28,188 research outputs found
Personalized Ranking in eCommerce Search
We address the problem of personalization in the context of eCommerce search.
Specifically, we develop personalization ranking features that use in-session
context to augment a generic ranker optimized for conversion and relevance. We
use a combination of latent features learned from item co-clicks in historic
sessions and content-based features that use item title and price.
Personalization in search has been discussed extensively in the existing
literature. The novelty of our work is combining and comparing content-based
and content-agnostic features and showing that they complement each other to
result in a significant improvement of the ranker. Moreover, our technique does
not require an explicit re-ranking step, does not rely on learning user
profiles from long term search behavior, and does not involve complex modeling
of query-item-user features. Our approach captures item co-click propensity
using lightweight item embeddings. We experimentally show that our technique
significantly outperforms a generic ranker in terms of Mean Reciprocal Rank
(MRR). We also provide anecdotal evidence for the semantic similarity captured
by the item embeddings on the eBay search engine.Comment: Under Revie
Why We Cannot (Yet) Ensure the Cybersecurity of Safety-Critical Systems
There is a growing threat to the cyber-security of safety-critical systems.
The introduction of Commercial Off The Shelf (COTS) software, including
Linux, specialist VOIP applications and Satellite Based Augmentation Systems
across the aviation, maritime, rail and power-generation infrastructures has created
common, vulnerabilities. In consequence, more people now possess the technical
skills required to identify and exploit vulnerabilities in safety-critical systems.
Arguably for the first time there is the potential for cross-modal attacks
leading to future âcyber stormsâ. This situation is compounded by the failure of
public-private partnerships to establish the cyber-security of safety critical applications.
The fiscal crisis has prevented governments from attracting and retaining
competent regulators at the intersection of safety and cyber-security. In particular,
we argue that superficial similarities between safety and security have led
to security policies that cannot be implemented in safety-critical systems. Existing
office-based security standards, such as the ISO27k series, cannot easily be integrated
with standards such as IEC61508 or ISO26262. Hybrid standards such as
IEC 62443 lack credible validation. There is an urgent need to move beyond
high-level policies and address the more detailed engineering challenges that
threaten the cyber-security of safety-critical systems. In particular, we consider
the ways in which cyber-security concerns undermine traditional forms of safety
engineering, for example by invalidating conventional forms of risk assessment.
We also summarise the ways in which safety concerns frustrate the deployment of
conventional mechanisms for cyber-security, including intrusion detection systems
Regional Initiatives in Support of Surveillance in East Africa: The East Africa Integrated Disease Surveillance Network (EAIDSNet) Experience.
The East African Integrated Disease Surveillance Network (EAIDSNet) was formed in response to a growing frequency of cross-border malaria outbreaks in the 1990s and a growing recognition that fragmented disease interventions, coupled with weak laboratory capacity, were making it difficult to respond in a timely manner to the outbreaks of malaria and other infectious diseases. The East Africa Community (EAC) partner states, with financial support from the Rockefeller Foundation, established EAIDSNet in 2000 to develop and strengthen the communication channels necessary for integrated cross-border disease surveillance and control efforts. The objective of this paper is to review the regional EAIDSNet initiative and highlight achievements and challenges in its implementation. Major accomplishments of EAIDSNet include influencing the establishment of a Department of Health within the EAC Secretariat to support a regional health agenda; successfully completing a regional field simulation exercise in pandemic influenza preparedness; and piloting a web-based portal for linking animal and human health disease surveillance. The strategic direction of EAIDSNet was shaped, in part, by lessons learned following a visit to the more established Mekong Basin Disease Surveillance (MBDS) regional network. Looking to the future, EAIDSNet is collaborating with the East, Central and Southern Africa Health Community (ECSA-HC), EAC partner states, and the World Health Organization to implement the World Bank-funded East Africa Public Health Laboratory Networking Project (EAPHLNP). The network has also begun lobbying East African countries for funding to support EAIDSNet activities
Research identifiers: national approaches to ORCID and ISNI implementation
More and more countries are making collected efforts to provide ORCID identifiers for their researchers and encouraging implementation of ORCID iDs into the national and local research information infrastructure.
In June 2015, Knowledge Exchange brought together representatives from its five member countries for a Knowledge Exchange Workshop on National approaches to ORCID and ISNI implementation. The aim of the workshop was to share national perspectives on ORCID and ISNI, including the challenges, solutions and lessons learned with regards to implementation of ORCID and ISNI on a national scale. Issues discussed included legal and regulatory challenges, authentication and integration and also outstanding issues of functionality, interoperability, policy and sustainability.
This report gives an account of the meeting and presents some outstanding challenges, some possible solutions and begins to take stock and look ahead; what lessons have we learned that should we take into account when moving on to organisational and other identifiers
Knowing Your Population: Privacy-Sensitive Mining of Massive Data
Location and mobility patterns of individuals are important to environmental
planning, societal resilience, public health, and a host of commercial
applications. Mining telecommunication traffic and transactions data for such
purposes is controversial, in particular raising issues of privacy. However,
our hypothesis is that privacy-sensitive uses are possible and often beneficial
enough to warrant considerable research and development efforts. Our work
contends that peoples behavior can yield patterns of both significant
commercial, and research, value. For such purposes, methods and algorithms for
mining telecommunication data to extract commonly used routes and locations,
articulated through time-geographical constructs, are described in a case study
within the area of transportation planning and analysis. From the outset, these
were designed to balance the privacy of subscribers and the added value of
mobility patterns derived from their mobile communication traffic and
transactions data. Our work directly contrasts the current, commonly held
notion that value can only be added to services by directly monitoring the
behavior of individuals, such as in current attempts at location-based
services. We position our work within relevant legal frameworks for privacy and
data protection, and show that our methods comply with such requirements and
also follow best-practice
Investing in food security? Philanthrocapitalism, biotechnology and development
This paper traces the evolution of philanthropic involvement in developing country agriculture from the âscientific philanthropyâ of the Rockefeller Foundation during and
after the Green Revolution era to the âphilathrocapitalismâ of the Bill and Melinda Gates Foundation, by examining two cases of âpro-poorâ agricultural biotechnology research:
pro-Vitamin A-enriched âGolden Riceâ and drought tolerant maize. In each case, novel institutions developed for technology transfer have created conditions conducive to
future capitalist accumulation in ways that are not immediately obvious. These initiatives can be understood as institutional experiments that are shifting debates about
the governance and regulation of genetically modified (âGMâ) crops. Meanwhile an emphasis on silver bullet solutions and institutions that âconnect to the marketâ diverts attention from more context-responsive approaches. This trend is likely to intensify with the announcement at the recent G8 summit backing a âNew Alliance for Food Security and Nutritionâ in which agri-business corporations are to play a key role
STEPS Centre research: our approach to impact
The âimpactâ of research has seen a dramatic rise up the UKâs policy agenda in recent years. But what does âimpactâ really mean? How do researchers and others respond to the new âimpact agendaâ and how might we best plan, monitor and report on impact? This working paper attempts to provide answers to some of these questions by reviewing various understandings of âimpactâ and describing the approach used by the ESRC STEPS Centre in its second five-year phase of funding. In particular, we draw on our experience of adapting and employing a down-scaled version of âparticipatory impact pathways analysisâ (PIPA) and reflect on its utility and potential as a tool for planning relatively small-scale social science/ interdisciplinary research projects conducted with partners in developing countries. In using PIPA, the STEPS Centre has adapted the idea of âimpact pathwaysâ in line with its broader âpathways approachâ, which focusses on complex and dynamic interactions between knowledge, politics and âsocial, technological and environmental pathways to sustainabilityâ. In this way, PIPA has been useful in articulating and exploring the potential impact of STEPS Centre projects: it has helped to map out the networks known to the researchers, appreciate different perspectives held by the team members and generate an understanding of the narratives, networks and policy processes under study. Although the possibility for detailed ex ante prediction of impact pathways is limited, using PIPA has helped teams to be ready to maximise communication and engagement opportunities, and to link research across different STEPS Centre projects and beyond. The working paper also describes how PIPA may be used iteratively in a way that enables reflexive learning amongst research teams. Lastly, we speculate on the ways in which PIPA may be further developed and used in ex post impact monitoring and evaluation into the future
- âŠ