1,629 research outputs found
Pseudo session-based recommendation with hierarchical embedding and session attributes
Recently, electronic commerce (EC) websites have been unable to provide an
identification number (user ID) for each transaction data entry because of
privacy issues. Because most recommendation methods assume that all data are
assigned a user ID, they cannot be applied to the data without user IDs.
Recently, session-based recommendation (SBR) based on session information,
which is short-term behavioral information of users, has been studied. A
general SBR uses only information about the item of interest to make a
recommendation (e.g., item ID for an EC site). Particularly in the case of EC
sites, the data recorded include the name of the item being purchased, the
price of the item, the category hierarchy, and the gender and region of the
user. In this study, we define a pseudo--session for the purchase history data
of an EC site without user IDs and session IDs. Finally, we propose an SBR with
a co-guided heterogeneous hypergraph and globalgraph network plus, called
CoHHGN+. The results show that our CoHHGN+ can recommend items with higher
performance than other methods.Comment: 15 pages, 1 figures, 5 table
Service sector reform: a roadmap for community and human services reform
This paper examines strategies to improve the way that government and community services work together to address the needs of vulnerable community members.Introduction In late 2012 I was appointed to lead the Service Sector Reform project. The goal was to explore how government and non-government service providers can work together to improve outcomes for Victorians. I was asked to lead a process that engaged all stakeholders in a discussion about community and human services and in particular, to examine how support for Victoria’s most vulnerable people could be delivered in a more integrated way.An intensive five-month consultation process took place between February and July 2013. During this period my project principal, Dr Bronte Adams, and I listened to the views of people in the community sector, public administration and the private sector. Consultation included public forums, individual meetings, focus groups and a submission process. We talked to ministers and departmental secretaries as well as frontline staff, case managers and community workers. We also heard from service users.This report is a summarised account of many hours of discussions and more than a hundred submissions. The report represents my findings, although it is clear it also seeks to capture the voice of the community
Encouraging Social Innovation Through Capital: Using Technology to Address Barriers
Outlines how technology can help foster a robust capital market for public education innovation by improving content, linking technology with face-to-face networks, and streamlining transactions. Suggests steps for government, foundations, and developers
Threats –Solutions in Cloud security
Distributed computing frameworks speak to a standout amongst the most complex processing frameworks as of now in presence. Current uses of Cloud include broad utilization of disseminated frameworks with shifting level of network and use. With a late concentrate on huge scale expansion of Cloud processing, personality administration in Cloud based frameworks is a basic issue for the maintainability of any Cloud-based administration. This zone has additionally gotten extensive consideration from the exploration group and also the IT business. Diverse calculations and methodology are utilized by the specialists. Still distributed computing security is in its center stage. A few IT organizations are concentrating on cloud security and cloud information security. This paper gives a thought regarding security dangers and arrangements
- …