1,629 research outputs found

    Pseudo session-based recommendation with hierarchical embedding and session attributes

    Full text link
    Recently, electronic commerce (EC) websites have been unable to provide an identification number (user ID) for each transaction data entry because of privacy issues. Because most recommendation methods assume that all data are assigned a user ID, they cannot be applied to the data without user IDs. Recently, session-based recommendation (SBR) based on session information, which is short-term behavioral information of users, has been studied. A general SBR uses only information about the item of interest to make a recommendation (e.g., item ID for an EC site). Particularly in the case of EC sites, the data recorded include the name of the item being purchased, the price of the item, the category hierarchy, and the gender and region of the user. In this study, we define a pseudo--session for the purchase history data of an EC site without user IDs and session IDs. Finally, we propose an SBR with a co-guided heterogeneous hypergraph and globalgraph network plus, called CoHHGN+. The results show that our CoHHGN+ can recommend items with higher performance than other methods.Comment: 15 pages, 1 figures, 5 table

    Service sector reform: a roadmap for community and human services reform

    Get PDF
    This paper examines strategies to improve the way that government and community services work together to address the needs of vulnerable community members.Introduction In late 2012 I was appointed to lead the Service Sector Reform project. The goal was to explore how government and non-government service providers can work together to improve outcomes for Victorians. I was asked to lead a process that engaged all stakeholders in a discussion about community and human services and in particular, to examine how support for Victoria’s most vulnerable people could be delivered in a more integrated way.An intensive five-month consultation process took place between February and July 2013. During this period my project principal, Dr Bronte Adams, and I listened to the views of people in the community sector, public administration and the private sector. Consultation included public forums, individual meetings, focus groups and a submission process. We talked to ministers and departmental secretaries as well as frontline staff, case managers and community workers. We also heard from service users.This report is a summarised account of many hours of discussions and more than a hundred submissions. The report represents my findings, although it is clear it also seeks to capture the voice of the community

    Encouraging Social Innovation Through Capital: Using Technology to Address Barriers

    Get PDF
    Outlines how technology can help foster a robust capital market for public education innovation by improving content, linking technology with face-to-face networks, and streamlining transactions. Suggests steps for government, foundations, and developers

    Threats –Solutions in Cloud security

    Get PDF
    Distributed computing frameworks speak to a standout amongst the most complex processing frameworks as of now in presence. Current uses of Cloud include broad utilization of disseminated frameworks with shifting level of network and use. With a late concentrate on huge scale expansion of Cloud processing, personality administration in Cloud based frameworks is a basic issue for the maintainability of any Cloud-based administration. This zone has additionally gotten extensive consideration from the exploration group and also the IT business. Diverse calculations and methodology are utilized by the specialists. Still distributed computing security is in its center stage. A few IT organizations are concentrating on cloud security and cloud information security. This paper gives a thought regarding security dangers and arrangements

    The interface of EU and national tort law:Competition law

    Get PDF
    • …
    corecore