0000000000049518

AUTHOR

Jari Veijalainen

showing 62 related works from this author

Using UDDI for Publishing Metadata of the Semantic Web

2006

Although UDDI does not provide support for semantic search, retrieval and storage, it is already accepted as an industrial standard and a huge number of services already store their service specifications in UDDI. Objective of this paper is to analyze possibilities and ways to use UDDI registry to allow utilization of meta-data encoded according to Semantic Web standards for semantic-based description, discovery and integration of web resources in the context of needs of two research projects: “Adaptive Services Grid” and “SmartResource”. We present an approach of mapping RDFS upper concepts to UDDI data model using tModel structure, which makes possible to store semantically annotated reso…

Information retrievalWS-I Basic Profilebusiness.industryComputer scienceInformationSystems_INFORMATIONSTORAGEANDRETRIEVALSemantic searchcomputer.software_genreSocial Semantic WebWorld Wide WebMetadataSemantic gridSemantic Web StackWeb servicebusinessSemantic Webcomputer
researchProduct

Modeling Static Aspects of Mobile Electronic Commerce Environments

2011

Mobile phones and other small and powerful portable devices have revolutionized personal communication and affected the lifestyles of the people in the industrialized world. Following credible estimates, in a few years there will be one billion of such portable devices. An emerging trend is the electronic commerce performed using mobile terminals, often called mobile commerce. Mobile commerce environments are characterized by high complexity, including myriads of technical and organizational aspects. This property makes it difficult to distinguish the more fundamental issues, structures, and concepts in mobile commerce from the hype. To capture the fundamental aspects of mobile commerce env…

World Wide WebKnowledge managementbusiness.industryMobile commerceInformation technologyBusiness modelbusinessUbiquitous commerce
researchProduct

Content quality assessment and acceptance testing in location‐based services

2006

In this paper, we develop and evaluate an approach to assessing the content quality in a location‐based service (LBS). The proposed approach, instead of assessing the quality in absolute terms such as completeness or accuracy, measures the effect that the imperfection of the content is having on the reliability of that specific LBS. We apply the basic ideas from Software Reliability Engineering (SRE), but develop a modification of SRE, 2‐Branch, in order to separate content quality from other factors, such as positioning imprecision, and to reduce the measurement error. In our experimental study, we first compare 2‐Branch to the standard SRE, after which we experimentally analyze some prope…

General Computer ScienceComputer sciencemedia_common.quotation_subjectContext (language use)computer.software_genreSoftware qualityOracleTheoretical Computer ScienceReliability engineeringAcceptance testingLocation-based serviceQuality (business)Data miningcomputerReliability (statistics)media_commonStatistical hypothesis testingInternational Journal of Pervasive Computing and Communications
researchProduct

Invariant aspects in M-commerce environments

2005

Mobile phones and other small and powerful portable devices have revolutionized personal communication and affected the lifestyles of the people in the industrialized world. Following credible estimates, in a few years there will over two - billions of such portable devices in use. An emerging trend is the electronic commerce performed using mobile terminals over wireless networks, often called mobile commerce or M-commerce. Mobile commerce environments are characterized by high complexity, including myriads of technical and organizational aspects. This property makes it difficult to distinguish the more fundamental issues, structures, and concepts in mobile commerce from the hype. To captu…

Standardizationbusiness.industryComputer scienceWireless networkMobile commerceMobile computingBusiness modelHigh complexitymedia_common.cataloged_instanceInvariant (mathematics)European unionTelecommunicationsbusinessmedia_commonProceedings of the 6th international conference on Mobile data management
researchProduct

Mobile Electronic Commerce: Emerging Issues

2000

There are many definitions for Mobile Electronic Commerce (M-Commerce). We define M-Commerce as any type of transaction of an economic value having at least at one end a mobile terminal and thus using the mobile telecommunications network. The Wireless Application Protocol (WAP) plays an important role in m-commerce by optimizing Internet standards for the constraints of the wireless environment and thus bridging the gap between Internet and mobile world. Mobile Network Operators can play a major role in m-commerce by being strategically positioned between customers and content/service providers. In this paper we investigate the roles the operator can play in m-commerce and discuss respecti…

business.industryComputer sciencecomputer.internet_protocolMobile computingMobile WebMobile business developmentService providerComputer securitycomputer.software_genreInternet StandardTelecommunications networkPublic land mobile networkMobile paymentCellular networkMobile searchWirelessWireless Application ProtocolThe InternetTelephonyMobile telephonybusinessTelecommunicationscomputerMobile network operator
researchProduct

Volkswagen Emission Crisis : Managing Stakeholder Relations on the Web

2016

Organizations establish their own profiles at social media sites to publish pertinent information to customers and other stakeholders. During a long and severe crisis, multiple issues may emerge in media interaction. Positive responses and prompt interaction from the official account of e.g. a car manufacturer creates clarity and reduces anxiety among stakeholders. This research targets the Volkswagen 2015 emission scandal that became public on Sept. 18, 2015. We report its main phases over time based on public web information. To better understand the online interaction and reactions of the company, we scrutinized what information was published on VW’s official web sites, Facebook, and Twi…

ta113Knowledge managementComputer sciencebusiness.industrystakeholder theorysocial media05 social sciencesStakeholder relationssosiaalinen mediareputationGMemission scandalissuesVolkswagencrisis0502 economics and businessmaine050211 marketingimageta518business050203 business & management
researchProduct

Mobile Wireless Interfaces: In Search for the Limits

2002

With the proliferation of 2G and 3G Telecom and other wireless networks hundred of millions of users will be able to access wireless services with their terminals in only a few years. In this paper we discuss the possibilities and limitations of existing and emerging mobile technologies and methodologies for porting information and functionality from traditional PCs to mobile devices and vice versa. We argue that in order to be able to properly port things between devices an equivalence concept for user interfaces is required.

EngineeringWi-Fi arrayMobile identification numbercomputer.internet_protocolbusiness.industryMobile broadbandMobile computingMobile WebWireless Application ProtocolMobile searchMobile technologybusinesscomputerComputer network
researchProduct

Electronic Commerce Transactions in a Mobile Computing Environment

2002

Internet E-commerce has been flourishing for the last few years, especially with the advent of World Wide Web. Mobile Electronic Commerce (MEC) has started recently to appear in the scene. It exploits the advantages of Internet, mobile computing and mobile communications in order to provide a large number of advanced services to mobile users. The potentials of MEC are enormous while related technical, business and legal issues become more complicated. The goal of this chapter is to present and discuss problems and identify requirements associated with the trading and billing of tangible and intangible goods in a mobile environment where mobile handheld devices are used for conducting the tr…

World Wide WebPublic land mobile networkEngineeringbusiness.industryMobile commerceMobile paymentMobile computingMobile searchMobile technologyMobile business developmentMobile Webbusiness
researchProduct

The Spanning Tree based Approach for Solving the Shortest Path Problem in Social Graphs

2016

Nowadays there are many social media sites with a very large number of users. Users of social media sites and relationships between them can be modelled as a graph. Such graphs can be analysed using methods from social network analysis (SNA). Many measures used in SNA rely on computation of shortest paths between nodes of a graph. There are many shortest path algorithms, but the majority of them suits only for small graphs, or work only with road network graphs that are fundamentally different from social graphs. This paper describes an efficient shortest path searching algorithm suitable for large social graphs. The described algorithm extends the Atlas algorithm. The proposed algorithm so…

Discrete mathematicsta113Mathematical optimizationSpanning treesocial network analysisComputer scienceAtlas algorithm020206 networking & telecommunications02 engineering and technologyLongest path problemverkostoanalyysiWidest path problemOdnoklassnikiEuclidean shortest pathShortest Path Faster Algorithmsocial graph020204 information systemsShortest path problem0202 electrical engineering electronic engineering information engineeringK shortest path routingCanadian traveller problemshortest path problemMathematicsofComputing_DISCRETEMATHEMATICS
researchProduct

Analysing the presence of school-shooting related communities at social media sites

2010

Surprisingly cruel mass murders and attacks have been witnessed in the educational institutions of the Western world since the 1970s. These are often referred to as 'school shootings'. There have been over 300 known incidents around the world and the number is growing. Social network sites (SNSs) have enabled the perpetrators to express their views and intentions. Our result is that since about 2005, all major school shooters have had a presence in SNS and some have left traces that would have made possible to evaluate their intentions to carry out a rampage. A further hypothesis is that future school shooters will behave in a similar manner and would thus be traceable in the digital sphere…

GeographySocial media miningSocial networkbusiness.industryOntologyWestern worldSocial mediaCriminologyMultimedia data miningRelation (history of concept)businessSocial psychologyInternational Journal of Multimedia Intelligence and Security
researchProduct

Challenges of Serendipity in Recommender Systems

2016

Most recommender systems suggest items similar to a user profile, which results in boring recommendations limited by user preferences indicated in the system. To overcome this problem, recommender systems should suggest serendipitous items, which is a challenging task, as it is unclear what makes items serendipitous to a user and how to measure serendipity. The concept is difficult to investigate, as serendipity includes an emotional dimension and serendipitous encounters are very rare. In this paper, we discuss mentioned challenges, review definitions of serendipity and serendipity-oriented evaluation metrics. The goal of the paper is to guide and inspire future efforts on serendipity in r…

haasteet (ongelmat)ta113Computer scienceSerendipitysuosittelujärjestelmätserendipitychallenges02 engineering and technologyRecommender systemunexpectednessnoveltyevaluation metricsWorld Wide Webrelevanssi020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingrelevancerecommender systemsProceedings of the 12th International Conference on Web Information Systems and Technologies
researchProduct

Insights from Operator Interviews

2009

The previous section analysed use of software to improve productivity from a general perspective and provided a quick statistical analysis of software usage to the performance of a CSP. Before conducting elaborated statistical analysis on CSP software usage, we need to gain some insight into operator business and understanding on how operators see the role of software in their business as well as how they acquire software.

Software usageOperator (computer programming)SoftwareApplication service provisionbusiness.industryComputer scienceSoftware developmentStatistical analysisbusinessSoftware engineeringProductivity
researchProduct

Decomposing issue patterns in crisis communication: the case of the lost airliner

2018

This research explores the relation between a crisis and public discussion on related issues. In organisational crisis communication, a singleissue strategy is often proposed. Such a strategy, however, may not be adequate in more complex crises where the crisis lifecycle is likely to encompass shorter lifecycles of issues that generate media attention. Decomposing the online crisis debate into a pattern of issues supports understanding of public perceptions, and hence of crisis response and communication. This is investigated through an analysis of Facebook posts prompted by the loss of Malaysia Airlines flight MH370 in 2014. The analysis shows that during the life of the crisis a variety o…

social mediamedia_common.quotation_subjectorganisational communicationPublic debatesosiaalinen media050801 communication & media studiesCompassionkriisiviestintäyhteisöviestintä0508 media and communicationsPolitical sciencePerception0502 economics and businessSocial mediata518issues managementcrisis communicationmedia_commonCrisis communicationEmergency managementbusiness.industry05 social sciencesPublic relationsVariety (cybernetics)issue arenasEmergency MedicineOrganizational communicationbusiness050203 business & managementInternational Journal of Emergency Management
researchProduct

Detection of Fake Profiles in Social Media - Literature Review

2017

ta113identiteettiväärennöksetfalse identitiessocial network analysisverkkoprofiilitComputer sciencebusiness.industrysocial mediaInternet privacysosiaalinen mediafake profilesväärennöksetidentiteettiSocial mediata518businessProceedings of the 13th International Conference on Web Information Systems and Technologies
researchProduct

Revealing Fake Profiles in Social Networks by Longitudinal Data Analysis

2017

ta113longitudinal dataidentiteettiväärennöksetsocial network analysisComputer scienceLongitudinal dataverkkoprofiilitsosiaalinen mediaData scienceanomaly detectiongraph miningväärennöksetidentiteettisuspicious behaviour
researchProduct

Mobile Ontologies

2008

The number of mobile subscribers in the world is soon reaching the three billion mark. According to the newest estimates, majority of the subscribers are already in the developing countries, whereas the number of subscribers in the industrialized countries is about to stagnate around one billion. Because especially in the developing countries the only access to Internet are mobile devices, developing high quality services based on them grows in importance. Ontologies are an important ingredient towards more complicated mobile services and wider usage of mobile terminals. In this article, we first discuss ontology and epistemology concepts in general. After that, we review ontologies in the …

Computer Networks and Communicationsbusiness.industryComputer scienceOntology-based data integrationProcess ontologyMobile business developmentOntology (information science)Domain (software engineering)World Wide WebUpper ontologyThe InternetbusinessMobile deviceInformation SystemsInternational Journal on Semantic Web and Information Systems
researchProduct

How does serendipity affect diversity in recommender systems? A serendipity-oriented greedy algorithm

2018

Most recommender systems suggest items that are popular among all users and similar to items a user usually consumes. As a result, the user receives recommendations that she/he is already familiar with or would find anyway, leading to low satisfaction. To overcome this problem, a recommender system should suggest novel, relevant and unexpected i.e., serendipitous items. In this paper, we propose a serendipity-oriented, reranking algorithm called a serendipity-oriented greedy (SOG) algorithm, which improves serendipity of recommendations through feature diversification and helps overcome the overspecialization problem. To evaluate our algorithm, we employed the only publicly available datase…

Computer science02 engineering and technologyRecommender systemDiversification (marketing strategy)Machine learningcomputer.software_genreTheoretical Computer SciencenoveltySingular value decompositionalgoritmit0202 electrical engineering electronic engineering information engineeringFeature (machine learning)serendipity-2018Greedy algorithmlearning to rankNumerical AnalysisSerendipitybusiness.industrysuosittelujärjestelmät020206 networking & telecommunicationsserendipityPopularityunexpectednessComputer Science ApplicationsComputational MathematicsComputational Theory and MathematicsRanking020201 artificial intelligence & image processingArtificial intelligencebusinesscomputerarviointiSoftware
researchProduct

Transactions in Mobile Electronic Commerce

2000

With the development of global networking, invention of WWW, and proliferation of Internet-enabled computer hardware and software into homes and pockets, a huge customer base has been created for electronic commerce. It is rapidly expanding in USA and Europe and Japan are following the trend. So far, the development of E-commerce has happened in a rather unregulated way especially in USA, whereas in Europe the European Commission has been developing a regulatory basis mainly in form of directives. Currently (12/1999) they have not yet all been accepted and a major restructuring of the regulatory framework has also been planned. Another technological development is the rapid growth of mobile…

Credit cardAtomicityCustomer baseTransactional leadershipTransaction processingMobile computingInformation systemBusinessComputer securitycomputer.software_genrecomputerAuthentication (law)
researchProduct

Listwise Collaborative Filtering

2015

Recently, ranking-oriented collaborative filtering (CF) algorithms have achieved great success in recommender systems. They obtained state-of-the-art performances by estimating a preference ranking of items for each user rather than estimating the absolute ratings on unrated items (as conventional rating-oriented CF algorithms do). In this paper, we propose a new ranking-oriented CF algorithm, called ListCF. Following the memory-based CF framework, ListCF directly predicts a total order of items for each user based on similar users' probability distributions over permutations of the items, and thus differs from previous ranking-oriented memory-based CF algorithms that focus on predicting th…

ta113business.industryComputer scienceRecommender systemMachine learningcomputer.software_genreRankingcollaborative filteringBenchmark (computing)Collaborative filteringProbability distributionPairwise comparisonData miningArtificial intelligencerecommender systemsbusinessFocus (optics)computerranking-oriented collaborative filtering
researchProduct

User Influence and Follower Metrics in a Large Twitter Dataset

2015

World Wide WebComputer scienceProceedings of the 11th International Conference on Web Information Systems and Technologies
researchProduct

A modelling framework for social media monitoring

2013

This paper describes a hierarchical, three-level modelling framework for monitoring social media. Immediate social reality is modelled through the first level of the models. They represent various virtual communities at social media sites and adhere to the social world models of the sites, i.e., the "site ontologies". The second-level model is a temporal multirelational graph that captures the static and dynamic properties of the first-level models from the perspective of the monitoring site. The third-level model consists of a temporal relational database scheme that models the temporal multirelational graph within the database. The models are specified and instantiated at the monitoring s…

ta113Graph databaseComputer Networks and Communicationsbusiness.industryComputer scienceRelational databaseSocial realitySchematiccomputer.software_genreTemporal databaseHardware and ArchitectureGraph (abstract data type)The InternetSocial mediaData miningbusinesscomputerInformation SystemsInternational Journal of Web Engineering and Technology
researchProduct

E-Commerce Transactions

2017

Commercebusiness.industryBusinessE-commerce
researchProduct

Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 …

2002

The recent NSF Workshop on Infrastructure for Mobile and Wireless Systems, held on Oct. 15, 2001 in Phoenix had a goal of defining and establishing a common infrastructure for the discipline of mobile wireless networking. This consensus-based paper is the outcome of that workshop. The paper provides a foundation for implementation, standardization, and further research and discussion on the issues of what should constitute such an infrastructure. Workshop participants came from many different wireless communities, including those of communications, operating systems, core networking, mobility, databases, and middleware. The workshop presented various research directions in the field and inc…

Public land mobile networkWireless site surveyWi-Fi arrayComputer sciencebusiness.industryMobile broadbandMobile computingMobile technologyMobile WebTelecommunicationsbusinessMunicipal wireless networkComputer network
researchProduct

Samsung and Volkswagen Crisis Communication in Facebook and Twitter : A Comparative Study

2017

Since September 2015 at least two major crises have emerged where major industrial companies producing consumer products have been involved. In September 2015 diesel cars manufactured by Volkswagen turned out to be equipped with cheating software that caused NO2 and other emission values to be reduced to acceptable levels while tested from the real, unacceptable values in normal use. In August 2016 reports began to appear that the battery of a new smart phone produced by Samsung, Galaxy Note7, could begin to burn, or even explode, while the device was on. In Nov. 2016 also 34 washing machine models were reported to have caused damages due to disintegration. In all cases, the companies have …

kriisitSamsungFacebookComputer scienceInternet privacyTwittercrisis communication strategiessosiaalinen media050801 communication & media studiespesukoneetSamsung Galaxy Note 7kriisiviestintäVolkswagen0508 media and communications0502 economics and businessta518crisis communicationCrisis communicationviestintäta113emission crisisbusiness.industrywashing machines05 social sciencescrisisSCCTsentiment analysisbusiness050203 business & management
researchProduct

Tracing Potential School Shooters in the Digital Sphere

2010

There are over 300 known school shooting cases in the world and over ten known cases where the perpetrator(s) have been prohibited to perform the attack at the last moment or earlier. Interesting from our point of view is that in many cases the perpetrators have expressed their views in social media or on their web page well in advance, and often also left suicide messages in blogs and other forums before their attack, along the planned date and place. This has become more common towards the end of this decennium. In some cases this has made it possible to prevent the attack. In this paper we will look at the possibilities to find commonalities of the perpetrators, beyond the fact that they…

World Wide WebSocial networkPoint (typography)business.industryComputer scienceOrder (business)Internet privacyWeb pageSocial mediaTracingMultimedia data miningbusiness
researchProduct

An integrated identity verification system for mobile terminals

2005

PurposeTo report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and user‐friendliness.Design/methodology/approachThe reported research corresponds to the building process in the design science research paradigm. The requirements to an identity verification system are defined and used in the selection of architecture components. Furthermore, various issues affecting the suitability of component distribution between a terminal and a remote server are considered.FindingsIn order to meet the stated requirements, in the proposed architecture static and dynamic identity verification is combine…

High-level verificationFunctional verificationComputer sciencebusiness.industryRuntime verificationLibrary and Information SciencesManagement Science and Operations ResearchManagement Information SystemsIntelligent verificationEmbedded systemSystems architectureIdentity (object-oriented programming)VerificationBusiness and International ManagementbusinessSoftware verificationInformation Management & Computer Security
researchProduct

Online Stakeholder Interaction of Some Airlines in the Light of Situational Crisis Communication Theory

2016

Part 2: Digital Marketing and Customer Relationship Management; International audience; The purpose of this paper is to explore the participation of main actors in Facebook. The engagement shows different degrees of participation that directly affect the brand image and reputation. This research applies Situational Crisis Communication Theory (SCCT) to interaction in the social media. It provides possibilities for decision makers to monitor diverse messages online, understand stakeholder concerns and reply to them adequately, which is especially important in crisis situations. Seven airline organizations were selected for a comparative analysis concerning their online discussions. The verif…

Facebookmedia_common.quotation_subjectTwitter050801 communication & media studiesSituational crisis communication theoryAffect (psychology)Sentiment analysis[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0508 media and communications0502 economics and businessStakeholder theory[INFO]Computer Science [cs]Social mediaStakeholder theorymedia_commonbusiness.industry05 social sciencesSentiment analysisStakeholderAirlinesPublic relationsSituational Crisis Communication TheoryCategorization050211 marketingbusinessReputation
researchProduct

A survey of serendipity in recommender systems

2016

We summarize most efforts on serendipity in recommender systems.We compare definitions of serendipity in recommender systems.We classify the state-of-the-art serendipity-oriented recommendation algorithms.We review methods to assess serendipity in recommender systems.We provide the future directions of serendipity in recommender systems. Recommender systems use past behaviors of users to suggest items. Most tend to offer items similar to the items that a target user has indicated as interesting. As a result, users become bored with obvious suggestions that they might have already discovered. To improve user satisfaction, recommender systems should offer serendipitous suggestions: items not …

Measure (data warehouse)Information Systems and ManagementInformation retrievalComputer scienceSerendipityNovelty02 engineering and technologyRecommender systemManagement Information SystemsWorld Wide WebArtificial Intelligence020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingMetric (unit)SoftwareKnowledge-Based Systems
researchProduct

Exploring social media network landscape of post-Soviet space

2019

The “post-Soviet space” consists of countries with a substantial fraction of the world’s population; however, unlike many other regions, its social media network landscape is still somewhat under-explored. This paper aims at filling this gap. To this purpose, we use anonymized data on user friendships at VK.com (also known as VKontakte and, informally, as “Russian Facebook”), which is the largest and most popular social media portal in the post-Soviet space with hundreds of millions of user accounts. Using the VK network snapshots from October 2015 to December 2016, we conduct a “multiscale” empirical study of this network by considering conn…

General Computer SciencePopulationsosiaalinen mediaContext (language use)010501 environmental sciencesSpace (commercial competition)01 natural sciencesEmpirical researchbig data0502 economics and businessSocial network servicesGeneral Materials ScienceSocial mediaEconomic geographyeducationsovellukset (tietotekniikka)0105 earth and related environmental sciencesta113verkostoteducation.field_of_studyModularity (networks)big data applicationsData collection05 social sciencesGeneral Engineeringnetwork theory (graphs)Scale (social sciences)lcsh:Electrical engineering. Electronics. Nuclear engineeringsocial network serviceslcsh:TK1-9971050203 business & management
researchProduct

Mobile Communities in Developing Countries

2010

The number of mobile devices has exceeded four billions and is still growing. Especially in developing countries mobile devices are often the only access to Internet and digital services. In the most developed countries laptops, Wi-Fi and faster and faster wireless telecom networks have for long time made mobile access to various digital services possible while on the move. Still, large and instant mobile communities can only rely on more portable devices, such as mobile phones. In this paper we will analyze various mobile communities and the support they are offered by the social media sites. We will discuss the phenomena encountered in developing countries, like how the mobile technology …

Management information systemsbusiness.industryComputer scienceInternet privacyMobile computingMobile technologySocial mediaThe InternetMobile business developmentMobile telephonybusinessMobile device2010 Eleventh International Conference on Mobile Data Management
researchProduct

A Survey on Technologies Which Make Bitcoin Greener or More Justified

2022

According to recent estimates, one bitcoin transaction consumes as much energy as 1.5 million Visa transactions. Why is bitcoin using so much energy? Most of the energy is used during the bitcoin mining process, which serves at least two significant purposes: a) distributing new cryptocurrency coins to the cryptoeconomy and b) securing the Bitcoin blockchain ledger. In reality, the comparison of bitcoin transactions to Visa transactions is not that simple. The amount of transactions in the Bitcoin network is not directly connected to the amount of bitcoin mining power nor the energy consumption of those mining devices; for example, it is possible to multiply the number of bitcoin transactio…

blockchainhajautetut järjestelmätenergiankulutus (energiateknologia)General Computer ScienceDLTbitcoinGeneral Engineeringlohkoketjutsustainabilitycryptocurrencyvirtuaalivaluuttagreen technologyunconventional computingclimate changeekologinen kestävyysGeneral Materials ScienceElectrical and Electronic EngineeringIEEE Access
researchProduct

Reusability and modularity in transactional workflows

1997

Abstract Workflow management techniques have become an intensive area of research in information systems. In large scale workflow systems modularity and reusability of existing task structures with context dependent (parameterized) task execution are essential components of a successful application. In this paper we study the issues related to management of modular transactional workflows, i.e., workflows that reuse component tasks and thus avoid redundancy in design. The notion of parameterized transactional properties of workflow tasks is introduced and analyzed, and the underlying architectural issues are discussed.

DatabaseWindows Workflow FoundationComputer sciencebusiness.industry02 engineering and technologyReuseModular designcomputer.software_genreWorkflow engineWorkflow technologyWorkflowHardware and Architecture020204 information systems0202 electrical engineering electronic engineering information engineeringInformation system020201 artificial intelligence & image processingSoftware engineeringbusinesscomputerSoftwareWorkflow management systemInformation SystemsReusabilityInformation Systems
researchProduct

Mobile commerce: core business technology and intelligent support

2005

Mobile commerce is an emerging field in its early stages, but there are a number of ideas of what is going to constitute the key success factors for the actors in the global m-commerce arena. This arena is already growing diversified with a number of application areas, which are growing in different directions and at different paces. We understand already that B2B, B2E, B2C and P2P will produce rather different types of applications, because the propositions for value-added products and services are quite different. This is probably one of the reasons why the hunt for the “mobile commerce killer applications” has been in vain so far.

Knowledge managementCore businessbusiness.industryField (Bourdieu)Mobile commerceWorld Wide WebCritical success factorInformation systemBusinessUser interfaceMarketingUbiquitous commerceSoftware engineeringProductivityBusiness communication37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the
researchProduct

<title>Managing compressed multimedia data in a memory hierarchy: fundamental issues and basic solutions</title>

1998

The purpose of the work is to discuss the fundamental issues and solutions in managing compressed and uncompressed multimedia data, especially voluminous continuous mediatypes (video, audio) and text in a memory hierarchy with four levels (main memory, magnetic disk, (optical or magnetic) on-line/near-line low-speed memory, and slow off-line memory, i.e. archive). We view the multimedia data in such a database to be generated, (compressed), and stored into the memory hierarchy (at the lowest non-archiving level), and subsequently retrieved, (decompressed), and presented. If unused, the data either travels down in the memory hierarchy or it is compressed and stored at the same level. We firs…

Hardware_MEMORYSTRUCTURESFlat memory modelTheoretical computer scienceMultimediaMemory hierarchyComputer scienceThrashingcomputer.software_genreMemory mapMemory managementPhysical addressVirtual memoryInterleaved memorycomputerSPIE Proceedings
researchProduct

Improving Serendipity and Accuracy in Cross-Domain Recommender Systems

2017

Cross-domain recommender systems use information from source domains to improve recommendations in a target domain, where the term domain refers to a set of items that share attributes and/or user ratings. Most works on this topic focus on accuracy but disregard other properties of recommender systems. In this paper, we attempt to improve serendipity and accuracy in the target domain with datasets from source domains. Due to the lack of publicly available datasets, we collect datasets from two domains related to music, involving user ratings and item attributes. We then conduct experiments using collaborative filtering and content-based filtering approaches for the purpose of validation. Ac…

Focus (computing)data collectionInformation retrievalData collectionSerendipityComputer sciencesuosittelujärjestelmätserendipity02 engineering and technologyRecommender systemDomain (software engineering)Term (time)collaborative filtering020204 information systemscross-domain recommendations0202 electrical engineering electronic engineering information engineeringCollaborative filteringcontent-based filtering020201 artificial intelligence & image processingSet (psychology)
researchProduct

Distributed evolutionary approach to data clustering and modeling

2014

In this article we describe a framework (DEGA-Gen) for the application of distributed genetic algorithms for detection of communities in networks. The framework proposes efficient ways of encoding the network in the chromosomes, greatly optimizing the memory use and computations, resulting in a scalable framework. Different objective functions may be used for producing division of network into communities. The framework is implemented using open source implementation of MapReduce paradigm, Hadoop. We validate the framework by developing community detection algorithm, which uses modularity as measure of the division. Result of the algorithm is the network, partitioned into non-overlapping co…

Modularity (networks)Measure (data warehouse)Theoretical computer scienceComputer scienceComputationEncoding (memory)ScalabilityData miningDivision (mathematics)Representation (mathematics)computer.software_genreCluster analysiscomputer2014 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)
researchProduct

An Initial Security Analysis of the Personal Transaction Protocol

2003

Our society is becoming increasingly dependent on the rapid access and processing of information. The number of handheld mobile devices with access to the Internet and network-based software and services is exploding. Research indicates [1] that by the end of 2002 there will be over 1 billion mobile phone owners globally with Internet access, and that this number is going to grow exponentially in the nearest future. By 2006 the number of interconnected mobile device users is expected exceed the worldwide Internet subscriber population. It is estimated that in a few years there will be three times as many of these devices worldwide as personal computers.

education.field_of_studybusiness.product_categorybusiness.industryPopulationComputer securitycomputer.software_genreMobile phoneAuthentication protocolDistributed transactionInternet accessThe InternetBusinesseducationMobile deviceDatabase transactioncomputer
researchProduct

Ontology-based Semantic Web Service platform in Mobile Environments

2006

The number of mobile terminals is continuously increasing in the world, although in many developed countries the market has saturated. Thus, the market can only grow if new service types are offered to the mobile terminals. One emerging technology that might make this possible is semantic web services. At the core of this technology are ontologies that are necessary for automatic discovery and composition of the services. In this paper we discuss how mobility affects the architectural considerations of semantic web service platform and particularly ontology management. We rely on reference architecture for Semantic Web Services in our work.

Web standardsbusiness.industryComputer sciencecomputer.internet_protocolcomputer.software_genreSocial Semantic WebOWL-SWorld Wide WebSemantic analyticsSemantic Web StackWeb servicebusinesscomputerSemantic WebData Web7th International Conference on Mobile Data Management (MDM'06)
researchProduct

Identity Use and Misuse of Public Persona on Twitter

2016

Social media sites have appeared during the last 10 years and their use has exploded all over the world. Twitter is a microblogging service that has currently 320 million user profiles and over 100 million daily active users. Many celebrities and leading politicians have a verified profile on Twitter, including Justin Bieber, president Obama, and the Pope. In this paper we investigate the '‘hundreds of Putins and Obamas phenomenon’ on Twitter. We collected two data sets in 2015 containing 582 and 6477 profiles that are related to the G20 leaders’ profiles on Twitter. The number of namesakes varied from 5 to 1000 per leader. We analysed in detail various aspects of the Putin and Erdogan rela…

ta113online identity: G20 leaders: Putinbusiness.industryComputer sciencesocial media05 social sciencesInternet privacyTwitterIdentity (social science)sosiaalinen media050801 communication & media studiesPersonafaked accountsG20 leaders: Putin [online identity]ObamaimpersonationErdogan0508 media and communications0502 economics and business050211 marketingta518business
researchProduct

Autonomy, Heterogeneity and Trust in Mobile P2P environments

2007

Mobile P2P environments are emerging as a result of rapid expansion of portable terminals that are able to establish direct wireless communication links among themselves. These kinds of terminals are under the control of persons and allowing interactions between their terminals is subject to trust between the individuals and their desire to preserve various aspects of autonomy against each other. In this paper we relate the concepts of node autonomy, heterogeneity and trust with each other, defining also numeric measures for them. We also investigate what kind of interactions (such as transactions, file exchanges) are possible at certain heterogeneity, autonomy and trust level between the t…

business.industryComputer scienceRapid expansionmedia_common.quotation_subjectNode (networking)Control (management)Mobile computingComputer securitycomputer.software_genreTrust levelPeer to peer computingWirelessbusinesscomputerAutonomymedia_common2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07)
researchProduct

Cross-Domain Recommendations with Overlapping Items

2016

In recent years, there has been an increasing interest in cross-domain recommender systems. However, most existing works focus on the situation when only users or users and items overlap in different domains. In this paper, we investigate whether the source domain can boost the recommendation performance in the target domain when only items overlap. Due to the lack of publicly available datasets, we collect a dataset from two domains related to music, involving both the users’ rating scores and the description of the items. We then conduct experiments using collaborative filtering and content-based filtering approaches for validation purpose. According to our experimental results, the sourc…

ta113Information retrievaldata collectionComputer sciencesuosittelujärjestelmät02 engineering and technologyDomain (software engineering)020204 information systemscollaborative filtering0202 electrical engineering electronic engineering information engineeringcross-domain recommendationscontent-based filtering020201 artificial intelligence & image processingrecommender systems
researchProduct

ENFORCEMENT OF INTER-TASK DEPENDENCIES IN WORKFLOWS, CHARACTERIZATION AND PARADIGM

1998

Workflow techniques have gained a lot of attention as a means to support advanced business applications such as cooperative information systems and process re-engineering but also as a means to integrate legacy systems. Inter-task dependencies, described separately from the other parts of the workflow, have been recognized as a valuable method in describing certain restrictions on the executions of workflows. In this paper, we study the issue of pre-analysing and enforcing inter-task dependencies. The protocol and the theory behind it are presented, along with examples and discussions on ways to improve the performance. The idea is to present the meaning of a dependency through an automato…

Theoretical computer scienceCorrectnessDependency (UML)Event (computing)Computer scienceProgramming languageLegacy systemcomputer.software_genreComputer Science ApplicationsAutomatonTask (project management)Dependency theory (database theory)WorkflowcomputerInformation SystemsInternational Journal of Cooperative Information Systems
researchProduct

IPS/UMS/WNGS/MUS 2008 Workshop - Message from the Workshop Organizers

2008

It is a great pleasure to welcome you to the 2008 IPS/UMS/WNGS/MUS workshop held in conjunction with the International Conference on Multimedia and Ubiquitous Engineering (MUE2008), Hanwha Resort Haeundae, Busan, Korea. The workshop covers topics on ubiquitous multimedia services and security in ubiquitous multimedia systems. All the submitted papers have undergone rigorous review process by the technical program committee members and external reviewers. We have selected 17 best papers for presentation and publication in the conference proceedings.

World Wide WebEngineeringPresentationbusiness.industrymedia_common.quotation_subjectReview processbusinessmedia_commonPleasure2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)
researchProduct

Transaction management for m-commerce at a mobile terminal

2006

Although there has been a lot of discussion of "transactions" in mobile e-commerce (m-commerce), very little attention has been paid for distributed transactional properties of the computations facilitating m-commerce. In this paper, we first present a requirement analysis and then present a wireless terminal-based transaction manager (TM) architecture. This architecture is based on the assumption that there is an application that supports certain business transaction(s) and that it uses the TM to store transactional state information and retrieve it after a communication link, application, or terminal crash. We present the design of such a TM, including the application interface, modules a…

MarketingDatabaseComputer Networks and CommunicationsComputer scienceTransaction processingbusiness.industryCompensating transactionDistributed computingMobile commerceMobile computingcomputer.software_genreExtreme Transaction ProcessingComputer Science ApplicationsTerminal (electronics)SerializabilityServerManagement of Technology and InnovationDistributed transactionTransaction processing systemOnline transaction processingbusinessDatabase transactioncomputerComputer networkElectronic Commerce Research and Applications
researchProduct

Developing Mobile Ontologies; Who, Why, Where, and How?

2007

The number of mobile subscribers in the world is soon reaching the three billion mark. According to the newest estimates, majority of the subscribers are already in the developing countries, whereas the number of subscribers in the industrialized countries is about to stagnate around one billion. Because especially in the developing countries the only access to Internet are mobile devices, developing high quality services based on them grows in importance. Ontologies are an important ingredient towards more complicated mobile services. In this paper we refine the taxonomy for mobile ontologies and discuss their creation, business models, maintenance and intellectual property rights (IPR).

business.product_categorybusiness.industryComputer sciencemedia_common.quotation_subjectMobile computingDeveloping countryBusiness modelIntellectual propertyComputingMilieux_GENERALWorld Wide WebInternet accessThe InternetQuality (business)businessMobile devicemedia_common2007 International Conference on Mobile Data Management
researchProduct

Online activity traces around a "Boston bomber"

2013

This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic social media monitoring software, includes the perpetrator's page saved at the time the bombing suspects' names were made public, and the subsequently appearing comments left on that page by other users. The analyses suggest that a timely protection of online media records of a criminal could help prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals' ideas, messages, and connections.

ta113Social networkbusiness.industryInternet privacyTragedy (event)ComputingMilieux_LEGALASPECTSOFCOMPUTINGThe InternetSocial mediaSociologySuspectbusinessWeb crawlerDigital mediaProceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
researchProduct

The Issue Arena of a Corporate Social Responsibility Crisis : The Volkswagen Case in Twitter

2016

This paper explores the online debate in a corporate social responsibility crisis, where multiple actors communicate through social media, each representing different interests and views pertaining to the crisis. The study utilizes Twitter data relating to the recent case of the falsified Volkswagen diesel emissions that became public in 2015. To better understand the online interaction, use is made of issue arena theory and insights on CSR crises. The focus is on capturing the issue as it evolved over time, the actors and sentiments expressed, and the responses of the organization. The findings show that after the case became public, the emissions issue received massive attention in Twitte…

media_common.quotation_subjectsocial mediaTwittersosiaalinen media050801 communication & media studieskriisiviestintäVolkswagen0508 media and communications0502 economics and businessSocial mediaSociologyta518crisis communicationCrisis communicationmedia_commoncorporate social responsibilitybusiness.industryCompensation (psychology)05 social sciencesSentiment analysisStakeholderAdvertisingPublic relationsmaineenhallintasosiaalinen vastuuissue arenaCorporate social responsibilitybusiness050203 business & managementDiversity (business)ReputationStudies in Media and Communication
researchProduct

Investigating serendipity in recommender systems based on real user feedback

2018

Over the past several years, research in recommender systems has emphasized the importance of serendipity, but there is still no consensus on the definition of this concept and whether serendipitous items should be recommended is still not a well-addressed question. According to the most common definition, serendipity consists of three components: relevance, novelty and unexpectedness, where each component has multiple variations. In this paper, we looked at eight different definitions of serendipity and asked users how they perceived them in the context of movie recommendations. We surveyed 475 users of the movie recommender system, MovieLens regarding 2146 movies in total and compared tho…

ta113Information retrievalComputer scienceSerendipityuutuudetpalautesuosittelujärjestelmätNoveltyserendipityContext (language use)02 engineering and technologyVariation (game tree)Recommender systemunexpectednessPreferenceMovieLenssattumanovelty020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRelevance (information retrieval)relevancerecommender systemsProceedings of the 33rd Annual ACM Symposium on Applied Computing
researchProduct

Evolutionary approach to coverage testing of IEC 61499 function block applications

2015

The paper addresses the problem of coverage testing of industrial automation software represented in the IEC 61499 standard, one of the recent standards for distributed control system design. Contrary to model-based testing (MBT), the paper focuses on implementation coverage, not model coverage. An approach based on evolutionary algorithms is presented which generates coverage test suites for both basic and composite IEC 61499 function blocks. It employs two third-party tools, FBDK and EvoSuite. The evaluation of the approach was performed on a set of control applications for two lab-scale demonstration plants. Results show that the approach is applicable and shows good performance at least…

business.industryComputer scienceEvolutionary algorithmAutomationEvolutionary computationReliability engineeringSet (abstract data type)SoftwareUnified Modeling LanguageBlock (programming)Software engineeringbusinessDistributed control systemcomputercomputer.programming_language2015 IEEE 13th International Conference on Industrial Informatics (INDIN)
researchProduct

Linear Feature Extraction for Ranking

2018

We address the feature extraction problem for document ranking in information retrieval. We then propose LifeRank, a Linear feature extraction algorithm for Ranking. In LifeRank, we regard each document collection for ranking as a matrix, referred to as the original matrix. We try to optimize a transformation matrix, so that a new matrix (dataset) can be generated as the product of the original matrix and a transformation matrix. The transformation matrix projects high-dimensional document vectors into lower dimensions. Theoretically, there could be very large transformation matrices, each leading to a new generated matrix. In LifeRank, we produce a transformation matrix so that the generat…

dimension reductionComputer scienceFeature extractionMathematicsofComputing_NUMERICALANALYSISFeature selectiontiedonhakujärjestelmät02 engineering and technologyLibrary and Information SciencesRanking (information retrieval)Matrix (mathematics)Transformation matrix020204 information systemsalgoritmit0202 electrical engineering electronic engineering information engineeringtiedonhakulearning to rankbusiness.industryfeature extractionPattern recognitionkoneoppiminenPattern recognition (psychology)Benchmark (computing)020201 artificial intelligence & image processingLearning to rankArtificial intelligencebusinessInformation Systems
researchProduct

Supporting Dispute Handling in E-Commerce Transactions, a Framework and Related Methodologies

2004

An E-commerce transaction is a means to conduct particular commercial activities using the global digital E-commerce infrastructure. We concentrate here on business to customer (B-to-C) E-commerce transactions. These transactions are based on protocols offered by the global infrastructure, primarily the Internet. Using electronic means to do business can greatly improve the efficiency of the business transactions. It, however, poses some problems that were rarely considered to be important before. One class of problems is caused by the behavior of untrusted participants. For reasons such as dishonesty, disputes may arise. In the general case, when a dispute arises an untrustworthy participa…

Class (computer programming)AtomicityDishonestyProcess (engineering)business.industryComputer sciencemedia_common.quotation_subjectEconomics Econometrics and Finance (miscellaneous)Context (language use)E-commerceComputer securitycomputer.software_genreHuman-Computer InteractionThe InternetbusinesscomputerDatabase transactionmedia_commonElectronic Commerce Research
researchProduct

On building an infrastructure for mobile and wireless systems

2002

Over the last few years, there have been at least two dramatic changes in the way computers are used. The first has its origin in the fact that computers have become more and more connected to each other. The second was triggered by the increasing miniaturization and affordability of hardware components and power supplies, together with the development of wireless communication paths. These two trends combined have allowed the development of powerful, yet comparatively low-priced, portable computers. In spite of these changes, little attention has been given to reaching a common consensus and to the development of a strong infrastructure in this area.

Wireless site surveyComputer sciencebusiness.industryDistributed computingWirelessWireless WANWireless systemsTelecommunicationsbusinessSoftwareMunicipal wireless networkInformation SystemsACM SIGMOD Record
researchProduct

Cross-Social Network Collaborative Recommendation

2015

Online social networks have become an essential part of our daily life, and an increasing number of users are using multiple online social networks simultaneously. We hypothesize that the integration of data from multiple social networks could boost the performance of recommender systems. In our study, we perform cross-social network collaborative recommendation and show that fusing multi-source data enables us to achieve higher recommendation performance as compared to various single-source baselines.

World Wide WebSocial networkComputer sciencebusiness.industryRecommender systembusinessProceedings of the ACM Web Science Conference
researchProduct

A Mobile Healthcare System for Sub-saharan Africa

2013

The disparity between healthcare systems in developed countries and underdeveloped countries is huge, particularly due to the fact that the healthcare infrastructure of former is based on a sophisticated technological infrastructure. Efforts are being made worldwide to bridge this disparity and make healthcare services affordable even to the most remote areas of undeveloped countries. Recent growth of mobile networks in underdeveloped countries argues for building mHealth systems and applications on their basis. However, peculiarities of the area introduce difficulties into potential use cases of mobile devices, thus making the copying of mHealth services from developed countries inapplicab…

CopyingSoftware deploymentbusiness.industryHealth careDeveloping countryUse caseFunctional requirementTelecommunicationsbusinessMobile devicemHealth
researchProduct

A Serendipity-Oriented Greedy Algorithm for Recommendations

2017

Most recommender systems suggest items to a user that are popular among all users and similar to items the user usually consumes. As a result, a user receives recommendations that she/he is already familiar with or would find anyway, leading to low satisfaction. To overcome this problem, a recommender system should suggest novel, relevant and unexpected, i.e. serendipitous items. In this paper, we propose a serendipity-oriented algorithm, which improves serendipity through feature diversification and helps overcome the overspecialization problem. To evaluate our algorithm and compare it with others, we employ a serendipity metric that captures each component of serendipity, unlike the most …

ta113SerendipityComputer sciencebusiness.industrysuosittelujärjestelmät020207 software engineeringserendipity02 engineering and technologyalgorithmsunexpectednessnoveltyalgoritmit0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencerecommender systemsGreedy algorithmbusinessGreedy randomized adaptive search procedure
researchProduct

Formal specification of open standards and the case of RSS v2.0

2014

Open standardization seems to be very popular among software developers as it makes the standard's adoption by the software engineering community easier and smoother. Formal specification methods, on the other hand, while very promising, are being adopted by protocol engineers very slowly; the industry seems to have little motivation to move into this, almost unknown, territory.In this paper the authors present the i) idea of applying formal methods (formal specification techniques) to open standards' specifications, and ii) an example of a formal specification of open standards, RSS v2.0 in particular. The authors support and provide evidence for the advantages of the open standards formal…

ta113Language Of Temporal Ordering SpecificationProgramming languageComputer scienceFormal specificationObject languageAlgebraic specificationSpecification languageRefinementcomputer.software_genreFormal methodscomputerFormal verification
researchProduct

A Generic Architecture for a Social Network Monitoring and Analysis System

2011

This paper describes the architecture and a partial implementation of a system designed for the monitoring and analysis of communities at social media sites. The main contribution of the paper is a novel system architecture that facilitates long-term monitoring of diverse social networks existing and emerging at various social media sites. It consists of three main modules, the crawler, the repository and the analyzer. The first module can be adapted to crawl different sites based on ontology describing the structure of the site. The repository stores the crawled and analyzed persistent data using efficient data structures. It can be implemented using special purpose graph databases and/or …

ta113Graph databaseDatabaseRelational databaseComputer scienceSystems architectureGraph (abstract data type)Persistent data structureOntology (information science)computer.software_genreSoftware architectureData structurecomputer2011 14th International Conference on Network-Based Information Systems
researchProduct

A Repository for Multirelational Dynamic Networks

2012

Nowadays, WWW contains a number of social media sites, which are growing rapidly. One of the main features of social media sites is to allow to its users creation and modification of contents of the site utilizing the offered WWW interfaces. Such contents are referred to as user generated contents and their type varies from site to site. Social media sites can be modeled as constantly evolving multirelational directed graphs. In this paper we discuss persistent data structures for such graphs, and present and analyze queries performed against the structures. We also estimate the space requirements of the proposed data structures, and compare them with the naive "store each complete snapshot…

ta113Databasebusiness.industryComputer scienceDirected graphcomputer.software_genreData structureData modelingTemporal databaseSnapshot (computer storage)Social mediaPersistent data structurebusinesscomputerContent management2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
researchProduct

Towards Next Generation System Architecture for Emergency Services

2011

European Union has decided that all emergencies can be reported to authorities by European citizens by calling 112 or sending a text message to 112. Distributing warnings and alerts of authorities to citizens currently happens through national TV and radio channels, but telecom networks are also used now in some countries for this purpose. During the last ten years there have been attempts to develop new system architectures for various emergency service provision phases. Some of them are already deployed in special cases, like in ambulance services. Multimedia emergency alert messages can be delivered to citizens over fixed and mobile telecom networks and commercial systems are already in …

Civil Emergency MessageWireless networkComputer scienceService delivery frameworkbusiness.industryUsabilityComputer securitycomputer.software_genreService provisioningSystems architecturemedia_common.cataloged_instanceSocial mediaEuropean unionbusinesscomputermedia_common
researchProduct

Modelling Dependencies Between Classifiers in Mobile Masquerader Detection

2004

The unauthorised use of mobile terminals may result in an abuse of sensitive information kept locally on the terminals or accessible over the network. Therefore, there is a need for security means capable of detecting the cases when the legitimate user of the terminal is substituted. The problem of user substitution detection is considered in the paper as a problem of classifying the behaviour of the person interacting with the terminal as originating from the user or someone else. Different aspects of behaviour are analysed by designated one-class classifiers whose classifications are subsequently combined. A modification of majority voting that takes into account some of the dependencies …

Scheme (programming language)Majority ruleComputer sciencebusiness.industrySubstitution (logic)Base (topology)Machine learningcomputer.software_genreInformation sensitivityTerminal (electronics)Artificial intelligenceData miningbusinesscomputercomputer.programming_language
researchProduct

Ranking-Oriented Collaborative Filtering: A Listwise Approach

2016

Collaborative filtering (CF) is one of the most effective techniques in recommender systems, which can be either rating oriented or ranking oriented. Ranking-oriented CF algorithms demonstrated significant performance gains in terms of ranking accuracy, being able to estimate a precise preference ranking of items for each user rather than the absolute ratings (as rating-oriented CF algorithms do). Conventional memory-based ranking-oriented CF can be referred to as pairwise algorithms. They represent each user as a set of preferences on each pair of items for similarity calculations and predictions. In this study, we propose ListCF, a novel listwise CF paradigm that seeks improvement in bot…

Computer science02 engineering and technologyRecommender systemcomputer.software_genreMachine learningSet (abstract data type)020204 information systems0202 electrical engineering electronic engineering information engineeringCollaborative filteringDivergence (statistics)ranking-oriented collaborative filteringta113business.industryGeneral Business Management and AccountingComputer Science ApplicationsRankingcollaborative filteringBenchmark (computing)Probability distribution020201 artificial intelligence & image processingPairwise comparisonArtificial intelligenceData miningrecommender systemsbusinesscomputerInformation SystemsACM Transactions on Information Systems
researchProduct

Understanding Fast Diffusion of Information in the Social Media Environment. A Comparison of Two Cases.

2014

The purpose of this paper is to gain understanding of what factors cause rapid issue spread in social media, to help predict issue growth. The frequency graphics of two issues, Arctic Sunrise and U.S. capitol shooting, were compared to investigate rapidity of spread on Twitter. Next, a qualitative model was applied to explain the differences found. Furthermore, a first attempt was made to investigate issue transfer between social media and news media. The findings showed that news items and tweets were interrelated, with hardly any time-lag in between, although the tweets continued longer and included more emotion. The approach seems promising but needs further testing. When in practice mon…

communicationsocial mediasosiaalinen mediaviestintä
researchProduct