SlideShare a Scribd company logo
Capstone Report Presentation User-Generated Metadata in Social Software:  An Analysis of Findability in Content Tagging and Recommender Systems Presented by Michael Barnes In partial fulfillment of the requirement for the degree of Master of Science. March, 2007
ABSTRACT ,[object Object],[object Object]
Introduction ,[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object]
Introduction (Continued) ,[object Object],[object Object]
Introduction (Continued) ,[object Object]
TIME-liness of Topic Since then, the rise of social software designed to leverage user-generated metadata has boomed. The 2006 Time Magazine’s “Person of the Year” was - the user! The rapid increase of user participation and user generated content in social software systems continues to gain popularity under the moniker of “Web 2.0.”
TIME-liness of Topic “ It's a story about community and collaboration on a scale never seen before. It's about the many wresting power from the few and helping one another for nothing and how that will not only change the world, but also change the way the world changes. It's a tool for bringing together the small contributions of millions of people and making them matter. And for seizing the reins of the global media, for founding and framing the new digital democracy, for working for nothing and beating the pros at their own game, TIME's Person of the Year for 2006 is you.”
Key Definitions ,[object Object],[object Object],[object Object],[object Object]
Key Definitions (Continued) ,[object Object],[object Object],[object Object],[object Object]
Key Definitions (Continued) ,[object Object],[object Object]
Key Definitions (Continued) ,[object Object],[object Object]
Key Definitions (Continued) ,[object Object],[object Object],[object Object]
Key Definitions (Continued) ,[object Object],[object Object]
Key Definitions (Continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Definitions (Continued) ,[object Object],[object Object]
Summary of Key Results ,[object Object],[object Object],[object Object],[object Object],[object Object]
Results (Continued) ,[object Object],[object Object]
Presentation of Outcome  ,[object Object],[object Object],[object Object]
Findability Strengths - Information Classification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Findability Weaknesses -  Information Classification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Findability Strengths -  Information Retrieval ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Findability Weaknesses -  Information Retrieval ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Findability Strengths -  Information Discovery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Findability Weaknesses -  Information Discovery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object]
Thank You…and Examples ,[object Object],[object Object],[object Object]
Recommender System Examples ,[object Object]
Recommender System Example ,[object Object]
Recommender System Example ,[object Object]
Recommender System Example
Tagging and Recommender System Examples ,[object Object]
Recommender System Example ,[object Object]
Recommender System Example ,[object Object]
Recommender System Example ,[object Object]
Recommender System Example ,[object Object]
Recommender System Example ,[object Object]
Recommender System Example ,[object Object]
Content Tagging Example ,[object Object]
Content Tagging Example ,[object Object]
Content Tagging Example ,[object Object]
Content Tagging Example ,[object Object]
Content Tagging Example ,[object Object]
Content Tagging Example ,[object Object]
Content Tagging Example ,[object Object]
Content Tagging Example ,[object Object]
Recommender System Example ,[object Object]
Recommender System Example ,[object Object]
Recommender and Content Tagging  ,[object Object]

More Related Content

What's hot

FaceTag at IASummit 2007
FaceTag at IASummit 2007FaceTag at IASummit 2007
FaceTag at IASummit 2007
Emanuele Quintarelli
 
Recsys virtual-profiles
Recsys virtual-profilesRecsys virtual-profiles
Recsys virtual-profiles
Haishan Liu
 
WORD
WORDWORD
WORD
butest
 
Fuzzy AndANN Based Mining Approach Testing For Social Network Analysis
Fuzzy AndANN Based Mining Approach Testing For Social Network AnalysisFuzzy AndANN Based Mining Approach Testing For Social Network Analysis
Fuzzy AndANN Based Mining Approach Testing For Social Network Analysis
IJERA Editor
 
Production knowledge imass-olhao_24-4-2014_en
Production knowledge imass-olhao_24-4-2014_enProduction knowledge imass-olhao_24-4-2014_en
Production knowledge imass-olhao_24-4-2014_en
BO TRUE ACTIVITIES SL
 
Privacy and Cryptographic Security Issues within Mobile Recommender Syste...
Privacy and Cryptographic Security Issues within Mobile     Recommender Syste...Privacy and Cryptographic Security Issues within Mobile     Recommender Syste...
Privacy and Cryptographic Security Issues within Mobile Recommender Syste...
Jacob Mack
 
Data mining in social network
Data mining in social networkData mining in social network
Data mining in social network
akash_mishra
 
Data mining on Social Media
Data mining on Social MediaData mining on Social Media
Data mining on Social Media
home
 
Summary of Paper : Taxonomy of websearch by Broder
Summary of Paper : Taxonomy of websearch by BroderSummary of Paper : Taxonomy of websearch by Broder
Summary of Paper : Taxonomy of websearch by Broder
Bhavesh Singh
 
Multiparty access control for online social networks model and mechanisms
Multiparty access control for online social networks model and mechanismsMultiparty access control for online social networks model and mechanisms
Multiparty access control for online social networks model and mechanisms
JPINFOTECH JAYAPRAKASH
 
A Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media DataA Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media Data
IOSR Journals
 
nm
nmnm
Social Media Data Mining
Social Media Data MiningSocial Media Data Mining
Social Media Data Mining
Ryan Reede
 
A topology based approach twittersdlfkjsdlkfj
A topology based approach twittersdlfkjsdlkfjA topology based approach twittersdlfkjsdlkfj
A topology based approach twittersdlfkjsdlkfj
Kunal Mittal
 
Digital Trails Dave King 1 5 10 Part 2 D3
Digital Trails   Dave King   1 5 10   Part 2   D3Digital Trails   Dave King   1 5 10   Part 2   D3
Digital Trails Dave King 1 5 10 Part 2 D3
Dave King
 
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
csandit
 
Harvesting Intelligence from User Interactions
Harvesting Intelligence from User Interactions Harvesting Intelligence from User Interactions
Harvesting Intelligence from User Interactions
R A Akerkar
 
Social Data Mining
Social Data MiningSocial Data Mining
Social Data Mining
Mahesh Meniya
 

What's hot (18)

FaceTag at IASummit 2007
FaceTag at IASummit 2007FaceTag at IASummit 2007
FaceTag at IASummit 2007
 
Recsys virtual-profiles
Recsys virtual-profilesRecsys virtual-profiles
Recsys virtual-profiles
 
WORD
WORDWORD
WORD
 
Fuzzy AndANN Based Mining Approach Testing For Social Network Analysis
Fuzzy AndANN Based Mining Approach Testing For Social Network AnalysisFuzzy AndANN Based Mining Approach Testing For Social Network Analysis
Fuzzy AndANN Based Mining Approach Testing For Social Network Analysis
 
Production knowledge imass-olhao_24-4-2014_en
Production knowledge imass-olhao_24-4-2014_enProduction knowledge imass-olhao_24-4-2014_en
Production knowledge imass-olhao_24-4-2014_en
 
Privacy and Cryptographic Security Issues within Mobile Recommender Syste...
Privacy and Cryptographic Security Issues within Mobile     Recommender Syste...Privacy and Cryptographic Security Issues within Mobile     Recommender Syste...
Privacy and Cryptographic Security Issues within Mobile Recommender Syste...
 
Data mining in social network
Data mining in social networkData mining in social network
Data mining in social network
 
Data mining on Social Media
Data mining on Social MediaData mining on Social Media
Data mining on Social Media
 
Summary of Paper : Taxonomy of websearch by Broder
Summary of Paper : Taxonomy of websearch by BroderSummary of Paper : Taxonomy of websearch by Broder
Summary of Paper : Taxonomy of websearch by Broder
 
Multiparty access control for online social networks model and mechanisms
Multiparty access control for online social networks model and mechanismsMultiparty access control for online social networks model and mechanisms
Multiparty access control for online social networks model and mechanisms
 
A Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media DataA Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media Data
 
nm
nmnm
nm
 
Social Media Data Mining
Social Media Data MiningSocial Media Data Mining
Social Media Data Mining
 
A topology based approach twittersdlfkjsdlkfj
A topology based approach twittersdlfkjsdlkfjA topology based approach twittersdlfkjsdlkfj
A topology based approach twittersdlfkjsdlkfj
 
Digital Trails Dave King 1 5 10 Part 2 D3
Digital Trails   Dave King   1 5 10   Part 2   D3Digital Trails   Dave King   1 5 10   Part 2   D3
Digital Trails Dave King 1 5 10 Part 2 D3
 
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
 
Harvesting Intelligence from User Interactions
Harvesting Intelligence from User Interactions Harvesting Intelligence from User Interactions
Harvesting Intelligence from User Interactions
 
Social Data Mining
Social Data MiningSocial Data Mining
Social Data Mining
 

Viewers also liked

توصیه هایی برای بارگذاری سریع تر سایت
توصیه هایی برای بارگذاری سریع تر سایتتوصیه هایی برای بارگذاری سریع تر سایت
توصیه هایی برای بارگذاری سریع تر سایت
kasra khoshkhooy
 
Switch security workshop 2014
Switch security workshop 2014Switch security workshop 2014
Switch security workshop 2014
Alireza Taj
 
Expert systemes
Expert systemesExpert systemes
Expert systemes
Farshid Shahraki
 
Social Network Applications In Marketing
Social Network Applications In MarketingSocial Network Applications In Marketing
Social Network Applications In Marketing
zohreh izadpanah
 
A decision support system for accomodation choosing in a seaside city
A  decision support system for accomodation choosing in a seaside cityA  decision support system for accomodation choosing in a seaside city
A decision support system for accomodation choosing in a seaside city
zohreh izadpanah
 
recommender.ir at a glance
recommender.ir at a glancerecommender.ir at a glance
recommender.ir at a glance
recommender.ir
 
Text Mining Infrastructure in R
Text Mining Infrastructure in RText Mining Infrastructure in R
Text Mining Infrastructure in R
Ashraf Uddin
 
مدل های کسب و کار
مدل های کسب و کارمدل های کسب و کار
مدل های کسب و کارNasser Ghanemzadeh
 
Recommender system introduction
Recommender system   introductionRecommender system   introduction
Recommender system introduction
Liang Xiang
 

Viewers also liked (9)

توصیه هایی برای بارگذاری سریع تر سایت
توصیه هایی برای بارگذاری سریع تر سایتتوصیه هایی برای بارگذاری سریع تر سایت
توصیه هایی برای بارگذاری سریع تر سایت
 
Switch security workshop 2014
Switch security workshop 2014Switch security workshop 2014
Switch security workshop 2014
 
Expert systemes
Expert systemesExpert systemes
Expert systemes
 
Social Network Applications In Marketing
Social Network Applications In MarketingSocial Network Applications In Marketing
Social Network Applications In Marketing
 
A decision support system for accomodation choosing in a seaside city
A  decision support system for accomodation choosing in a seaside cityA  decision support system for accomodation choosing in a seaside city
A decision support system for accomodation choosing in a seaside city
 
recommender.ir at a glance
recommender.ir at a glancerecommender.ir at a glance
recommender.ir at a glance
 
Text Mining Infrastructure in R
Text Mining Infrastructure in RText Mining Infrastructure in R
Text Mining Infrastructure in R
 
مدل های کسب و کار
مدل های کسب و کارمدل های کسب و کار
مدل های کسب و کار
 
Recommender system introduction
Recommender system   introductionRecommender system   introduction
Recommender system introduction
 

Similar to Content tagging and recommender systems

A Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdfA Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
Amber Ford
 
Introduction abstract
Introduction abstractIntroduction abstract
Introduction abstract
Sanghvi Innovative Academy
 
O017148084
O017148084O017148084
O017148084
IOSR Journals
 
Sweeny group think-ias2015
Sweeny group think-ias2015Sweeny group think-ias2015
Sweeny group think-ias2015
Marianne Sweeny
 
The application of data mining to recommender systems
The application of data mining to recommender systems The application of data mining to recommender systems
The application of data mining to recommender systems
sunsine123
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
vivatechijri
 
Fuzzy Logic Based Recommender System
Fuzzy Logic Based Recommender SystemFuzzy Logic Based Recommender System
Fuzzy Logic Based Recommender System
RSIS International
 
243
243243
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
cscpconf
 
Information Systems - Anti-Dote Series
Information Systems - Anti-Dote SeriesInformation Systems - Anti-Dote Series
Information Systems - Anti-Dote Series
Enimil Kweku Boateng
 
Angels_in_our_Midst
Angels_in_our_MidstAngels_in_our_Midst
Angels_in_our_Midst
Mike Alvarado
 
Contextual model of recommending resources on an academic networking portal
Contextual model of recommending resources on an academic networking portalContextual model of recommending resources on an academic networking portal
Contextual model of recommending resources on an academic networking portal
csandit
 
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTALCONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
cscpconf
 
RUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docx
RUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docxRUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docx
RUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docx
anhlodge
 
An improved technique for ranking semantic associationst07
An improved technique for ranking semantic associationst07An improved technique for ranking semantic associationst07
An improved technique for ranking semantic associationst07
IJwest
 
An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...
An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...
An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...
IJTET Journal
 
FHCC: A SOFT HIERARCHICAL CLUSTERING APPROACH FOR COLLABORATIVE FILTERING REC...
FHCC: A SOFT HIERARCHICAL CLUSTERING APPROACH FOR COLLABORATIVE FILTERING REC...FHCC: A SOFT HIERARCHICAL CLUSTERING APPROACH FOR COLLABORATIVE FILTERING REC...
FHCC: A SOFT HIERARCHICAL CLUSTERING APPROACH FOR COLLABORATIVE FILTERING REC...
IJDKP
 
Sullivan Masters Paper
Sullivan Masters PaperSullivan Masters Paper
Sullivan Masters Paper
Tessa Sullivan
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
Journal For Research
 
Framework for Product Recommandation for Review Dataset
Framework for Product Recommandation for Review DatasetFramework for Product Recommandation for Review Dataset
Framework for Product Recommandation for Review Dataset
rahulmonikasharma
 

Similar to Content tagging and recommender systems (20)

A Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdfA Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
 
Introduction abstract
Introduction abstractIntroduction abstract
Introduction abstract
 
O017148084
O017148084O017148084
O017148084
 
Sweeny group think-ias2015
Sweeny group think-ias2015Sweeny group think-ias2015
Sweeny group think-ias2015
 
The application of data mining to recommender systems
The application of data mining to recommender systems The application of data mining to recommender systems
The application of data mining to recommender systems
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
 
Fuzzy Logic Based Recommender System
Fuzzy Logic Based Recommender SystemFuzzy Logic Based Recommender System
Fuzzy Logic Based Recommender System
 
243
243243
243
 
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
 
Information Systems - Anti-Dote Series
Information Systems - Anti-Dote SeriesInformation Systems - Anti-Dote Series
Information Systems - Anti-Dote Series
 
Angels_in_our_Midst
Angels_in_our_MidstAngels_in_our_Midst
Angels_in_our_Midst
 
Contextual model of recommending resources on an academic networking portal
Contextual model of recommending resources on an academic networking portalContextual model of recommending resources on an academic networking portal
Contextual model of recommending resources on an academic networking portal
 
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTALCONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
 
RUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docx
RUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docxRUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docx
RUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docx
 
An improved technique for ranking semantic associationst07
An improved technique for ranking semantic associationst07An improved technique for ranking semantic associationst07
An improved technique for ranking semantic associationst07
 
An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...
An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...
An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...
 
FHCC: A SOFT HIERARCHICAL CLUSTERING APPROACH FOR COLLABORATIVE FILTERING REC...
FHCC: A SOFT HIERARCHICAL CLUSTERING APPROACH FOR COLLABORATIVE FILTERING REC...FHCC: A SOFT HIERARCHICAL CLUSTERING APPROACH FOR COLLABORATIVE FILTERING REC...
FHCC: A SOFT HIERARCHICAL CLUSTERING APPROACH FOR COLLABORATIVE FILTERING REC...
 
Sullivan Masters Paper
Sullivan Masters PaperSullivan Masters Paper
Sullivan Masters Paper
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
 
Framework for Product Recommandation for Review Dataset
Framework for Product Recommandation for Review DatasetFramework for Product Recommandation for Review Dataset
Framework for Product Recommandation for Review Dataset
 

Recently uploaded

Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 

Recently uploaded (20)

Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 

Content tagging and recommender systems

  • 1. Capstone Report Presentation User-Generated Metadata in Social Software: An Analysis of Findability in Content Tagging and Recommender Systems Presented by Michael Barnes In partial fulfillment of the requirement for the degree of Master of Science. March, 2007
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. TIME-liness of Topic Since then, the rise of social software designed to leverage user-generated metadata has boomed. The 2006 Time Magazine’s “Person of the Year” was - the user! The rapid increase of user participation and user generated content in social software systems continues to gain popularity under the moniker of “Web 2.0.”
  • 8. TIME-liness of Topic “ It's a story about community and collaboration on a scale never seen before. It's about the many wresting power from the few and helping one another for nothing and how that will not only change the world, but also change the way the world changes. It's a tool for bringing together the small contributions of millions of people and making them matter. And for seizing the reins of the global media, for founding and framing the new digital democracy, for working for nothing and beating the pros at their own game, TIME's Person of the Year for 2006 is you.”
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.