3,149 research outputs found

    A Framework for Exploiting Internet of Things for Context-Aware Trust-based Personalized Services

    Get PDF
    In the last years, we have witnessed the introduction of Internet of Things as an integral part of the Internet with billions of interconnected and addressable everyday objects. On the one hand, these objects generate massive volume of data that can be exploited to gain useful insights into our day-to-day needs. On the other hand, context-aware recommender systems (CARSs) are intelligent systems that assist users to make service consumption choices that satisfy their preferences based on their contextual situations. However, one of the major challenges in developing CARSs is the lack of functionality providing dynamic and reliable context information required by the recommendation decision process based on the objects that users interact with in their environments. Thus, contextual information obtained from IoT objects and other sources can be exploited to build CARSs that satisfy users’ preferences, improve quality of experience and recommendation accuracy. This article describes various components of a conceptual IoT based framework for context-aware personalized recommendations. The framework addresses the weakness whereby CARSs rely on static and limited contextual information from user’s mobile phone, by providing additional components for reliable and dynamic contextual information, using IoT context sources. The core of the framework consists of context recognition and reasoning management, dynamic user profile model incorporating trust to improve accuracy of context-aware personalized recommendations. Experimental evaluations show that incorporating context and trust in personalized recommendations can improve its accuracy

    A flexible architecture for privacy-aware trust management

    Get PDF
    In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different participants trust each other. As trust may depend on many different factors, in a flexible framework for Trust Management (TM) trust must be computed by combining different types of information. In this paper we describe the TAS3 TM framework which integrates independent TM systems into a single trust decision point. The TM framework supports intricate combinations whilst still remaining easily extensible. It also provides a unified trust evaluation interface to the (authorization framework of the) services. We demonstrate the flexibility of the approach by integrating three distinct TM paradigms: reputation-based TM, credential-based TM, and Key Performance Indicator TM. Finally, we discuss privacy concerns in TM systems and the directions to be taken for the definition of a privacy-friendly TM architecture.\u

    Connecting Researchers with Companies for University-Industry Collaboration

    Get PDF
    Nowadays, companies are spending more time and money to enhance their innovation ability to respond to the increasing market competition. The pressure makes companies seek help from external knowledge, especially those from academia. Unfortunately, there is a gap between knowledge seekers (companies) and suppliers (researchers) due to the scattered and asymmetric information. To facilitate shared economy, various platforms are designed to connect the two parties. In this context, we design a researcher recommendation system to promote their collaboration (e.g. patent license, collaborative research, contract research and consultancy) based on a research social network with complete information about both researchers and companies. In the recommendation system, we evaluate researchers from three aspects, including expertise relevance, quality and trustworthiness. The experiment result shows that our system performs well in recommending suitable researchers for companies. The recommendation system has been implemented on an innovation platform, InnoCity.

    User modeling for exploratory search on the Social Web. Exploiting social bookmarking systems for user model extraction, evaluation and integration

    Get PDF
    Exploratory search is an information seeking strategy that extends be- yond the query-and-response paradigm of traditional Information Retrieval models. Users browse through information to discover novel content and to learn more about the newly discovered things. Social bookmarking systems integrate well with exploratory search, because they allow one to search, browse, and filter social bookmarks. Our contribution is an exploratory tag search engine that merges social bookmarking with exploratory search. For this purpose, we have applied collaborative filtering to recommend tags to users. User models are an im- portant prerequisite for recommender systems. We have produced a method to algorithmically extract user models from folksonomies, and an evaluation method to measure the viability of these user models for exploratory search. According to our evaluation web-scale user modeling, which integrates user models from various services across the Social Web, can improve exploratory search. Within this thesis we also provide a method for user model integra- tion. Our exploratory tag search engine implements the findings of our user model extraction, evaluation, and integration methods. It facilitates ex- ploratory search on social bookmarks from Delicious and Connotea and pub- lishes extracted user models as Linked Data

    A Survey on Trust Computation in the Internet of Things

    Get PDF
    Internet of Things defines a large number of diverse entities and services which interconnect with each other and individually or cooperatively operate depending on context, conditions and environments, produce a huge personal and sensitive data. In this scenario, the satisfaction of privacy, security and trust plays a critical role in the success of the Internet of Things. Trust here can be considered as a key property to establish trustworthy and seamless connectivity among entities and to guarantee secure services and applications. The aim of this study is to provide a survey on various trust computation strategies and identify future trends in the field. We discuss trust computation methods under several aspects and provide comparison of the approaches based on trust features, performance, advantages, weaknesses and limitations of each strategy. Finally the research discuss on the gap of the trust literature and raise some research directions in trust computation in the Internet of Things
    corecore