60 research outputs found
Factors Influencing the Quality of the User Experience in Ubiquitous Recommender Systems
The use of mobile devices and the rapid growth of the internet and networking
infrastructure has brought the necessity of using Ubiquitous recommender
systems. However in mobile devices there are different factors that need to be
considered in order to get more useful recommendations and increase the quality
of the user experience. This paper gives an overview of the factors related to
the quality and proposes a new hybrid recommendation model.Comment: The final publication is available at www.springerlink.com
Distributed, Ambient, and Pervasive Interactions Lecture Notes in Computer
Science Volume 8530, 2014, pp 369-37
A dynamic multi-level collaborative filtering method for improved recommendations
One of the most used approaches for providing recommendations in various
online environments such as e-commerce is collaborative filtering. Although,
this is a simple method for recommending items or services, accuracy and
quality problems still exist. Thus, we propose a dynamic multi-level
collaborative filtering method that improves the quality of the
recommendations. The proposed method is based on positive and negative
adjustments and can be used in different domains that utilize collaborative
filtering to increase the quality of the user experience. Furthermore, the
effectiveness of the proposed method is shown by providing an extensive
experimental evaluation based on three real datasets and by comparisons to
alternative methods
Cyber-attack path discovery in a dynamic supply chain maritime risk management system
Maritime port infrastructures rely on the use of information systems for collaboration, while a vital part of collaborating is to provide protection to these systems. Attack graph analysis and risk assessment provide information that can be used to protect the assets of a network from cyber-attacks. Furthermore, attack graphs provide functionality that can be used to identify vulnerabilities in a network and how these can be exploited by potential attackers. Existing attack graph generation methods are inadequate in satisfying certain requirements necessary in a dynamic supply chain risk management environment, since they do not consider variables that assist in exploring specific network parts that satisfy certain criteria, such as the entry and target points, the propagation length and the location and capability of the potential attacker. In this paper, we present a cyber-attack path discovery method that is used as a component of a maritime risk management system. The method uses constraints and Depth-first search to effectively generate attack graphs that the administrator is interested in. To support our method and to show its effectiveness we have evaluated it using real data from a maritime supply chain
- …