This paper introduces the main characteristics of the digital cultural collections that constitute the use cases presently in use in the CULTURA environment. A section on related work follows giving an account on effo...
详细信息
With the increased popularity of Web 2.0 services in the last years data privacy has become a major concern for users. The more personal data users reveal, the more difficult it becomes to control its disclosure in th...
详细信息
ISBN:
(纸本)9781450307321
With the increased popularity of Web 2.0 services in the last years data privacy has become a major concern for users. The more personal data users reveal, the more difficult it becomes to control its disclosure in the web. However, for Web 2.0 service providers, the data provided by users is a valuable source for offering effective, personalised data mining services. One major application is the detection of spam in social bookmarking systems: in order to prevent a decrease of content quality, providers need to distinguish spammers and exclude them from the system. They thereby experience a conflict of interests: on the one hand, they need to identify spammers based on the information they collect about users, on the other hand, they need to respect privacy concerns and process as few personal data as possible. It would therefore be of tremendous help for system developers and users to know which personal data are needed for spam detection and which can be ignored. In this paper we address these questions by presenting a data privacy aware feature engineering approach. It consists of the design of features for spam classification which are evaluated according to both, performance and privacy conditions. Experiments using data from the social bookmarking system BibSonomy show that both conditions must not exclude each other.
The heterogeneity of learner models in structure, syntax and semantics makes sharing them a significant challenge for existing educational web systems. Creating mappings between the different types of learner models i...
详细信息
ISBN:
(纸本)9789898425515
The heterogeneity of learner models in structure, syntax and semantics makes sharing them a significant challenge for existing educational web systems. Creating mappings between the different types of learner models is one technique that is used when attempting to overcome these issues. This paper presents an overview of research currently being conducted in the area of learner model exchange and defines a categorization, derived from existing educational web systems, of the different mapping types that are required for learner model mapping. Following this, a framework is presented that supports the creation and validation of these different mapping types and the exchange of learner information between multiple heterogeneous educational web systems.
Federated policy systems are required to support the complexity and organizational heterogeneity of the modern marketplace. The Community-based Policy Management System (CBPMS) is such a distributed policy management ...
详细信息
One of the main services that Adaptive Systems offer to their users is the provision of content that is tailored to individual user's needs. Some Adaptive Systems use a closed corpus content that has been prepared...
详细信息
As information technology interweaves with our daily environment, new modes of interaction will be required. In this paper, we suggest a gesture-based approach and present a prototypical case study for a gesture contr...
For large-scale data mining utilizing data from ubiquitous and mixed-structured data sources, the appropriate extraction and integration into a comprehensive data-warehouse is of prime importance. Then, appropriate me...
详细信息
For large-scale data mining utilizing data from ubiquitous and mixed-structured data sources, the appropriate extraction and integration into a comprehensive data-warehouse is of prime importance. Then, appropriate methods for validation and potential refinement are essential. This paper presents an approach applying data mining and information extraction methods for data validation: We apply subgroup discovery and (rule-based) information extraction for data integration and validation. The methods are integrated into an incremental process for continuous validation options. The results of a medical application demonstrate that subgroup discovery and the applied information extraction methods are well suited for mining, extracting and validating clinically relevant knowledge.
The 2016 edition of the Linked data Mining Challenge, conducted in conjunction with Know@LOD 2016, has been the fourth edition of this challenge. This year's dataset collected music album ratings, where the task w...
详细信息
The 2016 edition of the Linked data Mining Challenge, conducted in conjunction with Know@LOD 2016, has been the fourth edition of this challenge. This year's dataset collected music album ratings, where the task was to classify well and badly rated music albums. The best solution submitted reached an accuracy of almost 92:5%, which is a clear advancement over the baseline of 69:38%.
In the last years several drafts, recommendations and concepts for a graphical notation for Topic Maps have been published, but till today no graphical notation is generally approved and used in the Topic Maps communi...
详细信息
ISBN:
(纸本)9783941152052
In the last years several drafts, recommendations and concepts for a graphical notation for Topic Maps have been published, but till today no graphical notation is generally approved and used in the Topic Maps community. In this paper we present GTMalpha as a conceptual new notation for a graphical representation of Topic Maps. Our objective is, to provide a practical usable notation, which allows a complete, consistent as well as easy to use graphical representation of any given topic map draft. GTMalpha provides a domain as well as a subject centric view and most important it considers the unique characteristics of the Topic Maps paradigm. This paper serves as a user oriented GTMalpha manual for ontology designers, domain experts as well as users.
In recent years there has been a marked uptake in the digitisation of cultural heritage collections. Though this has enabled more sources to be made available to experts and the wider public, curators still struggle t...
详细信息
暂无评论