28,188 research outputs found

    Personalized Ranking in eCommerce Search

    Full text link
    We address the problem of personalization in the context of eCommerce search. Specifically, we develop personalization ranking features that use in-session context to augment a generic ranker optimized for conversion and relevance. We use a combination of latent features learned from item co-clicks in historic sessions and content-based features that use item title and price. Personalization in search has been discussed extensively in the existing literature. The novelty of our work is combining and comparing content-based and content-agnostic features and showing that they complement each other to result in a significant improvement of the ranker. Moreover, our technique does not require an explicit re-ranking step, does not rely on learning user profiles from long term search behavior, and does not involve complex modeling of query-item-user features. Our approach captures item co-click propensity using lightweight item embeddings. We experimentally show that our technique significantly outperforms a generic ranker in terms of Mean Reciprocal Rank (MRR). We also provide anecdotal evidence for the semantic similarity captured by the item embeddings on the eBay search engine.Comment: Under Revie

    Why We Cannot (Yet) Ensure the Cybersecurity of Safety-Critical Systems

    Get PDF
    There is a growing threat to the cyber-security of safety-critical systems. The introduction of Commercial Off The Shelf (COTS) software, including Linux, specialist VOIP applications and Satellite Based Augmentation Systems across the aviation, maritime, rail and power-generation infrastructures has created common, vulnerabilities. In consequence, more people now possess the technical skills required to identify and exploit vulnerabilities in safety-critical systems. Arguably for the first time there is the potential for cross-modal attacks leading to future ‘cyber storms’. This situation is compounded by the failure of public-private partnerships to establish the cyber-security of safety critical applications. The fiscal crisis has prevented governments from attracting and retaining competent regulators at the intersection of safety and cyber-security. In particular, we argue that superficial similarities between safety and security have led to security policies that cannot be implemented in safety-critical systems. Existing office-based security standards, such as the ISO27k series, cannot easily be integrated with standards such as IEC61508 or ISO26262. Hybrid standards such as IEC 62443 lack credible validation. There is an urgent need to move beyond high-level policies and address the more detailed engineering challenges that threaten the cyber-security of safety-critical systems. In particular, we consider the ways in which cyber-security concerns undermine traditional forms of safety engineering, for example by invalidating conventional forms of risk assessment. We also summarise the ways in which safety concerns frustrate the deployment of conventional mechanisms for cyber-security, including intrusion detection systems

    Regional Initiatives in Support of Surveillance in East Africa: The East Africa Integrated Disease Surveillance Network (EAIDSNet) Experience.

    Get PDF
    The East African Integrated Disease Surveillance Network (EAIDSNet) was formed in response to a growing frequency of cross-border malaria outbreaks in the 1990s and a growing recognition that fragmented disease interventions, coupled with weak laboratory capacity, were making it difficult to respond in a timely manner to the outbreaks of malaria and other infectious diseases. The East Africa Community (EAC) partner states, with financial support from the Rockefeller Foundation, established EAIDSNet in 2000 to develop and strengthen the communication channels necessary for integrated cross-border disease surveillance and control efforts. The objective of this paper is to review the regional EAIDSNet initiative and highlight achievements and challenges in its implementation. Major accomplishments of EAIDSNet include influencing the establishment of a Department of Health within the EAC Secretariat to support a regional health agenda; successfully completing a regional field simulation exercise in pandemic influenza preparedness; and piloting a web-based portal for linking animal and human health disease surveillance. The strategic direction of EAIDSNet was shaped, in part, by lessons learned following a visit to the more established Mekong Basin Disease Surveillance (MBDS) regional network. Looking to the future, EAIDSNet is collaborating with the East, Central and Southern Africa Health Community (ECSA-HC), EAC partner states, and the World Health Organization to implement the World Bank-funded East Africa Public Health Laboratory Networking Project (EAPHLNP). The network has also begun lobbying East African countries for funding to support EAIDSNet activities

    Research identifiers: national approaches to ORCID and ISNI implementation

    Get PDF
    More and more countries are making collected efforts to provide ORCID identifiers for their researchers and encouraging implementation of ORCID iDs into the national and local research information infrastructure. In June 2015, Knowledge Exchange brought together representatives from its five member countries for a Knowledge Exchange Workshop on National approaches to ORCID and ISNI implementation. The aim of the workshop was to share national perspectives on ORCID and ISNI, including the challenges, solutions and lessons learned with regards to implementation of ORCID and ISNI on a national scale. Issues discussed included legal and regulatory challenges, authentication and integration and also outstanding issues of functionality, interoperability, policy and sustainability. This report gives an account of the meeting and presents some outstanding challenges, some possible solutions and begins to take stock and look ahead; what lessons have we learned that should we take into account when moving on to organisational and other identifiers

    Knowing Your Population: Privacy-Sensitive Mining of Massive Data

    Full text link
    Location and mobility patterns of individuals are important to environmental planning, societal resilience, public health, and a host of commercial applications. Mining telecommunication traffic and transactions data for such purposes is controversial, in particular raising issues of privacy. However, our hypothesis is that privacy-sensitive uses are possible and often beneficial enough to warrant considerable research and development efforts. Our work contends that peoples behavior can yield patterns of both significant commercial, and research, value. For such purposes, methods and algorithms for mining telecommunication data to extract commonly used routes and locations, articulated through time-geographical constructs, are described in a case study within the area of transportation planning and analysis. From the outset, these were designed to balance the privacy of subscribers and the added value of mobility patterns derived from their mobile communication traffic and transactions data. Our work directly contrasts the current, commonly held notion that value can only be added to services by directly monitoring the behavior of individuals, such as in current attempts at location-based services. We position our work within relevant legal frameworks for privacy and data protection, and show that our methods comply with such requirements and also follow best-practice

    Investing in food security? Philanthrocapitalism, biotechnology and development

    Get PDF
    This paper traces the evolution of philanthropic involvement in developing country agriculture from the ‘scientific philanthropy’ of the Rockefeller Foundation during and after the Green Revolution era to the ‘philathrocapitalism’ of the Bill and Melinda Gates Foundation, by examining two cases of ‘pro-poor’ agricultural biotechnology research: pro-Vitamin A-enriched ‘Golden Rice’ and drought tolerant maize. In each case, novel institutions developed for technology transfer have created conditions conducive to future capitalist accumulation in ways that are not immediately obvious. These initiatives can be understood as institutional experiments that are shifting debates about the governance and regulation of genetically modified (‘GM’) crops. Meanwhile an emphasis on silver bullet solutions and institutions that ‘connect to the market’ diverts attention from more context-responsive approaches. This trend is likely to intensify with the announcement at the recent G8 summit backing a ‘New Alliance for Food Security and Nutrition’ in which agri-business corporations are to play a key role

    STEPS Centre research: our approach to impact

    Get PDF
    The ‘impact’ of research has seen a dramatic rise up the UK’s policy agenda in recent years. But what does ‘impact’ really mean? How do researchers and others respond to the new ‘impact agenda’ and how might we best plan, monitor and report on impact? This working paper attempts to provide answers to some of these questions by reviewing various understandings of ‘impact’ and describing the approach used by the ESRC STEPS Centre in its second five-year phase of funding. In particular, we draw on our experience of adapting and employing a down-scaled version of ‘participatory impact pathways analysis’ (PIPA) and reflect on its utility and potential as a tool for planning relatively small-scale social science/ interdisciplinary research projects conducted with partners in developing countries. In using PIPA, the STEPS Centre has adapted the idea of ‘impact pathways’ in line with its broader ‘pathways approach’, which focusses on complex and dynamic interactions between knowledge, politics and ‘social, technological and environmental pathways to sustainability’. In this way, PIPA has been useful in articulating and exploring the potential impact of STEPS Centre projects: it has helped to map out the networks known to the researchers, appreciate different perspectives held by the team members and generate an understanding of the narratives, networks and policy processes under study. Although the possibility for detailed ex ante prediction of impact pathways is limited, using PIPA has helped teams to be ready to maximise communication and engagement opportunities, and to link research across different STEPS Centre projects and beyond. The working paper also describes how PIPA may be used iteratively in a way that enables reflexive learning amongst research teams. Lastly, we speculate on the ways in which PIPA may be further developed and used in ex post impact monitoring and evaluation into the future
    • 

    corecore