Search results for "user profile"

showing 10 items of 26 documents

The Adaptation of a Web Information System: A Perspective of Organizations

2011

We provide a different view on the problem of Web Information System (WIS) adaptation, looking from perspective of organizations that are interested in an adapted Web Information System for their needs if a unified system to support similar business processes is used. We propose an adaptation architecture for WIS. Two levels of adaptation are introduced—coarse grained adaptation for the organization level and fine grained adaptation for the user level. The architecture supports also the situation, when users can work with many instances of the system adapted for different organizations, which are integrated into one instance for a particular user.

World Wide WebWeb standardsUser profileKnowledge managementbusiness.industryBusiness processComputer scienceArchitecturebusinessAdaptation (computer science)Web intelligenceSoftware product lineWeb information system
researchProduct

Application of the Information Bottleneck method to discover user profiles in a Web store

2018

The paper deals with the problem of discovering groups of Web users with similar behavioral patterns on an e-commerce site. We introduce a novel approach to the unsupervised classification of user sessions, based on session attributes related to the user click-stream behavior, to gain insight into characteristics of various user profiles. The approach uses the agglomerative Information Bottleneck (IB) algorithm. Based on log data for a real online store, efficiency of the approach in terms of its ability to differentiate between buying and non-buying sessions was validated, indicating some possible practical applications of the our method. Experiments performed for a number of session sampl…

unsupervised classificationComputer science02 engineering and technologyE-commerceCustomer profile020204 information systems0202 electrical engineering electronic engineering information engineeringe-commerceWeb storeCluster analysisUser profileInformation retrievalbusiness.industrycustomer profileBehavioral patternInformation bottleneck methoddata miningComputer Science Applicationsmachine learningComputational Theory and MathematicsAgglomerative Information Bottleneck020201 artificial intelligence & image processinguser profilebusinessclusteringInformation SystemsJournal of Organizational Computing and Electronic Commerce
researchProduct

Automatic ontology-based user profile learning from heterogeneous web resources in a big data context

2013

The Web has developed to the biggest source of information and entertainment in the world. By its size, its adaptability and flexibility, it challenged our current paradigms on information sharing in several areas. By offering everybody the opportunity to release own contents in a fast and cheap way, the Web already led to a revolution of the traditional publishing world and just now, it commences to change the perspective on advertisements. With the possibility to adapt the contents displayed on a page dynamically based on the viewer's context, campaigns launched to target rough customer groups will become an element of the past. However, this new ecosystem, that relates advertisements wit…

Flexibility (engineering)User profileDigital marketingComputer sciencebusiness.industryInformation sharingBig dataGeneral EngineeringContext (language use)Ontology (information science)computer.software_genreOntology engineeringWorld Wide WebOntologyWeb resourcebusinesscomputerProceedings of the VLDB Endowment
researchProduct

Navigating high-choice European political information environments : a comparative analysis of news user profiles and political knowledge

2021

The transition from low- to high-choice media environments has had far-reaching implications for citizens’ media use and its relationship with political knowledge. However, there is still a lack of comparative research on how citizens combine the usage of different media and how that is related to political knowledge. To fill this void, we use a unique cross-national survey about the online and offline media use habits of more than 28,000 individuals in 17 European countries. Our aim is to (i) profile different types of news consumers and (ii) understand how each user profile is linked to political knowledge acquisition. Our results show that five user profiles – news minimalists, social m…

Online and offlinecrossSociology and Political Sciencenews repertoires050801 communication & media studiescross-nationalnews media usePoliticsSeekers0508 media and communications10240 Department of Communication and Media Research3312 Sociology and Political ScienceComparative researchMedia usePolitical science050602 political science & public administrationcomparative researchSocial media070 News media journalism & publishingpolitical knowledgeUser profileCommunication05 social sciencesPoliticsnationalAdvertisingKnowledge acquisition[SHS.SCIPO]Humanities and Social Sciences/Political science0506 political scienceddc:Mass communications3315 CommunicationThe international journal of press/politics
researchProduct

Ontology-based Integration of Web Navigation for Dynamic User Profiling

2015

The development of technology for handling information on a Big Data-scale is a buzzing topic of current research. Indeed, improved techniques for knowledge discovery are crucial for scientific and economic exploitation of large-scale raw data. In research collaboration with an industrial actor, we explore the applicability of ontology-based knowledge extraction and representation for today's biggest source of large-scale data, the Web. The goal is to develop a profiling application, based on the implicit information that every user leaves while navigating the online, with the goal to identify and model preferences and interests in a detailed user profile. This includes the identification o…

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI]lcsh:Computer engineering. Computer hardware[ INFO ] Computer Science [cs]Knowledge representation and reasoningComputer scienceSemantic Web Ontologies SWRL Big Data reasoningBig datalcsh:TK7885-789502 engineering and technologyOntology (information science)[INFO] Computer Science [cs][INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Big Data reasoningWorld Wide WebKnowledge extraction020204 information systems0202 electrical engineering electronic engineering information engineeringOntologiesWeb navigation[INFO]Computer Science [cs][ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]Semantic WebSWRLSemantic WebUser profilebusiness.industrylcsh:Zlcsh:Bibliography. Library science. Information resourcesSemantic technology020201 artificial intelligence & image processingbusiness
researchProduct

A data-logging mechanism to support e-learning systems

2015

User profiling and e-learning have received great attention in the last years. In a learning environment, user profiling provides historical data of the students' performance on different learning subjects. e-Learning tools such as serious games can collect user's data and build a user profile by appropriate storing these information. Thus, by combining above techniques and analysing each user's data a teacher can provide personalized treatment to her/his students. In this paper we present our solution on storing and analysing user data on a centralized server. Our system stores data collected from users with dyslexia. We maintain one user profile per student from data taken from a) user re…

User profileMultimediaComputer scienceUser modelingLearning environmentDyslexiaComputer user satisfactionmedicine.diseasecomputer.software_genreUser interface designData loggermedicineProfiling (information science)computer2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA)
researchProduct

Research Directions of OLAP Personalizaton

2011

In this paper we have highlighted five existing approaches for introducing personalization in OLAP: preference constructors, dynamic personalization, visual OLAP, recommendations with user session analysis and recommendations with user profile analysis and have analyzed research papers within these directions. We have provided an evaluation in order to point out (i) personalization options, described in these approaches, and its applicability to OLAP schema elements, aggregate functions, OLAP operations, (ii) the type of constraints (hard, soft or other), used in each approach, (iii) the methods for obtaining user preferences and collecting user information. The goal of our paper is to syst…

User informationWorld Wide WebInformation retrievalUser profileComputer scienceSchema (psychology)Online analytical processingInformationSystems_DATABASEMANAGEMENTData warehousePersonalization
researchProduct

Using continuous user authentication to detect masqueraders

2003

Nowadays computer and network intrusions have become more common and more complicated, challenging the intrusion detection systems. Also, network traffic has been constantly increasing. As a consequence, the amount of data to be processed by an intrusion detection system has been growing, making it difficult to efficiently detect intrusions online. Proposes an approach for continuous user authentication based on the user’s behaviour, aiming at development of an efficient and portable anomaly intrusion detection system. A prototype of a host‐based intrusion detection system was built. It detects masqueraders by comparing the current user behaviour with his/her stored behavioural model. The m…

AuthenticationUser profileComputer scienceAnomaly-based intrusion detection systemReal-time computingIntrusion detection systemLibrary and Information SciencesManagement Science and Operations ResearchComputer securitycomputer.software_genreManagement Information SystemsInformation protection policyHost-based intrusion detection systemSystems architectureBusiness and International ManagementHost (network)computerInformation Management & Computer Security
researchProduct

User profile matching in social networks

2010

International audience; Inter-social networks operations and functionalities are required in several scenarios (data integration, data enrichment, information retrieval, etc.). To achieve this, matching user profiles is required. Current methods are so restrictive and do not consider all the related problems. Particularly, they assume that two profiles describe the same physical person only if the values of their Inverse Functional Property or IFP (e.g. the email address, homepage, etc.) are the same. However, the observed trend in social networks is not fully compatible with this assumption since users tend to create more than one social network account (for personal use, for work, etc.) w…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR]Matching (statistics)Computer science[SCCO.COMP]Cognitive science/Computer science02 engineering and technologySimilarity measurecomputer.software_genreElectronic mail[SCCO.COMP] Cognitive science/Computer science020204 information systemsFOAF0202 electrical engineering electronic engineering information engineeringPattern matchingUser profileSocial networkbusiness.industrycomputer.file_formatProfile MatchingSocial Networks[ SCCO.COMP ] Cognitive science/Computer science[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR]020201 artificial intelligence & image processingData mining[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]businesscomputerData integration
researchProduct

A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection

2001

Network security, and intrusion detection in particular, represents an area of increased in security community over last several years. However, the majority of work in this area has been concentrated upon implementation of misuse detection systems for intrusion patterns monitoring among network traffic. In anomaly detection the classification was mainly based on statistical or sequential analysis of data often neglect ion temporal events' information as well as existing relations between them. In this paper we consider an anomaly detection problem as one of classification of user behavior in terms of incoming multiple discrete sequences. We present and approach that allows creating and mai…

Class (computer programming)User profileNetwork securitybusiness.industryAnomaly-based intrusion detection systemComputer scienceIntrusion detection systemcomputer.software_genreMisuse detectionData analysisAnomaly detectionData miningbusinesscomputer
researchProduct