๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

[ACM Press the 12th International Conference - Saint Petersburg, Russia (2009.03.24-2009.03.26)] Proceedings of the 12th International Conference on Extending Database Technology Advances in Database Technology - EDBT '09 - It takes variety to make a world

โœ Scribed by Yu, Cong; Lakshmanan, Laks; Amer-Yahia, Sihem


Book ID
124099173
Publisher
ACM Press
Year
2009
Weight
447 KB
Category
Article
ISBN
1605584223

No coin nor oath required. For personal study only.

โœฆ Synopsis


Recommendations in collaborative tagging sites such as del.icio.us and Yahoo! Movies, are becoming increasingly important, due to the proliferation of general queries on those sites and the ineffectiveness of the traditional search paradigm to address those queries. Regardless of the underlying recommendation strategy, item-based or user-based, one of the key concerns in producing recommendations, is over-specialization, which results in returning items that are too homogeneous. Traditional solutions rely on post-processing returned items to identify those which differ in their attribute values (e.g., genre and actors for movies). Such approaches are not always applicable when intrinsic attributes are not available (e.g., URLs in del.icio.us). In a recent paper [20], we introduced the notion of explanation-based diversity and formalized the diversification problem as a compromise between accuracy and diversity. In this paper, we develop efficient diversification algorithms built upon this notion. The algorithms explore compromises between accuracy and diversity. We demonstrate their efficiency and effectiveness in diversification on two real life data sets: del.icio.us and Yahoo! Movies.


๐Ÿ“œ SIMILAR VOLUMES


[ACM Press the 12th International Confer
โœ Wang, Hui (Wendy); Liu, Ruilin ๐Ÿ“‚ Article ๐Ÿ“… 2009 ๐Ÿ› ACM Press โš– 455 KB

Publishing microdata raises concerns of individual privacy. When there exist outlier records in the microdata, the distinguishability of the outliers enables their privacy to be easier to be compromised than that of regular ones. However, none of the existing anonymization techniques can provide suf