the incorporation of additional information such as implicit feedback, temporal effects, and confidence levels. Modern co ..."
Abstract - Cited by 593 (4 self) - Add to MetaCart
, recommender systems are based on one of two strategies. The content filtering approach creates a profile for each user or product to characterize its nature. For example, a movie profile could include attributes regarding its genre, the participating actors, its box office popularity, and so forth. User

Data cube: A relational aggregation operator generalizing group-by, cross-tab, and sub-totals

by Jim Gray, Adam Bosworth, Andrew Layman, Don Reichart, Hamid Pirahesh , 1996
"... Abstract. Data analysis applications typically aggregate data across many dimensions looking for anomalies or unusual patterns. The SQL aggregate functions and the GROUP BY operator produce zero-dimensional or one-dimensional aggregates. Applications need the N-dimensional generalization of these op ..."
Abstract - Cited by 860 (11 self) - Add to MetaCart
in more complex non-procedural data analysis programs. The cube operator treats each of the N aggregation attributes as a dimension of N-space. The aggregate of a particular set of attribute values is a point in this space. The set of points forms an N-dimensional cube. Super-aggregates are computed

Effects of message style on users’ attributions toward agents

by Susan E. Brennan, Justina O. Ohaeri - In CHI -94: Conference companion on Human factors in computing systems , 1994
"... We used a Wizard-of-Oz paradigm to study effects of message style on dialog and on people's mental models of computer agents. People made airline reservations using a simulated reservation agent from which they received one of three message styles: Telegraphic, Fluent, or Anthropomorphic. The a ..."
Abstract - Cited by 31 (3 self) - Add to MetaCart
We used a Wizard-of-Oz paradigm to study effects of message style on dialog and on people's mental models of computer agents. People made airline reservations using a simulated reservation agent from which they received one of three message styles: Telegraphic, Fluent, or Anthropomorphic. The agent accepted any kind of language or command input people typed. When people took the initiative, they tended to model their inputs on the computer's messages. They expended more effort in the Anthropomorphic than in the Fluent or Telegraphic conditions. We found no evidence that natural language messages caused higher expectations of intelligence than telegraphic messages.

QoS-aware middleware for web services composition

by Liangzhao Zeng, Boualem Benatallah, Anne H. H. Ngu, Marlon Dumas, Jayant Kalagnanam, Henry Chang - IEEE TRANS. SOFTWARE ENG , 2004
"... The paradigmatic shift from a Web of manual interactions to a Web of programmatic interactions driven by Web services is creating unprecedented opportunities for the formation of online Business-to-Business (B2B) collaborations. In particular, the creation of value-added services by composition of ..."
Abstract - Cited by 486 (6 self) - Add to MetaCart
middleware platform which addresses the issue of selecting Web services for the purpose of their composition in a way that maximizes user satisfaction expressed as utility functions over QoS attributes, while satisfying the constraints set by the user and by the structure of the composite service. Two

Reexamining the Cluster Hypothesis: Scatter/Gather on Retrieval Results

by Marti A. Hearst, Jan O. Pedersen , 1996
"... We present Scatter/Gather, a cluster-based document browsing method, as an alternative to ranked titles for the organization and viewing of retrieval results. We systematically evaluate Scatter/Gather in this context and find significant improvements over similarity search ranking alone. This resul ..."
Abstract - Cited by 480 (5 self) - Add to MetaCart
. This result provides evidence validating the cluster hypothesis which states that relevant documents tend to be more similar to each other than to non-relevant documents. We describe a system employing Scatter/Gather and demonstrate that users are able to use this system close to its full potential. 1

Employing User Attribute and Item Attribute to Enhance the Collaborative Filtering Recommendation

by Songjie Gong
"... Abstract—Recommender systems are web based systems that aim at predicting a customer's interest on available products and services by relying on previously rated products and dealing with the problem of information and product overload. Collaborative filtering is the most popular recommendation ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
on the ratings of the most similar users, commonly referred to as neighbors, the algorithms compute recommendations for the target user. They only consider the ratings information. User attribute information associated with a user's personality and item attribute information associated with an item
Next 10 →
Results 1 - 10 of 9,016
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University