98,419 research outputs found

    Real-time Short Video Recommendation on Mobile Devices

    Full text link
    Short video applications have attracted billions of users in recent years, fulfilling their various needs with diverse content. Users usually watch short videos on many topics on mobile devices in a short period of time, and give explicit or implicit feedback very quickly to the short videos they watch. The recommender system needs to perceive users' preferences in real-time in order to satisfy their changing interests. Traditionally, recommender systems deployed at server side return a ranked list of videos for each request from client. Thus it cannot adjust the recommendation results according to the user's real-time feedback before the next request. Due to client-server transmitting latency, it is also unable to make immediate use of users' real-time feedback. However, as users continue to watch videos and feedback, the changing context leads the ranking of the server-side recommendation system inaccurate. In this paper, we propose to deploy a short video recommendation framework on mobile devices to solve these problems. Specifically, we design and deploy a tiny on-device ranking model to enable real-time re-ranking of server-side recommendation results. We improve its prediction accuracy by exploiting users' real-time feedback of watched videos and client-specific real-time features. With more accurate predictions, we further consider interactions among candidate videos, and propose a context-aware re-ranking method based on adaptive beam search. The framework has been deployed on Kuaishou, a billion-user scale short video application, and improved effective view, like and follow by 1.28%, 8.22% and 13.6% respectively.Comment: Accepted by CIKM 2022, 10 page

    Domain-Specific Modeling and Code Generation for Cross-Platform Multi-Device Mobile Apps

    Get PDF
    Nowadays, mobile devices constitute the most common computing device. This new computing model has brought intense competition among hardware and software providers who are continuously introducing increasingly powerful mobile devices and innovative OSs into the market. In consequence, cross-platform and multi-device development has become a priority for software companies that want to reach the widest possible audience. However, developing an application for several platforms implies high costs and technical complexity. Currently, there are several frameworks that allow cross-platform application development. However, these approaches still require manual programming. My research proposes to face the challenge of the mobile revolution by exploiting abstraction, modeling and code generation, in the spirit of the modern paradigm of Model Driven Engineering

    Digital Food Marketing to Children and Adolescents: Problematic Practices and Policy Interventions

    Get PDF
    Examines trends in digital marketing to youth that uses "immersive" techniques, social media, behavioral profiling, location targeting and mobile marketing, and neuroscience methods. Recommends principles for regulating inappropriate advertising to youth

    Supply chain transformation programme : prospectus

    Get PDF

    AndroShield:automated Android applications vulnerability detection, a hybrid static and dynamic analysis approach

    Get PDF
    The security of mobile applications has become a major research field which is associated with a lot of challenges. The high rate of developing mobile applications has resulted in less secure applications. This is due to what is called the “rush to release” as defined by Ponemon Institute. Security testing—which is considered one of the main phases of the development life cycle—is either not performed or given minimal time; hence, there is a need for security testing automation. One of the techniques used is Automated Vulnerability Detection. Vulnerability detection is one of the security tests that aims at pinpointing potential security leaks. Fixing those leaks results in protecting smart-phones and tablet mobile device users against attacks. This paper focuses on building a hybrid approach of static and dynamic analysis for detecting the vulnerabilities of Android applications. This approach is capsuled in a usable platform (web application) to make it easy to use for both public users and professional developers. Static analysis, on one hand, performs code analysis. It does not require running the application to detect vulnerabilities. Dynamic analysis, on the other hand, detects the vulnerabilities that are dependent on the run-time behaviour of the application and cannot be detected using static analysis. The model is evaluated against different applications with different security vulnerabilities. Compared with other detection platforms, our model detects information leaks as well as insecure network requests alongside other commonly detected flaws that harm users’ privacy. The code is available through a GitHub repository for public contribution

    Tragedy of the Regulatory Commons: LightSquared and the Missing Spectrum Rights

    Get PDF
    The endemic underuse of radio spectrum constitutes a tragedy of the regulatory commons. Like other common interest tragedies, the outcome results from a legal or market structure that prevents economic actors from executing socially efficient bargains. In wireless markets, innovative applications often provoke claims by incumbent radio users that the new traffic will interfere with existing services. Sometimes these concerns are mitigated via market transactions, a la “Coasian bargaining.” Other times, however, solutions cannot be found even when social gains dominate the cost of spillovers. In the recent “LightSquared debacle,” such spectrum allocation failure played out. GPS interests that access frequencies adjacent to the band hosting LightSquared’s new nationwide mobile network complained that the wireless entrant would harm the operation of locational devices. Based on these complaints, regulators then killed LightSquared’s planned 4G network. Conservative estimates placed the prospective 4G consumer gains at least an order of magnitude above GPS losses. “Win win” bargains were theoretically available, fixing GPS vulnerabilities while welcoming the highly valuable wireless innovation. Yet transaction costs—largely caused by policy choices to issue limited and highly fragmented spectrum usage rights (here in the GPS band)—proved prohibitive. This episode provides a template for understanding market and non-market failure in radio spectrum allocation
    • …
    corecore