In this paper we present STS (South Tyrol Suggests), a context-aware mobile recommender system for places of interest (POIs) that integrates some innovative components, including: a personality questionnaire, i.e., a brief and entertaining questionnaire used by the system to learn users’ personality; an active learning module that acquires ratings-in-context for POIs that users are likely to have experienced; and a matrix factorization based recommendation module that leverages the personality information and several contextual factors in order to generate more relevant recommendations.
Adopting a system oriented perspective, we describe the assessment of the combination of the implemented components. We focus on usability aspects and report the end-user assessment of STS. It was obtained from a controlled live user study as well as from the log data produced by a larger sample of users that have freely downloaded and tried STS through Google Play Store. The result of the assessment showed that the overall usability of the system falls between “good” and “excellent”, it helped us to identify potential problems and it provided valuable indications for future system improvement.
Parsimonious and Adaptive Contextual Information Acquisition in Recommender S...Matthias Braunhofer
Context-Aware Recommender System (CARS) models are trained on datasets of context-dependent user preferences (ratings and context information). Since the number of context-dependent preferences increases exponentially with the number of contextual factors, and certain contextual in- formation is still hard to acquire automatically (e.g., the user’s mood or for whom the user is buying the searched item) it is fundamental to identify and acquire those factors that truly influence the user preferences and the ratings. In particular, this ensures that (i) the user effort in specifying contextual information is kept to a minimum, and (ii) the system’s performance is not negatively impacted by irrelevant contextual information. In this paper, we propose a novel method which, unlike existing ones, directly estimates the impact of context on rating predictions and adaptively identifies the contextual factors that are deemed to be useful to be elicited from the users. Our experimental evaluation shows that it compares favourably to various state-of-the-art context selection methods.
Cold-Start Management with Cross-Domain Collaborative Filtering and TagsMatthias Braunhofer
Recommender systems suffer from the new user problem, i.e., the difficulty to make accurate predictions for users that have rated only few items. Moreover, they usually compute recommendations for items just in one domain, such as movies, music, or books. In this paper we deal with such a cold-start situation exploiting cross-domain recommendation techniques, i.e., we suggest items to a user in one target domain by using ratings of other users in a, completely disjoint, auxiliary domain. We present three rating prediction models that make use of information about how users tag items in an auxiliary domain, and how these tags correlate with the ratings to improve the rating prediction task in a different target domain. We show that the proposed techniques can effectively deal with the considered cold-start situation, given that the tags used in the two domains overlap.
In this presentation we present a novel context-aware mobile recommender system for places of interest (POIs). Unlike existing systems, which learn users' preferences solely from their past ratings, it considers also their personality - using the Five Factor Model. Personality is acquired by asking users to complete a brief and entertaining questionnaire as part of the registration process, and is then exploited in: (1) an active learning module that actively acquires ratings-in-context for POIs that users are likely to have experienced, hence reducing the stress and annoyance to rate (or skip rating) items that the users don’t know; and (2) in the recommendation model that builds up on matrix factorization and therefore can be trained even if the users haven’t rated any items yet.
Context-Aware Points of Interest Suggestion with Dynamic Weather Data ManagementMatthias Braunhofer
Weather plays an important role in tourists’ decision-making and, for instance, some places or activities must not be even suggested under dangerous weather conditions. In this paper we present a context-aware recommender system, named STS, that computes recommendations suited for the weather conditions at the recommended places of interest (POI) by exploiting a novel model-based context-aware recommendation technique. In a live user study we have compared the performance of the system with a variant that does not exploit weather data when generating recommendations. The results of our experiment have shown that the proposed approach obtains a higher perceived recommendation quality and choice satisfaction.
In this presentation we illustrate a novel context-aware mobile recommender system for places of interest (POIs). Unlike existing systems, which learn users’ preferences solely from their past ratings, it considers also their personality - using the Five Factor Model. Personality is acquired by asking users to complete a brief and entertaining questionnaire as part of the registration process, and is then exploited in: (1) an active learning module that actively acquires ratings-in-context for POIs that users are likely to have experienced, hence reducing the stress and annoyance to rate (or skip rating) items that the users don’t know; and (2) in the recommendation model that builds up on matrix factorization and therefore can be trained even if the users haven’t rated any items yet.
Contextual Information Elicitation in Travel Recommender SystemsMatthias Braunhofer
Context-Aware Recommender Systems are advisory applications that exploit users’ preference knowledge contained in datasets of context-dependent user ratings, i.e., ratings augmented with the description of the contextual situation detected when the user experienced the item and rated it. Since the space of context-dependent ratings increases exponentially in size with the number of contextual factors, and because certain contextual information is still hard to acquire automatically (e.g., the user’s mood or the travellers’ group composition), it is fundamental to identify and acquire only those factors that truly influence the user preferences and consequently the ratings and the recommendations. In this paper, we propose a novel method that estimates the impact of a contextual factor on rating predictions and adaptively elicits from the users only the relevant ones. Our experimental evaluation, on two travel-related datasets, shows that our method compares favorably to other state-of-the-art context selection methods.
Hybridisation Techniques for Cold-Starting Context-Aware Recommender SystemsMatthias Braunhofer
Context-Aware Recommender Systems (CARSs) suffer from the cold-start problem, i.e., the inability to provide accurate recommendations for new users, items or contextual situations. In this research, we aim at solving this problem by exploiting various hybridisation techniques, from simple heuristic-based solutions to complex adaptive solutions, in order to take advantage of the strengths of different CARS algorithms while avoiding their weaknesses in a given (cold-start) situation. Our initial research based on offline experiments using various contextually-tagged rating datasets has shown that basic CARS algorithms perform very differently in different recommendation scenarios, and that they can be effectively hybridised to achieve an overall optimal performance. Further research is now required to find the optimal method for hybridisation.
Parsimonious and Adaptive Contextual Information Acquisition in Recommender S...Matthias Braunhofer
Context-Aware Recommender System (CARS) models are trained on datasets of context-dependent user preferences (ratings and context information). Since the number of context-dependent preferences increases exponentially with the number of contextual factors, and certain contextual in- formation is still hard to acquire automatically (e.g., the user’s mood or for whom the user is buying the searched item) it is fundamental to identify and acquire those factors that truly influence the user preferences and the ratings. In particular, this ensures that (i) the user effort in specifying contextual information is kept to a minimum, and (ii) the system’s performance is not negatively impacted by irrelevant contextual information. In this paper, we propose a novel method which, unlike existing ones, directly estimates the impact of context on rating predictions and adaptively identifies the contextual factors that are deemed to be useful to be elicited from the users. Our experimental evaluation shows that it compares favourably to various state-of-the-art context selection methods.
Cold-Start Management with Cross-Domain Collaborative Filtering and TagsMatthias Braunhofer
Recommender systems suffer from the new user problem, i.e., the difficulty to make accurate predictions for users that have rated only few items. Moreover, they usually compute recommendations for items just in one domain, such as movies, music, or books. In this paper we deal with such a cold-start situation exploiting cross-domain recommendation techniques, i.e., we suggest items to a user in one target domain by using ratings of other users in a, completely disjoint, auxiliary domain. We present three rating prediction models that make use of information about how users tag items in an auxiliary domain, and how these tags correlate with the ratings to improve the rating prediction task in a different target domain. We show that the proposed techniques can effectively deal with the considered cold-start situation, given that the tags used in the two domains overlap.
In this presentation we present a novel context-aware mobile recommender system for places of interest (POIs). Unlike existing systems, which learn users' preferences solely from their past ratings, it considers also their personality - using the Five Factor Model. Personality is acquired by asking users to complete a brief and entertaining questionnaire as part of the registration process, and is then exploited in: (1) an active learning module that actively acquires ratings-in-context for POIs that users are likely to have experienced, hence reducing the stress and annoyance to rate (or skip rating) items that the users don’t know; and (2) in the recommendation model that builds up on matrix factorization and therefore can be trained even if the users haven’t rated any items yet.
Context-Aware Points of Interest Suggestion with Dynamic Weather Data ManagementMatthias Braunhofer
Weather plays an important role in tourists’ decision-making and, for instance, some places or activities must not be even suggested under dangerous weather conditions. In this paper we present a context-aware recommender system, named STS, that computes recommendations suited for the weather conditions at the recommended places of interest (POI) by exploiting a novel model-based context-aware recommendation technique. In a live user study we have compared the performance of the system with a variant that does not exploit weather data when generating recommendations. The results of our experiment have shown that the proposed approach obtains a higher perceived recommendation quality and choice satisfaction.
In this presentation we illustrate a novel context-aware mobile recommender system for places of interest (POIs). Unlike existing systems, which learn users’ preferences solely from their past ratings, it considers also their personality - using the Five Factor Model. Personality is acquired by asking users to complete a brief and entertaining questionnaire as part of the registration process, and is then exploited in: (1) an active learning module that actively acquires ratings-in-context for POIs that users are likely to have experienced, hence reducing the stress and annoyance to rate (or skip rating) items that the users don’t know; and (2) in the recommendation model that builds up on matrix factorization and therefore can be trained even if the users haven’t rated any items yet.
Contextual Information Elicitation in Travel Recommender SystemsMatthias Braunhofer
Context-Aware Recommender Systems are advisory applications that exploit users’ preference knowledge contained in datasets of context-dependent user ratings, i.e., ratings augmented with the description of the contextual situation detected when the user experienced the item and rated it. Since the space of context-dependent ratings increases exponentially in size with the number of contextual factors, and because certain contextual information is still hard to acquire automatically (e.g., the user’s mood or the travellers’ group composition), it is fundamental to identify and acquire only those factors that truly influence the user preferences and consequently the ratings and the recommendations. In this paper, we propose a novel method that estimates the impact of a contextual factor on rating predictions and adaptively elicits from the users only the relevant ones. Our experimental evaluation, on two travel-related datasets, shows that our method compares favorably to other state-of-the-art context selection methods.
Hybridisation Techniques for Cold-Starting Context-Aware Recommender SystemsMatthias Braunhofer
Context-Aware Recommender Systems (CARSs) suffer from the cold-start problem, i.e., the inability to provide accurate recommendations for new users, items or contextual situations. In this research, we aim at solving this problem by exploiting various hybridisation techniques, from simple heuristic-based solutions to complex adaptive solutions, in order to take advantage of the strengths of different CARS algorithms while avoiding their weaknesses in a given (cold-start) situation. Our initial research based on offline experiments using various contextually-tagged rating datasets has shown that basic CARS algorithms perform very differently in different recommendation scenarios, and that they can be effectively hybridised to achieve an overall optimal performance. Further research is now required to find the optimal method for hybridisation.
Techniques for Context-Aware and Cold-Start RecommendationsMatthias Braunhofer
Context-aware recommender systems better identify interesting items for users by adapting their suggestions to the specific contextual situations, e.g., to the current weather, if an excursion is to be recommended . But, the cold-start problem may jeopardise the quality of the recommendations: for users, items or contextual situations that are new to the system, recommendations are hard to compute. We have developed a number of novel techniques to tame this problem, and in particular, new hybrid algorithms that combine several, simpler, algorithms in order to exploit their strengths and avoid their weaknesses. We have also developed algorithms for actively identifying the most useful preference information to ask the user in order to bootstrap the system. Our results obtained from a series of offline and online experiments reveal that the proposed techniques can effectively alleviate the cold-start problem of context-aware recommender systems.
Anomaly detection: Core Techniques and Advances in Big Data and Deep LearningQuantUniversity
Anomaly detection (or Outlier analysis) is the identification of items, events or observations which do not conform to an expected pattern or other items in a dataset. It is used is applications such as intrusion detection, fraud detection, fault detection and monitoring processes in various domains including energy, healthcare and finance.
Alleviating cold-user start problem with users' social network data in recomm...Eduardo Castillejo Gil
This work explores the possibility of using relevant data from users’
social network to alleviate the cold-user problems in a recommender
system domain. The proposed solution extracts the most valuable
node in the graph generated by check in a venue with an Android
application using the Foursquare API. By obtaining the recommendations to this node we estimate the probability of some categories
to be similar to users tastes...
Continuous Evaluation of Collaborative Recommender Systems in Data Stream Man...Dr. Cornelius Ludmann
Talk at the Data Streams and Event Processing Workshop at the 16. Fachtagung »Datenbanksysteme für Business, Technologie und Web« (BTW) of the Gesellschaft für Informatik (GI) in Hamburg, Germany. March 3, 2015
With R, Python, Apache Spark and a plethora of other open source tools, anyone with a computer can run machine learning algorithms in a jiffy! However, without an understanding of which algorithms to choose and when to apply a particular technique, most machine learning efforts turn into trial and error experiments with conclusions like "The algorithms don't work" or "Perhaps we should get more data".
In this lecture, we will focus on the key tenets of machine learning algorithms and how to choose an algorithm for a particular purpose. Rather than just showing how to run experiments in R ,Python or Apache Spark, we will provide an intuitive introduction to machine learning with just enough mathematics and basic statistics.
We will address:
• How do you differentiate Clustering, Classification and Prediction algorithms?
• What are the key steps in running a machine learning algorithm?
• How do you choose an algorithm for a specific goal?
• Where does exploratory data analysis and feature engineering fit into the picture?
• Once you run an algorithm, how do you evaluate the performance of an algorithm?
Avito recsys-challenge-2016RecSys Challenge 2016: Job Recommendation Based on...Vasily Leksin
This slides describes our solution for the RecSys Challenge 2016. In the challenge, several datasets were provided from a social network for business XING. The goal of the competition was to use these data to predict job postings that a user will interact positively with (click, bookmark or reply). Our solution to this problem includes three different types of models: Factorization Machine, item-based collaborative filtering, and content-based topic model on tags. Thus, we combined collaborative and content-based approaches in our solution.
Our best submission, which was a blend of ten models, achieved 7th place in the challenge's final leaderboard with a score of 1677898.52. The approaches presented in this paper are general and scalable. Therefore they can be applied to another problem of this type.
The Green Lab - [01 C] Empirical software engineeringIvano Malavolta
This presentation is about a lecture I gave within the "Green Lab" course of the Computer Science master, Software Engineering and Green IT track of the Vrije Universiteit Amsterdam: http://masters.vu.nl/en/programmes/computer-science-software-engineering-green-it/index.aspx
http://www.ivanomalavolta.com
This presentation is about a lecture I gave within the "Green Lab" course of the Computer Science master program, of the Vrije Universiteit Amsterdam.
http://www.ivanomalavolta.com
Comparative Recommender System Evaluation: Benchmarking Recommendation Frame...Alan Said
Video available here http://www.youtube.com/watch?v=1jHxGCl8RXc
Recommender systems research is often based on comparisons of predictive accuracy: the better the evaluation scores, the better the recommender.
However, it is difficult to compare results from different recommender systems due to the many options in design and implementation of an evaluation strategy.
Additionally, algorithmic implementations can diverge from the standard formulation due to manual tuning and modifications that work better in some situations.
In this work we compare common recommendation algorithms as implemented in three popular recommendation frameworks.
To provide a fair comparison, we have complete control of the evaluation dimensions being benchmarked: dataset, data splitting, evaluation strategies, and metrics.
We also include results using the internal evaluation mechanisms of these frameworks.
Our analysis points to large differences in recommendation accuracy across frameworks and strategies, i.e. the same baselines may perform orders of magnitude better or worse across frameworks.
Our results show the necessity of clear guidelines when reporting evaluation of recommender systems to ensure reproducibility and comparison of results.
The Green Lab - [13 B] Future research challengesIvano Malavolta
This presentation is about a lecture I gave within the "Green Lab" course of the Computer Science master, Software Engineering and Green IT track of the Vrije Universiteit Amsterdam: http://masters.vu.nl/en/programmes/computer-science-software-engineering-green-it/index.aspx
http://www.ivanomalavolta.com
The Green Lab - [05 A] Experiment design (basics)Ivano Malavolta
This presentation is about a lecture I gave within the "Green Lab" course of the Computer Science master, Software Engineering and Green IT track of the Vrije Universiteit Amsterdam: http://masters.vu.nl/en/programmes/computer-science-software-engineering-green-it/index.aspx
http://www.ivanomalavolta.com
This presentation is about a lecture I gave within the "Green Lab" course of the Computer Science master, Software Engineering and Green IT track of the Vrije Universiteit Amsterdam: http://masters.vu.nl/en/programmes/computer-science-software-engineering-green-it/index.aspx
http://www.ivanomalavolta.com
The Green Lab - [09 A] Statistical tests and effect sizeIvano Malavolta
This presentation is about a lecture I gave within the "Green Lab" course of the Computer Science master, Software Engineering and Green IT track of the Vrije Universiteit Amsterdam: http://masters.vu.nl/en/programmes/computer-science-software-engineering-green-it/index.aspx
http://www.ivanomalavolta.com
This presentation is about a lecture I gave within the "Green Lab" course of the Computer Science master program, of the Vrije Universiteit Amsterdam.
http://www.ivanomalavolta.com
We offer a new model for proactive message delivery to mobile phones. SpotEx application can use any Wi-Fi access point as presence sensor that could activate delivery for some user-generated messages right to mobile phones.
The key idea is how to associate some user-defined messages and Wi-Fi access points. As a result we can build rule-based expert system that describes delivery (or visibility) for user-defined content depending on visibility of Wi-Fi hotspots.
Access Control definition, traditional access control models, their limitations and the possible solutions to overcome those problems, emerging trends in access control
Techniques for Context-Aware and Cold-Start RecommendationsMatthias Braunhofer
Context-aware recommender systems better identify interesting items for users by adapting their suggestions to the specific contextual situations, e.g., to the current weather, if an excursion is to be recommended . But, the cold-start problem may jeopardise the quality of the recommendations: for users, items or contextual situations that are new to the system, recommendations are hard to compute. We have developed a number of novel techniques to tame this problem, and in particular, new hybrid algorithms that combine several, simpler, algorithms in order to exploit their strengths and avoid their weaknesses. We have also developed algorithms for actively identifying the most useful preference information to ask the user in order to bootstrap the system. Our results obtained from a series of offline and online experiments reveal that the proposed techniques can effectively alleviate the cold-start problem of context-aware recommender systems.
Anomaly detection: Core Techniques and Advances in Big Data and Deep LearningQuantUniversity
Anomaly detection (or Outlier analysis) is the identification of items, events or observations which do not conform to an expected pattern or other items in a dataset. It is used is applications such as intrusion detection, fraud detection, fault detection and monitoring processes in various domains including energy, healthcare and finance.
Alleviating cold-user start problem with users' social network data in recomm...Eduardo Castillejo Gil
This work explores the possibility of using relevant data from users’
social network to alleviate the cold-user problems in a recommender
system domain. The proposed solution extracts the most valuable
node in the graph generated by check in a venue with an Android
application using the Foursquare API. By obtaining the recommendations to this node we estimate the probability of some categories
to be similar to users tastes...
Continuous Evaluation of Collaborative Recommender Systems in Data Stream Man...Dr. Cornelius Ludmann
Talk at the Data Streams and Event Processing Workshop at the 16. Fachtagung »Datenbanksysteme für Business, Technologie und Web« (BTW) of the Gesellschaft für Informatik (GI) in Hamburg, Germany. March 3, 2015
With R, Python, Apache Spark and a plethora of other open source tools, anyone with a computer can run machine learning algorithms in a jiffy! However, without an understanding of which algorithms to choose and when to apply a particular technique, most machine learning efforts turn into trial and error experiments with conclusions like "The algorithms don't work" or "Perhaps we should get more data".
In this lecture, we will focus on the key tenets of machine learning algorithms and how to choose an algorithm for a particular purpose. Rather than just showing how to run experiments in R ,Python or Apache Spark, we will provide an intuitive introduction to machine learning with just enough mathematics and basic statistics.
We will address:
• How do you differentiate Clustering, Classification and Prediction algorithms?
• What are the key steps in running a machine learning algorithm?
• How do you choose an algorithm for a specific goal?
• Where does exploratory data analysis and feature engineering fit into the picture?
• Once you run an algorithm, how do you evaluate the performance of an algorithm?
Avito recsys-challenge-2016RecSys Challenge 2016: Job Recommendation Based on...Vasily Leksin
This slides describes our solution for the RecSys Challenge 2016. In the challenge, several datasets were provided from a social network for business XING. The goal of the competition was to use these data to predict job postings that a user will interact positively with (click, bookmark or reply). Our solution to this problem includes three different types of models: Factorization Machine, item-based collaborative filtering, and content-based topic model on tags. Thus, we combined collaborative and content-based approaches in our solution.
Our best submission, which was a blend of ten models, achieved 7th place in the challenge's final leaderboard with a score of 1677898.52. The approaches presented in this paper are general and scalable. Therefore they can be applied to another problem of this type.
The Green Lab - [01 C] Empirical software engineeringIvano Malavolta
This presentation is about a lecture I gave within the "Green Lab" course of the Computer Science master, Software Engineering and Green IT track of the Vrije Universiteit Amsterdam: http://masters.vu.nl/en/programmes/computer-science-software-engineering-green-it/index.aspx
http://www.ivanomalavolta.com
This presentation is about a lecture I gave within the "Green Lab" course of the Computer Science master program, of the Vrije Universiteit Amsterdam.
http://www.ivanomalavolta.com
Comparative Recommender System Evaluation: Benchmarking Recommendation Frame...Alan Said
Video available here http://www.youtube.com/watch?v=1jHxGCl8RXc
Recommender systems research is often based on comparisons of predictive accuracy: the better the evaluation scores, the better the recommender.
However, it is difficult to compare results from different recommender systems due to the many options in design and implementation of an evaluation strategy.
Additionally, algorithmic implementations can diverge from the standard formulation due to manual tuning and modifications that work better in some situations.
In this work we compare common recommendation algorithms as implemented in three popular recommendation frameworks.
To provide a fair comparison, we have complete control of the evaluation dimensions being benchmarked: dataset, data splitting, evaluation strategies, and metrics.
We also include results using the internal evaluation mechanisms of these frameworks.
Our analysis points to large differences in recommendation accuracy across frameworks and strategies, i.e. the same baselines may perform orders of magnitude better or worse across frameworks.
Our results show the necessity of clear guidelines when reporting evaluation of recommender systems to ensure reproducibility and comparison of results.
The Green Lab - [13 B] Future research challengesIvano Malavolta
This presentation is about a lecture I gave within the "Green Lab" course of the Computer Science master, Software Engineering and Green IT track of the Vrije Universiteit Amsterdam: http://masters.vu.nl/en/programmes/computer-science-software-engineering-green-it/index.aspx
http://www.ivanomalavolta.com
The Green Lab - [05 A] Experiment design (basics)Ivano Malavolta
This presentation is about a lecture I gave within the "Green Lab" course of the Computer Science master, Software Engineering and Green IT track of the Vrije Universiteit Amsterdam: http://masters.vu.nl/en/programmes/computer-science-software-engineering-green-it/index.aspx
http://www.ivanomalavolta.com
This presentation is about a lecture I gave within the "Green Lab" course of the Computer Science master, Software Engineering and Green IT track of the Vrije Universiteit Amsterdam: http://masters.vu.nl/en/programmes/computer-science-software-engineering-green-it/index.aspx
http://www.ivanomalavolta.com
The Green Lab - [09 A] Statistical tests and effect sizeIvano Malavolta
This presentation is about a lecture I gave within the "Green Lab" course of the Computer Science master, Software Engineering and Green IT track of the Vrije Universiteit Amsterdam: http://masters.vu.nl/en/programmes/computer-science-software-engineering-green-it/index.aspx
http://www.ivanomalavolta.com
This presentation is about a lecture I gave within the "Green Lab" course of the Computer Science master program, of the Vrije Universiteit Amsterdam.
http://www.ivanomalavolta.com
We offer a new model for proactive message delivery to mobile phones. SpotEx application can use any Wi-Fi access point as presence sensor that could activate delivery for some user-generated messages right to mobile phones.
The key idea is how to associate some user-defined messages and Wi-Fi access points. As a result we can build rule-based expert system that describes delivery (or visibility) for user-defined content depending on visibility of Wi-Fi hotspots.
Access Control definition, traditional access control models, their limitations and the possible solutions to overcome those problems, emerging trends in access control
The context has a meaning when is considered and used to provide what the learners need in different situations (i.e. relevant information to assist and support the learning process).
This presentation is a breadcrumb to show the advances we are involve to with regards to m-learning, through the production of mobile educational resources, design and implementation of an m-learning course in our Master program Digital Technologies Applied to Education, and research projects that our master students are developing.
SeaCat: SDN End-to-End Application ContainmentUS-Ignite
This demonstration shows how the SeaCat Application Containment Architecture secures a medical record system applications (OPENMRS) in an end-to-end manner. Using this framework, medical personal can securely access patient medial records from mobile devices without fear that patients/ medical records will accidentally be exposed/compromised by malware. Junguk Cho, David Johnson, Makito Kano and Kobus Van der Merwe, University of Utah
SecureDroid: An Android Security Framework Extension for Context-Aware policy...Giuseppe La Torre
Mobile devices became the main repository of personal data and source of user-generated contents as well as the principal controller of our social networked life. In this scenario, malicious applications try to take advantage of all the possibilities left open by users and operating systems. In this paper, we propose SecureDroid: an extension of the Android security frame- work able to enforce flexible and declarative security policies at run-time, providing a fine-grained access control system. In particular, we focus on context dependent policies that allow the user to specify the way in which applications work according to current context.
The slides from the Machine Learning Summers School 2015 in Sydney on Machine Learning for Recommender Systems. Collaborative filtering algorithms, Context-aware methods, Restricted Boltzmann Machines, Recurrent Neural Networks, Tensor Factorization, etc.
This is the presentation for his admission to the third year of his Ph.D.. It talks about the several direction his work had taken and look forward to the conclusion of some task in form of code release and published papers.
WSN SIMULATORS EVALUATION: AN APPROACH FOCUSING ON ENERGY AWARENESSijwmn
The large number of Wireless Sensor Networks (WSN) simulators available nowadays, differ in their design, goals, and characteristics. Users who have to decide which simulator is the most appropriate for their particular requirements, are today lost, faced with a panoply of disparate and diverse simulators. Hence, it is obvious the need for establishing guidelines that support users in the tasks of selecting a simulator to suit their preferences and needs. In previous works, we pro- posed a generic and novel approach to evaluate networks simulators, considering a methodological process and a set of qualitative and quantitative criteria. In particularly, for WSN simulators, the criteria include relevant aspects for this kind of networks, such as energy consumption modelling and scalability capacity. The aims of this work are: (i) describe deeply the criteria related to WSN aspects; (ii) extend and update the state of the art of WSN simulators elaborated in our previous works to identify the most used and cited in scientific articles; and (iii) demonstrate the suitability of our novel methodological approach by evaluating and comparing the three most cited simulators, specially in terms of energy modelling and scalability capacities. Results show that our proposed approach provides researchers with an evaluation tool that can be used to describe and compare WSN simulators in order to select the most appropriate one for a given scenario.
TOWARDS UNIVERSAL RATING OF ONLINE MULTIMEDIA CONTENTcsandit
Most website classification systems have dealt with the question of classifying websites based on
their content, design, usability, layout and such, few have considered website classification
based on users’ experience. The growth of online marketing and advertisement has lead to
fierce competition that has resulted in some websites using disguise ways so as to attract users.
This may result in cases where a user visits a website and does not get the promised results. The
results are a waste of time, energy and sometimes even money for users. In this context, we design
an experiment that uses fuzzy linguistic model and data mining techniques to capture users’
experiences, we then use the k-means clustering algorithm to cluster websites based on a set of
feature vectors from the users’ perspective. The content unity is defined as the distance between
the real content and its keywords. We demonstrate the use of bisecting k-means algorithm for
this task and demonstrate that the method can incrementally learn from user’s profile on their
experience with these websites.
Hudup - A Framework of E-commercial Recommendation AlgorithmsLoc Nguyen
Recommendation algorithm is very important to e-commercial websites when it can provide favorite products to online customers, which results out an increase in sale revenue. I propose the infrastructure for e-commercial recommendation solutions. It is a middleware framework of e-commercial recommendation software, which supports scientists and software developers to build up their own recommendation algorithms with low cost, high achievement and fast speed. This report is a full description of proposed framework, which begins with general architectures and then concentrates on programming classes. Finally, a tutorial will help readers to comprehend the framework.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommender System
1. Usability Assessment of a Context-Aware and
Personality-Based Mobile Recommender
System
Matthias Braunhofer, Mehdi Elahi and Francesco Ricci
!
Free University of Bozen - Bolzano
Piazza Domenicani 3, 39100 Bolzano, Italy
{mbraunhofer,mehdi.elahi,fricci}@unibz.it
EC-Web - September 2014, Munich, Germany
2. EC-Web - September 2014, Munich, Germany
Outline
2
• Context-Aware Recommender Systems and their Challenges
• Related Works
• STS (South Tyrol Suggests)
• Usability Assessment and Results
• Conclusions, Lessons Learned and Future Work
3. EC-Web - September 2014, Munich, Germany
Outline
2
• Context-Aware Recommender Systems and their Challenges
• Related Works
• STS (South Tyrol Suggests)
• Usability Assessment and Results
• Conclusions, Lessons Learned and
4. Context is Essential
• Main idea: users can experience items differently depending on the current
contextual situation (e.g., season, weather, temperature, mood)
• Example:
EC-Web - September 2014, Munich, Germany
3
5. Context-Aware Recommender Systems
(CARSs)
• CARS extend Recommender Systems (RSs) beyond users and items to the
contexts in which items are experienced by users
• Rating prediction function is: R: Users × Items × Context → Ratings
EC-Web - September 2014, Munich, Germany
4
3 ? 4
2 5 4
? 3 4
1 ? 1
2 5
? 3
3 ? 5
2 5
? 3
5 ? 5
4 5 4
? 3 5
6. Challenges for CARSs
• Identification of contextual factors (e.g., weather) that are worth considering
when generating recommendations
• Acquisition of a representative set of contextually-tagged ratings
• Development of a predictive model for predicting the user’s ratings for items
under various contextual situations
• Design and implementation of a human-computer interaction (HCI) layer
on top of the predictive model
EC-Web - September 2014, Munich, Germany
5
7. Challenges for CARSs
• Identification of contextual factors (e.g., weather) that are worth considering
when generating recommendations
• Acquisition of a representative set of contextually-tagged ratings
• Development of a predictive model for predicting the user’s ratings for items
under various contextual situations
• Design and implementation of a human-computer interaction (HCI) layer
on top of the predictive model
EC-Web - September 2014, Munich, Germany
5
Focus of this
research
8. • Context-Aware Recommender Systems and their Challenges
EC-Web - September 2014, Munich, Germany
Outline
6
• Related Works
• STS (South Tyrol Suggests)
• Usability Assessment and Results
• Conclusions and Future Work
9. HCI Perspective on RSs
• Effectiveness of a RS depends not only on the underlying prediction
algorithm but also on the proper design of the human-computer
interaction (Swearingen and Sinha, 2001)
• User’s interaction with RSs:
EC-Web - September 2014, Munich, Germany
7
Recommendation
Algorithms
Input from user
(ratings)
Output to user
(recommendations)
• No. of ratings
• Time to register
• Details about item
to be rated
• Type of rating scale
• …
• No. of good recs.
• No. of new, unknown recs.
• Information about each rec.
• Confidence in prediction
• Is system logic transparent?
• …
10. Usability Assessment of RSs (1/2)
• Evaluation of the usability of a context-aware and group-based
restaurant RS using the System Usability Scale (SUS) (Park et al., 2008)
• The SUS is a 10-item instrument to measure the user’s perceived usability
of a system (Brooke, 1996)
• Major finding: the SUS score with 13 test users was 70.58, a rating between
“ok” and “good”, and corresponding to a “C” grade, which is an acceptable
level of usability
EC-Web - September 2014, Munich, Germany
8
11. Usability Assessment of RSs (2/2)
• Usage of eye tracking, clickstream analysis and SUS to determine the
usability of a constraint-based travel advisory system called VIBE (Jannach
et al., 2009)
• Major findings:
• Average SUS score was 81.5, a rating between “good” and “excellent” and
corresponding to a “B” grade, which is a very high level of usability
• Identification of several usability issues:
• Inadequate positioning of VIBE on the online portal
• Too many recommendation results
• Too little information displayed in the recommendation results
EC-Web - September 2014, Munich, Germany
9
12. • Context-Aware Recommender Systems and their Challenges
EC-Web - September 2014, Munich, Germany
Outline
10
• Related Works
• STS (South Tyrol Suggests)
• Usability Assessment and Results
• Conclusions, Lessons Learned and F
13. Interaction with the STS System
EC-Web - September 2014, Munich, Germany
11
Welcome screen
14. Interaction with the STS System
EC-Web - September 2014, Munich, Germany
11
Registration screen
15. Interaction with the STS System
EC-Web - September 2014, Munich, Germany
11
Personality questionnaire
16. Interaction with the STS System
EC-Web - September 2014, Munich, Germany
11
Questionnaire results
17. Interaction with the STS System
EC-Web - September 2014, Munich, Germany
11
Active learning
18. Interaction with the STS System
EC-Web - September 2014, Munich, Germany
11
Suggestions screen
19. Interaction with the STS System
EC-Web - September 2014, Munich, Germany
11
Context settings
20. Interaction with the STS System
EC-Web - September 2014, Munich, Germany
11
Details screen
21. Interaction with the STS System
EC-Web - September 2014, Munich, Germany
11
Rating dialog
22. Interaction with the STS System
EC-Web - September 2014, Munich, Germany
11
Routing screen
23. Interaction with the STS System
EC-Web - September 2014, Munich, Germany
11
Bookmarked items screen
24. Software Architecture and Implementation
Apache Tomcat Server
EC-Web - September 2014, Munich, Germany
12
Android Client
Spring Dispatcher
Servlet Spring Controllers
Service /
Application Layer
JPA Entities
Hibernate
Objects managed by Spring IoC Container
Database
JSON
HTTP
Web Services
25. Software Architecture and Implementation
Apache Tomcat Server
EC-Web - September 2014, Munich, Germany
12
Android Client
Spring Dispatcher
Servlet Spring Controllers
Service /
Application Layer
JPA Entities
Hibernate
Objects managed by Spring IoC Container
Database
JSON
HTTP
Web Services
26. Software Architecture and Implementation
Apache Tomcat Server
EC-Web - September 2014, Munich, Germany
12
Android Client
Spring Dispatcher
Servlet Spring Controllers
Service /
Application Layer
JPA Entities
Hibernate
Objects managed by Spring IoC Container
Database
JSON
HTTP
Web Services
27. Software Architecture and Implementation
Apache Tomcat Server
EC-Web - September 2014, Munich, Germany
12
Android Client
Spring Dispatcher
Servlet Spring Controllers
Service /
Application Layer
JPA Entities
Hibernate
Objects managed by Spring IoC Container
Database
JSON
HTTP
Web Services
28. Software Architecture and Implementation
Apache Tomcat Server
EC-Web - September 2014, Munich, Germany
12
Android Client
Spring Dispatcher
Servlet Spring Controllers
Service /
Application Layer
JPA Entities
Hibernate
Objects managed by Spring IoC Container
Database
JSON
HTTP
Web Services
29. Recommendations Computation
• Main idea: use a model similar to Context-Aware Matrix Factorization (CAMF)
(Baltrunas et al., 2011) to provide users with context-aware recommendations
• Key difference: we incorporate additional user attributes (i.e., age, gender
and Big Five personality trait scores)
• Advantage: allows to model the user preferences even if no feedback is
available
Σ )
EC-Web - September 2014, Munich, Germany
13
kΣ
ˆ ruic1,...,ck = i + bu + bicj
j=1
+ qi
T ⋅(pu + ya
a∈A(u)
ī average rating for item i
bu baseline for user u
bicj baseline for item i and contextual condition cj
qi latent factor vector of item i
pu latent factor vector of user u
A(u) set of user attributes
ya latent factor vector of user attribute a
30. Recommendations Computation
• Main idea: use a model similar to Context-Aware Matrix Factorization (CAMF)
(Baltrunas et al., 2011) to provide users with context-aware recommendations
• Key difference: we incorporate additional user attributes (i.e., age, gender
and Big Five personality trait scores)
• Advantage: allows to model the user preferences even if no feedback is
available
Σ )
EC-Web - September 2014, Munich, Germany
13
kΣ
ˆ ruic1,...,ck = i + bu + bicj
j=1
+ qi
T ⋅(pu + ya
a∈A(u)
ī average rating for item i
bu baseline for user u
bicj baseline for item i and contextual condition cj
qi latent factor vector of item i
pu latent factor vector of user u
A(u) set of user attributes
ya latent factor vector of user attribute a
31. Recommendations Computation
• Main idea: use a model similar to Context-Aware Matrix Factorization (CAMF)
(Baltrunas et al., 2011) to provide users with context-aware recommendations
• Key difference: we incorporate additional user attributes (i.e., age, gender
and Big Five personality trait scores)
• Advantage: allows to model the user preferences even if no feedback is
available
Σ )
EC-Web - September 2014, Munich, Germany
13
kΣ
ˆ ruic1,...,ck = i + bu + bicj
j=1
+ qi
T ⋅(pu + ya
a∈A(u)
ī average rating for item i
bu baseline for user u
bicj baseline for item i and contextual condition cj
qi latent factor vector of item i
pu latent factor vector of user u
A(u) set of user attributes
ya latent factor vector of user attribute a
32. Recommendations Computation
• Main idea: use a model similar to Context-Aware Matrix Factorization (CAMF)
(Baltrunas et al., 2011) to provide users with context-aware recommendations
• Key difference: we incorporate additional user attributes (i.e., age, gender
and Big Five personality trait scores)
• Advantage: allows to model the user preferences even if no feedback is
available
Σ )
EC-Web - September 2014, Munich, Germany
13
kΣ
ˆ ruic1,...,ck = i + bu + bicj
j=1
+ qi
T ⋅(pu + ya
a∈A(u)
ī average rating for item i
bu baseline for user u
bicj baseline for item i and contextual condition cj
qi latent factor vector of item i
pu latent factor vector of user u
A(u) set of user attributes
ya latent factor vector of user attribute a
33. Recommendations Computation
• Main idea: use a model similar to Context-Aware Matrix Factorization (CAMF)
(Baltrunas et al., 2011) to provide users with context-aware recommendations
• Key difference: we incorporate additional user attributes (i.e., age, gender
and Big Five personality trait scores)
• Advantage: allows to model the user preferences even if no feedback is
available
Σ )
EC-Web - September 2014, Munich, Germany
13
kΣ
ˆ ruic1,...,ck = i + bu + bicj
j=1
+ qi
T ⋅(pu + ya
a∈A(u)
ī average rating for item i
bu baseline for user u
bicj baseline for item i and contextual condition cj
qi latent factor vector of item i
pu latent factor vector of user u
A(u) set of user attributes
ya latent factor vector of user attribute a
34. Recommendations Computation
• Main idea: use a model similar to Context-Aware Matrix Factorization (CAMF)
(Baltrunas et al., 2011) to provide users with context-aware recommendations
• Key difference: we incorporate additional user attributes (i.e., age, gender
and Big Five personality trait scores)
• Advantage: allows to model the user preferences even if no feedback is
available
Σ )
EC-Web - September 2014, Munich, Germany
13
kΣ
ˆ ruic1,...,ck = i + bu + bicj
j=1
+ qi
T ⋅(pu + ya
a∈A(u)
ī average rating for item i
bu baseline for user u
bicj baseline for item i and contextual condition cj
qi latent factor vector of item i
pu latent factor vector of user u
A(u) set of user attributes
ya latent factor vector of user attribute a
35. Recommendations Computation
• Main idea: use a model similar to Context-Aware Matrix Factorization (CAMF)
(Baltrunas et al., 2011) to provide users with context-aware recommendations
• Key difference: we incorporate additional user attributes (i.e., age, gender
and Big Five personality trait scores)
• Advantage: allows to model the user preferences even if no feedback is
available
new
Σ )
EC-Web - September 2014, Munich, Germany
13
kΣ
ˆ ruic1,...,ck = i + bu + bicj
j=1
+ qi
T ⋅(pu + ya
a∈A(u)
ī average rating for item i
bu baseline for user u
bicj baseline for item i and contextual condition cj
qi latent factor vector of item i
pu latent factor vector of user u
A(u) set of user attributes
ya latent factor vector of user attribute a
36. Recommendations Computation
• Main idea: use a model similar to Context-Aware Matrix Factorization (CAMF)
(Baltrunas et al., 2011) to provide users with context-aware recommendations
• Key difference: we incorporate additional user attributes (i.e., age, gender
and Big Five personality trait scores)
• Advantage: allows to model the user preferences even if no feedback is
available
Σ )
EC-Web - September 2014, Munich, Germany
13
kΣ
ˆ ruic1,...,ck = i + bu + bicj
j=1
+ qi
T ⋅(pu + ya
a∈A(u)
ī average rating for item i
bu baseline for user u
bicj baseline for item i and contextual condition cj
qi latent factor vector of item i
pu latent factor vector of user u
A(u) set of user attributes
ya latent factor vector of user attribute a
37. EC-Web - September 2014, Munich, Germany
Outline
14
• Context-Aware Recommender Systems and their Challenges
• Related Works
• STS (South Tyrol Suggests)
• Usability Assessment and Results
• Conclusions, Lessons Learned and Future Work
38. Experimental Methodology
• Live user study where we compared our system (STS) with a variant (STS-S)
that has the same graphical UI but does not use the weather context when
generating recommendations
• We have designed a specific user task and used a questionnaire for
assessing the perceived recommendation quality (Knijnenburg et al., 2012)
and system usability with the System Usability Scale (SUS) (Brooke, 1996)
• 30 subjects that were randomly divided in two equal groups assigned to
STS and STS-S (15 each)
EC-Web - September 2014, Munich, Germany
15
39. EC-Web - September 2014, Munich, Germany
User Task
• Users were supposed to:
• have an afternoon off and to look for attractions / events in South Tyrol
• consider the contextual conditions relevant for them and to specify them
in the system settings
• browse the attractions / events sections and check whether they could
find something interesting for them
• browse the system suggestions (recommendations), and select and
bookmark the one that they believed fits their preferences
• fill out a survey on recommendation quality and system usability
16
40. Results (1/3)
Box-and-whisker plot of the SUS points for each statement given by all
users
EC-Web - September 2014, Munich, Germany
17
S1 I think that I would like to use this system
frequently.
S2 I found the system unnecessarily complex.
S3 I thought the system was easy to use.
S4 I think that I would need the support of a
technical person to be able to use this
system.
S5 I found the various functions in this system
were well integrated
S6 I thought there was too much
inconsistency in this system.
S7 I would imagine that most people would
learn to use this system very quickly.
S8 I found the system very cumbersome to
use.
S9 I felt very confident using the system.
S10 I needed to learn a lot of things before I
could get going with this system.
41. SUS scores for all users
Benchmark Average
1 2 3 4 5 6 7 8 9 10 11 12 12 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
EC-Web - September 2014, Munich, Germany
90
85
80
75
SUS score 50
70
65
60
55
Users
Results (2/3)
18
42. EC-Web - September 2014, Munich, Germany
Results (3/3)
Comparison of the SUS scores for STS and STS-S users
19
Statement STS STS-S p-value
S1 I think that I would like to use this system frequently. 3.0 3.2 0.27
S2 I found the system unnecessarily complex. 3.2 3.5 0.16
S3 I thought the system was easy to use. 3.1 2.8 0.18
S4 I think that I would need the support of a technical person to
be able to use this system.
3.3 3.4 0.40
S5 I found the various functions in this system were well integrated 3.1 2.8 0.14
S6 I thought there was too much inconsistency in this
system.
3.2 2.8 0.08
S7 I would imagine that most people would learn to use this
system very quickly.
2.8 3.0 0.25
S8 I found the system very cumbersome to use. 3.4 3.1 0.19
S9 I felt very confident using the system. 2.7 2.8 0.40
S10 I needed to learn a lot of things before I could get going
with this system.
3.4 3.1 0.11
Overall SUS 78.8 77.0 0.19
43. Corrective Actions Based on the Results (1/3)
• Five-Item Personality Inventory (FIPI)
• We replaced the Ten-Item Personality
Inventory (TIPI) with the Five-Item
Personality Inventory (FIPI), which is less
time-consuming and still provides
sufficient personality data.
• Built-in help
• Users can click the “?” icon next to each
questionnaire question to access on-screen
help with term definitions.
EC-Web - September 2014, Munich, Germany
20
…Before
…After
44. Corrective Actions Based on the Results (1/3)
• Five-Item Personality Inventory (FIPI)
• We replaced the Ten-Item Personality
Inventory (TIPI) with the Five-Item
Personality Inventory (FIPI), which is less
time-consuming and still provides
sufficient personality data.
• Built-in help
• Users can click the “?” icon next to each
questionnaire question to access on-screen
help with term definitions.
EC-Web - September 2014, Munich, Germany
20
…Before
…After
45. Corrective Actions Based on the Results (1/3)
• Five-Item Personality Inventory (FIPI)
• We replaced the Ten-Item Personality
Inventory (TIPI) with the Five-Item
Personality Inventory (FIPI), which is less
time-consuming and still provides
sufficient personality data.
• Built-in help
• Users can click the “?” icon next to each
questionnaire question to access on-screen
help with term definitions.
EC-Web - September 2014, Munich, Germany
20
…Before
…After
46. Corrective Actions Based on the Results (1/3)
• Five-Item Personality Inventory (FIPI)
• We replaced the Ten-Item Personality
Inventory (TIPI) with the Five-Item
Personality Inventory (FIPI), which is less
time-consuming and still provides
sufficient personality data.
• Built-in help
• Users can click the “?” icon next to each
questionnaire question to access on-screen
help with term definitions.
EC-Web - September 2014, Munich, Germany
20
…Before
…After
47. Corrective Actions Based on the Results (1/3)
• Five-Item Personality Inventory (FIPI)
• We replaced the Ten-Item Personality
Inventory (TIPI) with the Five-Item
Personality Inventory (FIPI), which is less
time-consuming and still provides
sufficient personality data.
• Built-in help
• Users can click the “?” icon next to each
questionnaire question to access on-screen
help with term definitions.
EC-Web - September 2014, Munich, Germany
20
…Before
…After
48. Corrective Actions Based on the Results (2/3)
• In-app notifications
• Instead of forcing users to go through the
lengthy AL process during registration, we
give them freedom to decide when to
initiate it through in-app notifications
within the POI suggestions screen.
• User profile page
• We implemented a new user profile page,
making it easier to access and change
context settings, basic user information,
personality information, etc.
EC-Web - September 2014, Munich, Germany
21
49. Corrective Actions Based on the Results (2/3)
• In-app notifications
• Instead of forcing users to go through the
lengthy AL process during registration, we
give them freedom to decide when to
initiate it through in-app notifications
within the POI suggestions screen.
• User profile page
• We implemented a new user profile page,
making it easier to access and change
context settings, basic user information,
personality information, etc.
EC-Web - September 2014, Munich, Germany
21
50. Corrective Actions Based on the Results (2/3)
• In-app notifications
• Instead of forcing users to go through the
lengthy AL process during registration, we
give them freedom to decide when to
initiate it through in-app notifications
within the POI suggestions screen.
• User profile page
• We implemented a new user profile page,
making it easier to access and change
context settings, basic user information,
personality information, etc.
EC-Web - September 2014, Munich, Germany
21
51. Corrective Actions Based on the Results (2/3)
• In-app notifications
• Instead of forcing users to go through the
lengthy AL process during registration, we
give them freedom to decide when to
initiate it through in-app notifications
within the POI suggestions screen.
• User profile page
• We implemented a new user profile page,
making it easier to access and change
context settings, basic user information,
personality information, etc.
EC-Web - September 2014, Munich, Germany
21
52. Corrective Actions Based on the Results (2/3)
• In-app notifications
• Instead of forcing users to go through the
lengthy AL process during registration, we
give them freedom to decide when to
initiate it through in-app notifications
within the POI suggestions screen.
• User profile page
• We implemented a new user profile page,
making it easier to access and change
context settings, basic user information,
personality information, etc.
EC-Web - September 2014, Munich, Germany
21
53. Corrective Actions Based on the Results (2/3)
• In-app notifications
• Instead of forcing users to go through the
lengthy AL process during registration, we
give them freedom to decide when to
initiate it through in-app notifications
within the POI suggestions screen.
• User profile page
• We implemented a new user profile page,
making it easier to access and change
context settings, basic user information,
personality information, etc.
EC-Web - September 2014, Munich, Germany
21
54. Corrective Actions Based on the Results (2/3)
• In-app notifications
• Instead of forcing users to go through the
lengthy AL process during registration, we
give them freedom to decide when to
initiate it through in-app notifications
within the POI suggestions screen.
• User profile page
• We implemented a new user profile page,
making it easier to access and change
context settings, basic user information,
personality information, etc.
EC-Web - September 2014, Munich, Germany
21
55. Corrective Actions Based on the Results (3/3)
• Many other minor UI improvements
• Revised the contextual factors and contextual conditions
• Improved the UI for displaying personality questionnaire results
• Cleaned up the POI details screen
EC-Web - September 2014, Munich, Germany
22
Before After Before After
56. Corrective Actions Based on the Results (3/3)
• Many other minor UI improvements
• Revised the contextual factors and contextual conditions
• Improved the UI for displaying personality questionnaire results
• Cleaned up the POI details screen
EC-Web - September 2014, Munich, Germany
22
Before After Before After
57. Corrective Actions Based on the Results (3/3)
• Many other minor UI improvements
• Revised the contextual factors and contextual conditions
• Improved the UI for displaying personality questionnaire results
• Cleaned up the POI details screen
EC-Web - September 2014, Munich, Germany
22
Before After Before After
58. Corrective Actions Based on the Results (3/3)
• Many other minor UI improvements
• Revised the contextual factors and contextual conditions
• Improved the UI for displaying personality questionnaire results
• Cleaned up the POI details screen
EC-Web - September 2014, Munich, Germany
22
Before After Before After
59. EC-Web - September 2014, Munich, Germany
Outline
23
• Context-Aware Recommender Systems and their Challenges
• Related Works
• STS (South Tyrol Suggests)
• Usability Assessment and Results
• Conclusions, Lessons Learned and Future Work
60. Conclusions
• Novel and highly usable mobile CARS called STS (South Tyrol Suggests)
that offers various innovative features
• Learns users’ preferences not only using their past ratings, but also
exploiting their personality
• Uses personality to actively acquire ratings for POIs the user has likely
experienced, and to produce more accurate POI recommendations
• Live user study to test the usability of STS
• Results confirm high usability of the proposed system
• Allowed to uncover and resolve some usability issues, such as moderate
confidence in the system and poor integration of some features
EC-Web - September 2014, Munich, Germany
24
61. Lessons Learned
• Only ask users for the minimum required information
• The more information you ask of users, the less likely they will provide it
• Make the system as simple as possible to use
• Keep the system as simple as possible and provide useful on-screen help
or tutorials to instruct users on how to get things done
• Give users control over the system
• Instead of telling users how to use the user interface, give them the ability
to control where they go and what they do. Moreover, always ensure that
the user knows what things are and what they will do
EC-Web - September 2014, Munich, Germany
25
62. EC-Web - September 2014, Munich, Germany
Future Work
• Evaluate the usability of the revised user interface
• Provide users with proactive recommendations and rating requests
• Consider additional important contextual factors in the recommendation
process (e.g., parking availability, traffic conditions)
• Improve explanations to make the recommendation process more transparent
to users
26