Social trust relationships between users in social networks speak to the similarity in opinions between the users, both in general and in important nuanced ways. They have been used in the past to make recommendations...
详细信息
Social trust relationships between users in social networks speak to the similarity in opinions between the users, both in general and in important nuanced ways. They have been used in the past to make recommendations on the web. New trust metrics allow us to easily cluster users based on trust. In this paper, we investigate the use of trust clusters as a new way of improving recommendations. Previous work on the use of clusters has shown the technique to be relatively unsuccessful, but those clusters were based on similarity rather than trust. Our results show that when trust clusters are integrated into memory-based collaborative filtering algorithms, they lead to statistically significant improvements in accuracy. In this paper we discuss our methods, experiments, results, and potential future applications of the technique.
Automatic speech recognition is being used increasingly in a variety of applications. There is great potential for its use in educational applications for children. However, the accuracy of recognition of child speech...
详细信息
ISBN:
(纸本)9781605586908
Automatic speech recognition is being used increasingly in a variety of applications. There is great potential for its use in educational applications for children. However, the accuracy of recognition of child speech is very low. There are probably a number of reasons for this, but one is the difficulty in collecting high-quality recordings of children to be used in the building of speech models. If a better interface can be provided between the child and the recording equipment then it may be possible to collect better samples. Interfaces have been designed to be tested to that end, using alternative interface paradigms: push-to-talk and a limited time recording with and without a progress bar. These alternatives will be compared by collecting speech samples and measuring their quality. Copyright 2009 ACM.
This article reports on the experience of conducting the program committee (PC) meeting for the IEEE VR 2009 conference in Second Life. More than 50 PC members from around the globe met virtually over a two-day period...
详细信息
The concept of "agency" in games and other playable media (also referred to as "intention") has been discussed as a player experience and a structural property of works. We shift focus, considering...
详细信息
The advent of more portable and affordable sensing devices has facilitated the study of rehabilitation robotics. Critical to the further development of therapies and interventions are low-cost, easy-to-use devices tha...
详细信息
ISBN:
(纸本)9789639799424
The advent of more portable and affordable sensing devices has facilitated the study of rehabilitation robotics. Critical to the further development of therapies and interventions are low-cost, easy-to-use devices that can be applied in clinical and home care settings. In this paper, we present a low-cost motion capture system that relies on the opensource Player/Stage software development environment, and can be used in conjunction with a socially assistive robotic agent (or a computer interface) for various types of motor task rehabilitation training. We describe the hardware and software development for the device, and the activity recognition algorithm we developed to capture the relevant motion data. We present the overall framework in which this system can be adapted to other motor task-based rehabilitation regimens. Finally, we present initial experimental data in the domain of gait rehabilitation, in which we use the system to estimate cadence, walking speed, and stride length.
This paper demonstrates how a recently developed analytical usability evaluation method, the Sii framework, can by used to inspect semantic search interfaces for how they support people working with the large heteroge...
详细信息
This paper demonstrates how a recently developed analytical usability evaluation method, the Sii framework, can by used to inspect semantic search interfaces for how they support people working with the large heterogeneous datasets afforded by Linked Data. To enrich the discussion, an analysis of the Tabulator browser for Linked Data is presented and discussed in terms of the workshop's case study surrounding archivists. The analysis shows that while the Tabulator provides some strong support for sense-making, it would struggle to support such archivists in first defining their needs. In analyzing the Tabulator from the perspectives of the archivists, this paper demonstrates how the new Sii method can provide rigor and reason to the assessment of future design decisions made for Semantic Web user interactions.
Sentiment analysis often relies on a semantic orientation lexicon of positive and negative words. A number of approaches have been proposed for creating such lexicons, but they tend to be computationally expensive, an...
详细信息
Assistive environments employ multiple types of devices to monitor human actions and identify critical events for phys- ical safety. Some of the devices must be wireless in order to be nonintrusive. This introduces th...
详细信息
ISBN:
(纸本)9781605584096
Assistive environments employ multiple types of devices to monitor human actions and identify critical events for phys- ical safety. Some of the devices must be wireless in order to be nonintrusive. This introduces the problem of authenticat- ing these devices and building secure communication chan- nels among them. The traditional way is to assign a private key to a device for digital identification. In this paper, we present an approach to protect the private key by introduc- ing a third party and bilaterally and proactively generating a random number to refresh key shares based on Bellare and Miner's forward secure signature scheme. This improves the resilient mediated RSA solution because the entire private key is also updated periodically. In this way, if an attacker steals one key share, he only can use it for a limited period of time because it will be obsolete immediately after the next refresh operation. Even if he compromises both key shares simultaneously, the digital signatures generated by previous private keys are still secure. Our scheme is proven to be intrusion resilient based on the CDH assumption in the ran- dom oracle model. The construction is also quite efficient. Copyright 2009 ACM.
Peer-to-peer (P2P) technology is an emerging approach to overcoming the limitations of the traditional client server architecture. However, building a highly available P2P system is quite challenging, in particular a ...
详细信息
in this article we describe the Sweep-Shake system, a novel, low interaction cost approach to supporting the spontaneous discovery of geo-located information. By sweeping a mobile device around their environment, user...
详细信息
ISBN:
(纸本)9781605582818
in this article we describe the Sweep-Shake system, a novel, low interaction cost approach to supporting the spontaneous discovery of geo-located information. By sweeping a mobile device around their environment, users browse for interesting information related to points of interest. We built a mobile haptic prototype which encourages the user to explore their surroundings to search for location information, helping them discover this by providing directional vibrotactile feedback. Once potential targets are selected, the interaction is extended to offer an hierarchy of information levels with a simple method for filtering and selecting desired types of data for each geo-tagged location. We describe and motivate our approach and present a short field trial to situate our design in a real environment, followed by a more detailed user study that compares it against an equivalent visual-based system.
暂无评论