Two-way latent grouping model for user preference prediction
Eerika Savia, Kai Puolamäki, Janne Sinkkonen and Samuel Kaski
In: UAI 2005, 26-29 July 2005, Edinburgh, Scotland.
This page has been created to provide organisations and individuals using the OECD Privacy Statement Generator with information about international instruments and national regulations which apply to the ...
The User Interface Design group studies new user interface techniques, focusing on two areas:
* Usable automation. Our goal is for every computer user to be able to harness the power of automation for handling repetitive, time-wasting, or error-prone tasks, without having to struggle with the complexity of programming.
* Usable security. Effective security depends on good user interfaces. A door may have the strongest lock in the world, but if authorized users can't open and close it easily, and have to leave it open in order to get their jobs done, then it has no security at all. We are studying ways to rethink computer security so that it is not only secure against attack but also usable by ordinary people.
A question I hear pretty frequently is, “Why a redesign of the admin panel so soon after 2.5?” Those who have attended WordCamps in the past few months have already heard the answer, but for the people who haven’t had that opportunity, this post is for you.
When the community response to the 2.5 admin [...]
Hi! If you think I add value to your network, do drop me a recommendation at http://mrtweet.net/jomiralb?gr Much appreciated! [from http://twitter.com/jomiralb/statuses/1218488446]
This document provides an in-depth look at the process used in trying to solve real issues with the User Experience of a social bookmarking application. While it might be easy to simply take the first solution that works and assume that it’s the best solution, the first solution is very rarely the best solution. We found several solutions to several problems, and many of them worked and appeared to be decent solutions. It was only upon further investigation and doing more detailed research that we found hidden flaws in some solutions, issues with user satisfaction in other solutions, and even found some solutions that broke entirely under certain conditions.
This paper will describe the problems we faced in detail and then provide an explanation of the solutions evaluated for each problem, including the benefits and drawbacks of each solution. We will also identify the final solution chosen and why it was chosen.
With all the skepticism of whether it's just a social media fad and questions about how the company expects to generate revenue, Twitter has left many critics silent by continuing to grow.
Wir wollen mithelfen, dass die Welt von morgen ein kleines bisschen benutzbarer wird. Dazu legen wir auf UXcite unsere Erfahrungen aus dem Bereich User Experience dar und hoffen darauf jede Menge Gleichgesinnte zum Austausch zu finden.
So to map your files with user id 1001 in /mnt/wrong to /mnt/correct with user id 1234, run this command:
sudo bindfs --map=1001/1234 /mnt/wrong /mnt/correct
This paper deals with how to calculate semantic similarity between user profiles. They want to find for example similar users, which share common interests.
The Nielsen Company: Hamburg (ots) - Wann auch immer in den letzten Monaten plötzliche Ereignisse die mediale Berichterstattung dominierten: Die Nutzer des Microblogging-Dienstes Twitter ware
M. Schwaller, D. Lalanne, and O. Khaled. In proc. of the 6th Nordic Conference on Human-Computer Interaction (NordiCHI 2010), page 773--776. Reykjavik, Iceland, (October 2010)
S. Jumisko-Pyykkö, M. Weitzel, and D. Strohmeier. Proceedings of the 1st international conference on Designing interactive user experiences for TV and video, page 183--192. New York, NY, USA, ACM, (2008)
E. Law, V. Roto, M. Hassenzahl, A. Vermeeren, and J. Kort. Proceedings of the 27th international conference on Human factors in computing systems, page 719--728. New York, NY, USA, ACM, (2009)
N. Wanas, M. El-Saban, H. Ashour, and W. Ammar. Proceedings of the 2nd ACM workshop on Information credibility on the web, page 19--26. New York, NY, USA, ACM, (2008)
I. Gurevych, S. Merten, and R. Porzel. Proceedings of the HLT-NAACL 2003 Workshop on Software Engineering and Architecture of Language Technology Systems (SEALTS), Edmonton, Canada, page 59-66. (2003)
G. Broll, S. Keck, P. Holleis, and A. Butz. Proceedings of MobileHCI '09: 11th International Conference on Human Computer Interaction with Mobile Devices and Services, Bonn, Germany, (2009)
M. Romanelli, D. Sonntag, and N. Reithinger. Poster and Demo Proceedings of the 1st International Conference on Semantic and Digital Media Technologies (SAMT-2006), Athens, Greece, volume 233 of CEUR Workshop Proceedings, Sun SITE Central Europe, (2007)
A. Neto, T. Bittar, R. Fortes, and K. Felizardo. SAC '09: Proceedings of the 2009 ACM Symposium on Applied Computing, Honolulu, HI, USA, page 116-120. (2009)
P. Gebhard, T. Schneeberger, T. Baur, and E. André. Proceedings of the Seventeenth International Conference on Autonomous Agents and Multiagent Systems (AAMAS '18), Stockholm, Sweden, page ?--?. New York, ACM, (2018)to appear.
M. Barz, M. Moniri, M. Weber, and D. Sonntag. Adjunct Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '16), Heidelberg, Germany, page 17--20. New York, ACM, (2016)
B. Liu, H. Chen, and W. He. ICTAI '05: Proceedings of the 17th IEEE International Conference on Tools with Artificial Intelligence, Hong Kong, China, page 254-259. (2005)
R. Catizone, A. Setzer, and Y. Wilks. Proceedings of the EACL 2003 Workshop on Dialogue Systems: Interaction, Adaptation, and Styles of Management, Budapest, Hungary, (2003)