• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • Tagged with
  • 8
  • 8
  • 8
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Scalable collaborative filtering using updatable indexing

Tam, Ming-wai., 譚銘威. January 2008 (has links)
published_or_final_version / Computer Science / Master / Master of Philosophy
2

Scalable collaborative filtering using updatable indexing

Tam, Ming-wai. January 2008 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2008. / Includes bibliographical references (p. 55-58) Also available in print.
3

A new adaptive framework for collaborative filtering prediction

Almosallam, Ibrahim Ahmad. Shang, Yi, January 2008 (has links)
Thesis (M.S.)--University of Missouri-Columbia, 2008. / The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on August 22, 2008) Includes bibliographical references.
4

Energy efficient MESI cache-coherence with pro-active snoop filtering for multicore microprocessors

Patel, Avadh. January 2008 (has links)
Thesis (M.S.)--State University of New York at Binghamton, Thomas J. Watson School of Engineering and Applied Science, Department of Computer Science, 2008. / Includes bibliographical references.
5

Designing and understanding information retrieval systems using collaborative filtering in an academic library environment /

Jung, Seikyung. January 1900 (has links)
Thesis (Ph. D.)--Oregon State University, 2008. / Printout. Includes bibliographical references. Also available on the World Wide Web.
6

PerTrust : leveraging personality and trust for group recommendations

Leonard, Justin Sean 01 July 2014 (has links)
M.Sc. (Information Technology) / Recommender systems assist a system user to identify relevant content within a specific context. This is typically performed through an analysis of a system user’s rating habits and personal preferences and leveraging these to return one or a number of relevant recommendations. There are numerable contexts in which recommender systems can be applied, such as movies, tourism, books, and music. The need for recommender systems has become increasingly relevant, particularly on the Internet. This is mainly due to the exponential amount of content that is published online on a daily basis. It has thus become more time consuming and difficult to find pertinent information online, leading to information overload. The relevance of a recommender system, therefore, is to assist a system user to overcome the information overload problem by identifying pertinent information on their behalf. There has been much research done within the recommender system field and how such systems can best recommend items to an individual user. However, a growing and more recent research area is how recommender systems can be extended to recommend items to groups, known as group recommendation. The relevance of group recommendation is that many contexts of recommendation apply to both individuals and groups. For example, people often watch movies or visit tourist attractions as part of a group. Group recommendation is an inherently more complex form of recommendation than individual recommendation for a number of reasons. The first reason is that the rating habits and personal preferences of each system user within the group need to be considered. Additionally, these rating habits and personal preferences can be quite heterogeneous in nature. Therefore, group recommendation becomes complex because a satisfactory recommendation needs to be one which meets the preferences of each group member and not just a single group member. The second reason why group recommendation is considered to be more complex than individual recommendation is because a group not only includes multiple personal preferences, but also multiple personality types. This means that a group is more complex from a social perspective. Therefore, a satisfactory group recommendation needs to be one which considers the varying personality types and behaviours of the group. The purpose of this research is to present PerTrust, a generic framework for group recommendation with the purpose of providing a possible solution to the aforementioned issues noted above. The primary focus of PerTrust is how to leverage both personality and trust in overcoming these issues.
7

Information Processing in Two-Dimensional Cellular Automata

Cenek, Martin 01 January 2011 (has links)
Cellular automata (CA) have been widely used as idealized models of spatially-extended dynamical systems and as models of massively parallel distributed computation devices. Despite their wide range of applications and the fact that CA are capable of universal computation (under particular constraints), the full potential of these models is unrealized to-date. This is for two reasons: (1) the absence of a programming paradigm to control these models to solve a given problem and (2) the lack of understanding of how these models compute a given task. This work addresses the notion of computation in two-dimensional cellular automata. Solutions using a decentralized parallel model of computation require information processing on a global level. CA have been used to solve the so-called density (or majority) classification task that requires a system-wide coordination of cells. To better understand and challenge the ability of CA to solve problems, I define, solve, and analyze novel tasks that require solutions with global information processing mechanisms. The ability of CA to perform parallel, collective computation is attributed to the complex pattern-forming system behavior. I further develop the computational mechanics framework to study the mechanism of collective computation in two-dimensional cellular automata. I define several approaches to automatically identify the spatiotemporal structures with information content. Finally, I demonstrate why an accurate model of information processing in two-dimensional cellular automata cannot be constructed from the space-time behavior of these structures.
8

Shilling attack detection in recommender systems.

Bhebe, Wilander. January 2015 (has links)
M. Tech. Information Networks / The growth of the internet has made it easy for people to exchange information resulting in the abundance of information commonly referred to as information overload. It causes retailers to fail to make adequate sales since the customers are swamped with a lot of options and choices. To lessen this problem retailers have begun to find it useful to make use of algorithmic approaches to determine which content to show consumers. These algorithmic approaches are known as recommender systems. Collaborative Filtering recommender systems suggest items to users based on other users reported prior experience with those items. These systems are, however, vulnerable to shilling attacks since they are highly dependent on outside sources of information. Shilling is a process in which syndicating users can connive to promote or demote a certain item, where malicious users benefit from introducing biased ratings. It is, however, critical that shilling detection systems are implemented to detect, warn and shut down shilling attacks within minutes. Modern patented shilling detection systems employ: (a) classification methods, (b) statistical methods, and (c) rules and threshold values defined by shilling detection analysts, using their knowledge of valid shilling cases and the false alarm rate as guidance. The goal of this dissertation is to determine a context for, and assess the performance of Meta-Learning techniques that can be integrated in the shilling detection process.

Page generated in 0.1887 seconds