User data discovery and aggregation: The CS-UDD algorithm
Tài liệu tham khảo
F. Abel, N. Henze, E. Herder, D. Krause, Interweaving public user profiles on the web, in: Proc. 18th International Conference on User Modeling, Adaptation, and Personalization, Big Island of Hawaii, 2010, pp. 16–27.
Aroyo, 2006, Interoperability in personalized adaptive learning, Edu. Technol. Soc., 9, 4
Batini, 2006
Berkovsky, 2008, Mediation of user models for enhanced personalization in recommender systems, J. User Model. User-Adap. Inter., 18, 245, 10.1007/s11257-007-9042-9
K. Bischoff, C. Firan, W. Nejdl, R. Paiu, Can all tags be used for search?, in: Proc. 17th ACM Conference on Information and Knowledge Management, Napa Valley, California, 2008, pp. 193–202.
Bleiholder, 2009, Data fusion, ACM Comput. Surv., 1, 10.1145/1456650.1456651
Brown, 2003, Data association methods with applications to law enforcement, Decis. Support Syst., 34, 369, 10.1016/S0167-9236(02)00064-7
Bundy, 1985, Incidence calculus: a mechanism for probabilistic reasoning, J. Automat. Reason., 1, 263, 10.1007/BF00244272
Carmagnola, 2008, Tag-based user modeling for social multi-device adaptive guides, User Model. User-Adap. Inter., 18, 497, 10.1007/s11257-008-9052-2
F. Carmagnola, F. Osborne, I. Torre, Cross-systems identification of users in the social web, in: Proc. 8th IADIS International Conference WWW/Internet, Rome, Italy, 2009.
Carmagnola, 2009, User identification for cross-system personalisation, Inf. Sci., 179, 16, 10.1016/j.ins.2008.08.022
F. Carmagnola, F. Osborne, I. Torre, User data distributed on the social web: how to identify users on different social systems and collecting data about them, in: Proc. 1st International Workshop on Information Heterogeneity and Fusion in Recommender Systems, Barcelona, Spain, 2010, pp. 9–15.
Castillo, 2011, A WordNet-based semantic approach to textual entailment and cross-lingual textual entailment, Int. J. Mach. Learn. Cybern., 2, 177, 10.1007/s13042-011-0026-z
Cena, 2006, Integrating heterogeneous adaptation techniques to build a flexible and usable mobile tourist guide, AI Commun., 19, 369
L. Console, Piemonte Team, WantEat: interacting with social networks of intelligent things and people in the world of enogastronomy, in: Proc. Workshop on Interacting with Smart Objects, In Conjunction with the International Conference on Intelligent User Interfaces, Palo Alto, CA, 2011, pp. 1–6.
Dempster, 1967, Upper and lower probabilities induced by a multi-valued mapping, Ann. Math. Stat., 38, 325, 10.1214/aoms/1177698950
P. Dolog, M. Schäfer, A framework for browsing, manipulating and maintaining interoperable learner profiles, in: Proc. 10th International Conference on User Modeling, Edinburgh, Scotland, UK, 2005, pp. 397–401.
Dubois, 1987, Necessity measures and the resolution principle, IEEE Trans. Syst. Man Cybern., 17, 474, 10.1109/TSMC.1987.4309063
Elmagarmid, 2007, Duplicate record detection: a survey, IEEE Trans. Knowl. Data Eng., 19, 1, 10.1109/TKDE.2007.250581
Fellegi, 1969, A theory for record linkage, J. Am. Stat. Assoc., 64, 1183, 10.1080/01621459.1969.10501049
Finch, 2003, What a tangled web we weave: identity theft and the internet, 86
Y. Gae-Won, H. Seung-Won, N. Zaiqing, W. Ji-Rong, SocialSearch: enhancing entity search with social network matching, in: A. Ailamaki, S. Amer-Yahia, J. Pate, T. Risch, P. Senellart, J. Stoyanovich (Eds.), Proc. 14th International Conference on Extending Database Technology, Uppsala, Sweden, 2011, pp. 515–519.
Ghazizadeh, 2012, Semantic similarity assessment of words using weighted WordNet, Int. J. Mach.Learn. Cybern., 10.1007/s13042-012-0135-3
I. Guy, M. Jacovi, E. Shahar, N. Meshulam, V. Soroka, S. Farrell, Harvesting with SONAR: the value of aggregating social network information, in: Proc. of the SIGCHI Conference on Human Factors in Computing Systems, Florence, Italy, 2008, pp. 1017–1026.
Hay, 2010, Resisting structural re-identification in anonymized social networks, Int. J. Very Large Data Bases, 19, 797, 10.1007/s00778-010-0210-x
Heckerman, 1992, From certainty factors to belief networks, Artif. Intell. Med., 4, 35, 10.1016/0933-3657(92)90036-O
Heckmann, 2006
Hong, 1997, Valuation-based systems for decision analysis using belief functions, Decis. Support Syst., 20, 165, 10.1016/S0167-9236(96)00062-0
Ioannou, 2008, Probabilistic entity linkage for heterogeneous information spaces, vol. 5074, 556
T. Iofciu, P. Fankhauser, F. Abel, K. Bischoff, Identifying users across social tagging systems, in: L. Adamic, R. Baeza-Yates, S.Counts (Eds.), Proc. 5th International Conference on Weblogs and Social Media, Barcelona, Catalonia, Spain, 2011.
Irani, 2011, Modeling unintended personal-information leakage from multiple online social networks, IEEE Internet Comput., 15, 13, 10.1109/MIC.2011.25
Jiexun, 2011, Identity matching using personal and social identity features, Inform. Syst. Front., 13, 101, 10.1007/s10796-010-9270-0
J. Kay, Scrutable adaptation: because we can and must, in: Proc. 4th International Conference on Adaptive Hypermedia and Adaptive Web-Based Systems, Dublin, Ireland, 2006, pp. 11–19.
Kobsa, 2001, Personalised hypermedia presentation techniques for improving online customer relationship, Knowl. Eng. Rev., 16, 111, 10.1017/S0269888901000108
Köpcke, 2010, Frameworks for entity matching: a comparison, Data Knowl. Eng., 69, 197, 10.1016/j.datak.2009.10.003
Kruppa, 2005, Adaptive multimodal presentation of multimedia content in museum scenarios, Künstliche Intell. J., 1, 56
S. Labitzke, I. Taranu, H. Hartenstein, What your friends tell others about you: low cost linkability of social network profiles, in: Proc. 5th International ACM Workshop on Social Network Mining and Analysis, San Diego, California, 2011, pp. 51–60.
Lee, 2010, Performance and power modeling of on-chip bus system for a complex SoC, IEICE Trans., 93-C, 1525, 10.1587/transele.E93.C.1525
E. Leonardi, G.J. Houben, K. Van Der Sluijs, J. Hidders, E. Herder, F. Abel, D. Krause, D. Heckmann, User profile elicitation and conversion in a mashup environment, in: Proc. International Workshop on Lightweight Integration on the Web, San Sebastian, Spain, 2009, pp. 18–29.
Levenshtein, 1966, Binary codes capable of correcting deletions, insertions, and reversals, Sov. Phys. Dokl., 10, 707
K. Liu, E. Terzi. Towards identity anonymization on graphs, in: Proc. ACM International Conference on Management of data, Vancouver, BC, Canada, 2008, pp. 93–106.
McCarthy, 1980, Circumscription – a form of non-monotonic reasoning, Artif. Intell., 13, 27, 10.1016/0004-3702(80)90011-9
B. Mehta, C. Niederee, A. Stewart, M. Degemmis, P. Lops, G. Semeraro, Ontologically-enriched unified user modeling for cross-system personalization, in: Proc. 10th International Conference on User Modeling, Edinburgh, Scotland, UK, 2005, pp. 119–123.
A. Mislove, B. Viswanath, K. P. Gummadi, P. Druschel, You are who you know: inferring user profiles in online social networks, in: Proc. 3rd ACM International Conference of Web Search and Data Mining, New York, 2010, pp. 251–260.
M. Motoyama, G. Varghese, I seek you: searching and matching individuals in social networks, in: Proc. 11th International Workshop on Web Information and Data Management, Hong Kong, China, 2009, pp. 67–75.
T. Oreilly, What Is Web 2.0, Design Patterns and Business Models for the Next Generation of Software, 2005. <http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-isweb-20.html>.
D. Perito, C. Castelluccia, M. Kaafar, P. Manils, How unique and traceable are usernames? In Privacy Enhancing Technologies, in: Proc. 11th International Symposium, Waterloo, ON, Canada, 2011, pp. 1–17.
Reiter, 1980, A logic for default reasoning, Artif. Intell., 13, 81, 10.1016/0004-3702(80)90014-4
Salton, 1984
Shafer, 1976
E. Shahbazian, G. Rogova, P. Valin, Data Fusion for Situation Monitoring, Incident Detection, Alert and Response Management, NATO Science Series, 2005.
W. Shen, X. Li, A. Doan, Constraint-based entity matching, in: Anthony Cohn (Ed.), Proc. 20th National Conference on Artificial intelligence, Pittsburgh, Pennsylvania, pp. 862–867.
M. Szomszor, H. Alani, I. Cantador, K. O’hara, N. Shadbolt, Semantic modelling of user interests based on cross-folksonomy analysis, in: Proc. 7th International Semantic Web Conference, Karlsruhe, Germany, 2008, pp. 632–648.
J. Vassileva, Distributed user modeling for universal information access, in: Proc. 9th Int. Conference of Human–Computer Interaction, HCI’01, New Orleans, Louisiana, 2001, pp. 122–126.
J. Vosecky, D. Hong, V. Y. Shen, User identification across multiple social networks, in: Proc. 1st International Conference on Networked Digital Technologies, Ostrava, The Czech Republic, 2009, pp. 360–365.
Y. Wang, A. Kobsa, Impacts of privacy laws and regulations on personalized systems, in: Proc. Workshop on Privacy-Enhanced Personalization, Montreal, Canada, 2006, pp. 44–46.
Y. Wang, F. Cena, F. Carmagnola, O. Cortassa, C. Gena, N. Stash, L. Aroyo, RSS-based Interoperability for user adaptive systems, in: Proc. 5th International Conference on Adaptive Hypermedia and Adaptive Web-Based Systems, Hannover, Germany, 2008, pp. 353–356.
Wang, 2006, Automatically detecting criminal identity deception: an adaptive detection algorithm, IEEE Trans. Syst. Man Cybern. Part A Syst. Hum., 36, 988, 10.1109/TSMCA.2006.871799
P. Windley, Digital Identity, O’Reilly Media Inc, 2005.
Zadeh, 1978, Fuzzy sets as a basis for a theory of possibility, Fuzzy Sets Syst., 1, 1, 10.1109/FUZZY.1997.616336
R. Zafarani, H. Liu, Connecting corresponding identities across communities, in: Proc. 3rd International AAAI Conference on Weblogs and Social Media, San Jose, California, 2009, pp. 354–357.
E. Zheleva, L. Getoor, To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles, Proc. 18th International Conference on World wide web, Madrid, Spain, 2009, pp. 531–540.