首页 > 最新文献

Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society最新文献

英文 中文
An Adaptive Procedure for Settling Multiple Issues in Bilateral Negotiation with Time Constraints 时间约束下双边谈判中多议题解决的自适应程序
Jieyu Zhan, Xudong Luo, F. Ren, Minjie Zhang, Mukun Cao
The way in which negotiation issues are settled, called issue-settling procedure, is a crucial component in automated multi-issue negotiation models. In most models, the procedure is predefined before a negotiation and cannot be changed during the course of a negotiation. This lacks of flexibility and generosity, which causes difficulties for reaching efficient and effective outcomes, especially in open and dynamic environments. To this end, this paper proposes a procedure that can adaptively settle issues into small packages, in the light of new information, to balance trade-off and time costs. Moreover, we also develop a negotiation protocol that is equipped with our adaptive procedure. Finally, we conduct experiments to show that our adaptive procedure can significantly improve the expected utility and reduce the negotiation time.
协商问题的解决方式,即问题解决程序,是多问题自动协商模型的重要组成部分。在大多数模型中,过程是在协商之前预定义的,不能在协商过程中更改。这种做法缺乏灵活性和慷慨,导致难以取得高效和有效的结果,特别是在开放和动态的环境中。为此,本文提出了一种程序,该程序可以根据新的信息自适应地将问题分解成小包,以平衡权衡和时间成本。此外,我们还开发了一个协商协议,配备了我们的自适应程序。最后,我们通过实验证明,我们的自适应过程可以显著提高期望效用并减少协商时间。
{"title":"An Adaptive Procedure for Settling Multiple Issues in Bilateral Negotiation with Time Constraints","authors":"Jieyu Zhan, Xudong Luo, F. Ren, Minjie Zhang, Mukun Cao","doi":"10.1145/2925995.2925996","DOIUrl":"https://doi.org/10.1145/2925995.2925996","url":null,"abstract":"The way in which negotiation issues are settled, called issue-settling procedure, is a crucial component in automated multi-issue negotiation models. In most models, the procedure is predefined before a negotiation and cannot be changed during the course of a negotiation. This lacks of flexibility and generosity, which causes difficulties for reaching efficient and effective outcomes, especially in open and dynamic environments. To this end, this paper proposes a procedure that can adaptively settle issues into small packages, in the light of new information, to balance trade-off and time costs. Moreover, we also develop a negotiation protocol that is equipped with our adaptive procedure. Finally, we conduct experiments to show that our adaptive procedure can significantly improve the expected utility and reduce the negotiation time.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124390531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Putting Education Back Into Place: Exploring the Potential of Locative Learning Through Mobile Technologies 把教育放回原位:通过移动技术探索位置学习的潜力
Brett Oppegaard
The Factory Model of education in the early 1900s swept farmers from the fields and brought them into nondescript rooms, where they were lined up in rows, forced to face forward, graded like meat, and formally indoctrinated into the prevailing Industrial views of society. A century later, this consolidated model of learning is fracturing under the decentralizing forces of cloud-based Internet technologies, especially through networked smartphones with locative capabilities. As these devices better to get to know their users, and where their users are at, they also are opening up emerging informal learning opportunities. The potential for new forms of immersive and interactive place-based learning creates the sensation of embarking on a never-ending field trip with the Library of Alexandria in your pocket. The half-day workshop presented here will provide an overview of such mobile place-based learning developments, like a Locative 101 class, sharing a sampling of field studies, research projects, and apps, to provide grounding in the field, and direct experimentation with locative media in learning contexts as well as reflection and discussion about those experiences.
20世纪初的工厂教育模式把农民从田地里赶了出来,把他们带到不起眼的房间里,在那里他们排成一排,被迫面向前方,像肉一样被分级,并被正式灌输主流的工业社会观。一个世纪后,这种统一的学习模式在基于云的互联网技术的分散力量下正在破裂,尤其是通过具有定位功能的联网智能手机。随着这些设备更好地了解他们的用户,以及他们的用户在哪里,他们也打开了新兴的非正式学习机会。新形式的沉浸式和互动式基于地点的学习的潜力创造了一种口袋里揣着亚历山大图书馆踏上永无止境的实地旅行的感觉。本次为期半天的研讨会将概述这种基于地点的移动学习的发展,就像Locative 101课程一样,分享实地研究、研究项目和应用程序的样本,为实地提供基础,并在学习环境中直接使用位置媒体进行实验,以及对这些经验的反思和讨论。
{"title":"Putting Education Back Into Place: Exploring the Potential of Locative Learning Through Mobile Technologies","authors":"Brett Oppegaard","doi":"10.1145/2925995.2926055","DOIUrl":"https://doi.org/10.1145/2925995.2926055","url":null,"abstract":"The Factory Model of education in the early 1900s swept farmers from the fields and brought them into nondescript rooms, where they were lined up in rows, forced to face forward, graded like meat, and formally indoctrinated into the prevailing Industrial views of society. A century later, this consolidated model of learning is fracturing under the decentralizing forces of cloud-based Internet technologies, especially through networked smartphones with locative capabilities. As these devices better to get to know their users, and where their users are at, they also are opening up emerging informal learning opportunities. The potential for new forms of immersive and interactive place-based learning creates the sensation of embarking on a never-ending field trip with the Library of Alexandria in your pocket. The half-day workshop presented here will provide an overview of such mobile place-based learning developments, like a Locative 101 class, sharing a sampling of field studies, research projects, and apps, to provide grounding in the field, and direct experimentation with locative media in learning contexts as well as reflection and discussion about those experiences.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121414885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Approach in Face Recognition: Duplicating Facial Images Based on Correlation Study 一种新的人脸识别方法:基于相关性研究的人脸图像复制
R. Senthilkumar, R. K. Gnanamurthy
In this paper, we describe a new approach in face recognition by which the recognition accuracy can be increased substantially. In our approach a detail correlation study has been made on standard database such as Yale face database. Based on correlation coefficient, face images of individuals are duplicated in train set or test set or in both category. Then face databases are tested with standard face recognition algorithms such as Eigen face, Fischer face, KPCA, ICA and 2DPCA. In all these methods, arrangement of faces based on our approach gives better result. The software used to test all these algorithms is open source Scilab.
本文提出了一种新的人脸识别方法,可以大大提高人脸识别的准确率。在此基础上,对耶鲁大学人脸数据库等标准数据库进行了详细的相关性研究。基于相关系数,将个体的人脸图像在训练集或测试集或两个类别中重复。然后用标准的人脸识别算法(如Eigen face、Fischer face、KPCA、ICA和2DPCA)对人脸数据库进行测试。在所有这些方法中,基于本方法的面排列效果较好。用于测试所有这些算法的软件是开源的Scilab。
{"title":"A New Approach in Face Recognition: Duplicating Facial Images Based on Correlation Study","authors":"R. Senthilkumar, R. K. Gnanamurthy","doi":"10.1145/2925995.2926032","DOIUrl":"https://doi.org/10.1145/2925995.2926032","url":null,"abstract":"In this paper, we describe a new approach in face recognition by which the recognition accuracy can be increased substantially. In our approach a detail correlation study has been made on standard database such as Yale face database. Based on correlation coefficient, face images of individuals are duplicated in train set or test set or in both category. Then face databases are tested with standard face recognition algorithms such as Eigen face, Fischer face, KPCA, ICA and 2DPCA. In all these methods, arrangement of faces based on our approach gives better result. The software used to test all these algorithms is open source Scilab.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122761070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Computationally Efficient Fault Tolerant ANTS 计算效率高的容错蚂蚁
Ankit Tripathi, Anant Maheshwari, K. Chandrasekaran
In this paper, we formulate a method to utilize n mobile agents to solve a variant of Ants Nearby Treasure Search problem (ANTS), where an adversary can place treasure at any cell at a distance D from the origin. We devise a method which finds the treasure with the time complexity of O(D + D2 /n + Df) where D is the Manhattan distance of the treasure from the source and f is the maximum number of failures such that f ∈ o(n). The algorithm is specially designed to reduce computation complexity of the distributed system as a whole by efficiently handling failures and also, introducing the elements of parallelism with respect to handling failures. Using our algorithm, we bring down the computation cost/complexity of the system by an order of n, when failures occur, where n is the total number of ants. ANTS problem utilizes the multi-agent system with self-organization and steering based on a control mechanism which is analogous to the problem of discovering resources that are available to the distributed system.
在本文中,我们制定了一种利用n个移动代理来解决蚂蚁附近寻宝问题(Ants)的一种变体的方法,其中对手可以在距离原点D的任何单元中放置宝藏。我们设计了一种寻找宝藏的方法,其时间复杂度为O(D + D2 /n + Df),其中D为宝藏到源的曼哈顿距离,f为最大失败次数,使得f∈O(n)。该算法通过有效地处理故障来降低分布式系统整体的计算复杂度,并在处理故障时引入并行性的元素。使用我们的算法,当发生故障时,我们将系统的计算成本/复杂度降低了n个数量级,其中n为蚂蚁的总数。ANTS问题利用了基于控制机制的具有自组织和导向的多智能体系统,这类似于发现分布式系统可用资源的问题。
{"title":"Computationally Efficient Fault Tolerant ANTS","authors":"Ankit Tripathi, Anant Maheshwari, K. Chandrasekaran","doi":"10.1145/2925995.2926024","DOIUrl":"https://doi.org/10.1145/2925995.2926024","url":null,"abstract":"In this paper, we formulate a method to utilize n mobile agents to solve a variant of Ants Nearby Treasure Search problem (ANTS), where an adversary can place treasure at any cell at a distance D from the origin. We devise a method which finds the treasure with the time complexity of O(D + D2 /n + Df) where D is the Manhattan distance of the treasure from the source and f is the maximum number of failures such that f ∈ o(n). The algorithm is specially designed to reduce computation complexity of the distributed system as a whole by efficiently handling failures and also, introducing the elements of parallelism with respect to handling failures. Using our algorithm, we bring down the computation cost/complexity of the system by an order of n, when failures occur, where n is the total number of ants. ANTS problem utilizes the multi-agent system with self-organization and steering based on a control mechanism which is analogous to the problem of discovering resources that are available to the distributed system.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125812032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Business Processes Management from the Knowledge Management 从知识管理角度改进业务流程管理
M. S. Tabares, L. M. Giraldo, L. Joyanes
This paper proposes a model that integrates the knowledge management to the business processes management in order to improve the process performance. The proposal defines the knowledge management flow as an element that interacts with part workflows and provides rules and actions in the BPMN elements in order to improve the BPM. To achieve the aim, first, a survey was made in forty Colombian' companies in order to identify the state of the practice about business process management, knowledge management and their use through the workflows; then, different elements were identified and characterized in order to achieve the integration model proposed. This was experimented in forty business workflows of the companies analyzed. A use case shows how the interactions among model elements are, and how these can improve the process performance. This experience allowed to measuring the effect that the integration had in the business process management by means of a new metric that involve the knowledge management in the workflow. Finally, it was possible conclude that the knowledge management must be part to the BPM impacting directly the workflow, in order to improve the result offered to the organizational actors and customers.
本文提出了一种将知识管理与业务流程管理相结合的模型,以提高业务流程的性能。该建议将知识管理流定义为与部分工作流交互的元素,并在BPMN元素中提供规则和操作,以改进BPM。为了实现这一目标,首先,在40家哥伦比亚公司进行了一项调查,以确定业务流程管理、知识管理及其通过工作流程的使用的现状;然后,对不同的要素进行识别和表征,以实现所提出的集成模型。这在被分析的公司的40个业务工作流中进行了实验。用例显示了模型元素之间的交互是如何进行的,以及这些交互是如何改进流程性能的。这种经验允许通过涉及工作流中的知识管理的新度量来度量集成在业务流程管理中的效果。最后,可以得出结论,知识管理必须是直接影响工作流的BPM的一部分,以便改进提供给组织参与者和客户的结果。
{"title":"Improving the Business Processes Management from the Knowledge Management","authors":"M. S. Tabares, L. M. Giraldo, L. Joyanes","doi":"10.1145/2925995.2925998","DOIUrl":"https://doi.org/10.1145/2925995.2925998","url":null,"abstract":"This paper proposes a model that integrates the knowledge management to the business processes management in order to improve the process performance. The proposal defines the knowledge management flow as an element that interacts with part workflows and provides rules and actions in the BPMN elements in order to improve the BPM. To achieve the aim, first, a survey was made in forty Colombian' companies in order to identify the state of the practice about business process management, knowledge management and their use through the workflows; then, different elements were identified and characterized in order to achieve the integration model proposed. This was experimented in forty business workflows of the companies analyzed. A use case shows how the interactions among model elements are, and how these can improve the process performance. This experience allowed to measuring the effect that the integration had in the business process management by means of a new metric that involve the knowledge management in the workflow. Finally, it was possible conclude that the knowledge management must be part to the BPM impacting directly the workflow, in order to improve the result offered to the organizational actors and customers.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125845669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cyber Security & Ethical Hacking For SMEs 中小企业网络安全与道德黑客
H. Berger, Andrew Jones
Literature posits that 30,000 SME websites are hacked daily. Thus it is acknowledged that web-based tools are essential to prevent cyber criminals hacking into online networks to comprise their services and gain access to confidential data for improper purposes. We consider the concept of Ethical Hacking where authorized hackers attempt to infiltrate a business's systems/networks on behalf of the owners with the intention of finding security weaknesses. However such security measures are costly and many SMEs lack the knowledge and resources to accomplish this. Utilizing an SME case study we provide insights into how Ethical Hacking, in the form of Penetration Testing using free open source tools, can be used by SMEs to protect their network's services/operations. Using Nmap, Google Hacking, Nessus and Brutus we uncovered 232 network vulnerabilities. Thus measures were put in to place to resolve these vulnerabilities and prevent the case study's sensitive data from future cyber threats.
文献显示,每天有3万家中小企业网站遭到黑客攻击。因此,人们认识到,基于网络的工具对于防止网络犯罪分子侵入在线网络以构成其服务并出于不正当目的获取机密数据至关重要。我们考虑道德黑客的概念,即授权黑客代表业主试图渗透企业的系统/网络,目的是寻找安全漏洞。然而,这种安全措施成本高昂,许多中小企业缺乏实现这一目标的知识和资源。通过一个中小企业案例研究,我们提供了关于道德黑客如何使用免费开源工具以渗透测试的形式被中小企业用来保护其网络服务/运营的见解。使用Nmap、Google Hacking、Nessus和Brutus,我们发现了232个网络漏洞。因此,采取措施解决这些漏洞,防止案例研究的敏感数据受到未来的网络威胁。
{"title":"Cyber Security & Ethical Hacking For SMEs","authors":"H. Berger, Andrew Jones","doi":"10.1145/2925995.2926016","DOIUrl":"https://doi.org/10.1145/2925995.2926016","url":null,"abstract":"Literature posits that 30,000 SME websites are hacked daily. Thus it is acknowledged that web-based tools are essential to prevent cyber criminals hacking into online networks to comprise their services and gain access to confidential data for improper purposes. We consider the concept of Ethical Hacking where authorized hackers attempt to infiltrate a business's systems/networks on behalf of the owners with the intention of finding security weaknesses. However such security measures are costly and many SMEs lack the knowledge and resources to accomplish this. Utilizing an SME case study we provide insights into how Ethical Hacking, in the form of Penetration Testing using free open source tools, can be used by SMEs to protect their network's services/operations. Using Nmap, Google Hacking, Nessus and Brutus we uncovered 232 network vulnerabilities. Thus measures were put in to place to resolve these vulnerabilities and prevent the case study's sensitive data from future cyber threats.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127285373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Co creation of value for Tunisian Environmental Scanning Agriculture Observator 为突尼斯环境扫描农业观察员共同创造价值
Souad Kamoun-Chouk, L. Uden
The implementation of Computer Supported Collaborative Work (CSCW) Environments scanning platform is not trivial because of the different stakeholders involved. The Tunisian ESAO in this paper is used as a case study to show that the failure of the implementation problems lie in the lack of taking contextual intelligence into consideration. There are several contextual issues that we have found impede its adoption. The major failure factors stated were the absence of a shared culture between different stakeholders in organization, structured materials and methods supporting the learning process of knowledge creation. This paper describes how contextual intelligence can be used as a lens to understand the failure of Computer Supported Collaborative Work (CSCW) implementation. To overcome the barriers, we also proposed a new framework for the design of an Environmental scanning platform based on the principles of co creation of value from marketing research.
计算机支持的协同工作(CSCW)环境扫描平台的实现是非常重要的,因为涉及到不同的利益相关者。本文以突尼斯ESAO为案例研究,表明实施问题的失败在于缺乏对情境智能的考虑。我们发现有几个背景问题阻碍了它的通过。所述的主要失败因素是组织中不同利益相关者之间缺乏共同的文化、结构化的材料和支持知识创造学习过程的方法。本文描述了上下文智能如何作为一个透镜来理解计算机支持的协同工作(CSCW)实施的失败。为了克服这些障碍,我们还提出了一个基于市场研究共同创造价值原则的环境扫描平台设计的新框架。
{"title":"Co creation of value for Tunisian Environmental Scanning Agriculture Observator","authors":"Souad Kamoun-Chouk, L. Uden","doi":"10.1145/2925995.2926041","DOIUrl":"https://doi.org/10.1145/2925995.2926041","url":null,"abstract":"The implementation of Computer Supported Collaborative Work (CSCW) Environments scanning platform is not trivial because of the different stakeholders involved. The Tunisian ESAO in this paper is used as a case study to show that the failure of the implementation problems lie in the lack of taking contextual intelligence into consideration. There are several contextual issues that we have found impede its adoption. The major failure factors stated were the absence of a shared culture between different stakeholders in organization, structured materials and methods supporting the learning process of knowledge creation. This paper describes how contextual intelligence can be used as a lens to understand the failure of Computer Supported Collaborative Work (CSCW) implementation. To overcome the barriers, we also proposed a new framework for the design of an Environmental scanning platform based on the principles of co creation of value from marketing research.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130116154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measuring the Effect of Social Network Data on Music Recommendation 测量社交网络数据对音乐推荐的影响
I. Ting, P. Yu
With the rapid growth of online music market, online music providers are devoting on how to recommend suitable music for their customer to fit their interests. Music recommender system is therefore has been developed and researchers are focusing on how to improve the performance of music recommender system. Nowadays, social recommender system has been discussed widely, due to the growth of social networking website. Large amount of social data can be collected and which considered can be used to improve the recommendation quality due to the characteristics of social data. Thus, it is interesting to know the performance when adopting different kind of social data into music recommender system, including "Likes", "Check-in" and "Friends" in a fans page. A series of experiments have been conducted in the paper and to measure the rating of music recommendation by considering those kinds of social data. The experiment results show that the rating is the best when the recommendation that generated by considering all three kinds of social data.
随着网络音乐市场的快速发展,如何根据用户的兴趣为用户推荐合适的音乐成为网络音乐服务商的研究课题。因此,音乐推荐系统得到了发展,如何提高音乐推荐系统的性能成为研究的重点。随着社交网站的发展,社交推荐系统受到了广泛的讨论。由于社交数据的特点,可以收集到大量的社交数据,并考虑利用这些数据来提高推荐质量。因此,在音乐推荐系统中采用不同类型的社交数据,包括粉丝页面中的“Likes”、“Check-in”和“Friends”,会产生怎样的效果,是一件很有趣的事情。本文进行了一系列的实验,并通过考虑这些社会数据来衡量音乐推荐的评级。实验结果表明,综合考虑三种社交数据生成的推荐评分是最好的。
{"title":"Measuring the Effect of Social Network Data on Music Recommendation","authors":"I. Ting, P. Yu","doi":"10.1145/2925995.2926022","DOIUrl":"https://doi.org/10.1145/2925995.2926022","url":null,"abstract":"With the rapid growth of online music market, online music providers are devoting on how to recommend suitable music for their customer to fit their interests. Music recommender system is therefore has been developed and researchers are focusing on how to improve the performance of music recommender system. Nowadays, social recommender system has been discussed widely, due to the growth of social networking website. Large amount of social data can be collected and which considered can be used to improve the recommendation quality due to the characteristics of social data. Thus, it is interesting to know the performance when adopting different kind of social data into music recommender system, including \"Likes\", \"Check-in\" and \"Friends\" in a fans page. A series of experiments have been conducted in the paper and to measure the rating of music recommendation by considering those kinds of social data. The experiment results show that the rating is the best when the recommendation that generated by considering all three kinds of social data.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122872102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knowledge Management in Distance Education: an Exploratory Case Study with Group Storytelling Approach 远程教育中的知识管理:基于小组讲故事方法的探索性案例研究
M. T. Gouvêa, F. Santoro, C. Cappelli, M. Pimentel
Storytelling is an important tool to transfer tacit knowledge that has been increasing its usage in organizations and education. The externalization of knowledge (the conversion of tacit in explicit knowledge) is effectively one of the great challenges of knowledge management. Tacit knowledge is associated with personal experiences and represents the subjective knowledge that is often difficult to be formalized or explained. Group Storytelling is an important approach to help in externalization tacit knowledge through collaborative construction of stories. This paper presents an exploratory case study with tutors of an online course, whose results showed that it is possible to capture the tacit knowledge through this technique with computer system support.
讲故事是传递隐性知识的重要工具,在组织和教育中越来越多地使用隐性知识。知识的外部化(隐性知识向显性知识的转化)是知识管理面临的巨大挑战之一。隐性知识与个人经验有关,是一种难以形式化或解释的主观知识。小组讲故事是通过合作构建故事来帮助隐性知识外化的重要途径。本文以网络课程教师为研究对象进行了探索性案例研究,结果表明,在计算机系统的支持下,该技术可以捕获隐性知识。
{"title":"Knowledge Management in Distance Education: an Exploratory Case Study with Group Storytelling Approach","authors":"M. T. Gouvêa, F. Santoro, C. Cappelli, M. Pimentel","doi":"10.1145/2925995.2926000","DOIUrl":"https://doi.org/10.1145/2925995.2926000","url":null,"abstract":"Storytelling is an important tool to transfer tacit knowledge that has been increasing its usage in organizations and education. The externalization of knowledge (the conversion of tacit in explicit knowledge) is effectively one of the great challenges of knowledge management. Tacit knowledge is associated with personal experiences and represents the subjective knowledge that is often difficult to be formalized or explained. Group Storytelling is an important approach to help in externalization tacit knowledge through collaborative construction of stories. This paper presents an exploratory case study with tutors of an online course, whose results showed that it is possible to capture the tacit knowledge through this technique with computer system support.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123242320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Of clouds and cables: what do students need when they learn with technology? 云与电缆:当学生们用科技学习时,他们需要什么?
M. Oliver
Discussions of technology and education often promise revolution, and freedom from the constraints of campuses and classrooms. There is less discussion of why such infrastructures were needed in the first place, or of the challenges facing learners when these are no longer available. In order to explore such critical alternatives, we can begin to ask different kinds of question. What is the cloud made of? What do learners work with, when they study? Where are they, and what places do they move between? From a sociomaterial perspective, such questions draw attention to the ways in which academic work is encoded, transmitted and stored; how the cloud, far from being nebulous, relies on undersea cables and server farms; and how learners try and coordinate all this as they take bus journeys, sit in class or meet with friends in the bar. These points will be illustrated with examples from a longitudinal study of University students' uses of technology, in which they recorded and described how, where and when they studied. This analysis has implications for the design of e-learning, raising questions about whose responsibility it is to build the infrastructure that students need to learn, and introducing a note of caution to discussions about the transformational potential of technology.
关于技术和教育的讨论往往预示着革命,预示着摆脱校园和课堂束缚的自由。很少有人讨论为什么首先需要这样的基础设施,或者当这些设施不再可用时,学习者面临的挑战。为了探索这些关键的选择,我们可以开始提出不同类型的问题。云是由什么构成的?学习者在学习时使用什么?他们在哪里,他们在哪些地方之间移动?从社会材料的角度来看,这些问题引起了人们对学术工作编码、传输和存储方式的关注;云是如何依赖于海底电缆和服务器群,而不是模糊不清的;以及学习者在乘坐公共汽车、坐在课堂上或在酒吧与朋友见面时如何努力协调所有这些。这些观点将通过一项关于大学生使用技术的纵向研究中的例子来说明,在这项研究中,他们记录并描述了他们是如何、在哪里以及何时学习的。这一分析对电子学习的设计产生了影响,提出了建立学生需要学习的基础设施的责任是谁的问题,并在讨论技术的变革潜力时提出了谨慎的注意事项。
{"title":"Of clouds and cables: what do students need when they learn with technology?","authors":"M. Oliver","doi":"10.1145/2925995.2926051","DOIUrl":"https://doi.org/10.1145/2925995.2926051","url":null,"abstract":"Discussions of technology and education often promise revolution, and freedom from the constraints of campuses and classrooms. There is less discussion of why such infrastructures were needed in the first place, or of the challenges facing learners when these are no longer available. In order to explore such critical alternatives, we can begin to ask different kinds of question. What is the cloud made of? What do learners work with, when they study? Where are they, and what places do they move between? From a sociomaterial perspective, such questions draw attention to the ways in which academic work is encoded, transmitted and stored; how the cloud, far from being nebulous, relies on undersea cables and server farms; and how learners try and coordinate all this as they take bus journeys, sit in class or meet with friends in the bar. These points will be illustrated with examples from a longitudinal study of University students' uses of technology, in which they recorded and described how, where and when they studied. This analysis has implications for the design of e-learning, raising questions about whose responsibility it is to build the infrastructure that students need to learn, and introducing a note of caution to discussions about the transformational potential of technology.","PeriodicalId":159180,"journal":{"name":"Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131595246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1