QuickSearch:   Number of matching entries: 0.

AuthorTitleYearJournal/ProceedingsReftypeDOI/URL
Köbler, F., Koene, P., Krcmar, H., Altmann, M. & Leimeister, J. M. LocaTag - An NFC-based system enhancing instant messaging tools with real-time user location 2010 2. International Workshop on Near Field Communication (NFC) 2010   inproceedings URL  
BibTeX:
@inproceedings{ls_leimeister,
  author = {Köbler, F. and Koene, P. and Krcmar, H. and Altmann, M. and Leimeister, J. M.},
  title = {LocaTag - An NFC-based system enhancing instant messaging tools with real-time user location},
  booktitle = {2. International Workshop on Near Field Communication (NFC) 2010},
  year = {2010},
  volume = {2},
  note = {180 (28-10)},
  url = {http://www.uni-kassel.de/fb7/ibwl/leimeister/pub/JML_156.pdf}
}
Mauro, C., Happle, T., Sunyaev, A., M.Leimeister, J. & Krcmar, H. From medical processes to workflows: modeling of clinical pathways with the unified modeling language 2010 3. International Conference on Health Informatics (HealthInf) 2010   inproceedings URL  
BibTeX:
@inproceedings{ls_leimeister,
  author = {Mauro, C. and Happle, T. and Sunyaev, A. and M.Leimeister, J. and Krcmar, H.},
  title = {From medical processes to workflows: modeling of clinical pathways with the unified modeling language},
  booktitle = {3. International Conference on Health Informatics (HealthInf) 2010},
  year = {2010},
  note = {161 (9-10)},
  url = {http://www.uni-kassel.de/fb7/ibwl/leimeister/pub/JML_154.pdf}
}
Sunyaev, A., Leimeister, J. M. & Krcmar, H. Open security issues in German healthcare telematics 2010 3. International Conference on Health Informatics (HealthInf) 2010   inproceedings URL  
BibTeX:
@inproceedings{ls_leimeister,
  author = {Sunyaev, A. and Leimeister, J. M. and Krcmar, H.},
  title = {Open security issues in German healthcare telematics},
  booktitle = {3. International Conference on Health Informatics (HealthInf) 2010},
  year = {2010},
  note = {162 (10-10)},
  url = {http://www.uni-kassel.de/fb7/ibwl/leimeister/pub/JML_155.pdf}
}
Sunyaev, A., Tremmel, F., Mauro, C., Leimeister, J. M. & Krcmar, H. A Re-Classification of IS security analysis approaches 2009 Proceedings of the Fifteenth Americas Conference on Information Systems (AMCIS)   inproceedings URL  
BibTeX:
@inproceedings{ls_leimeister,
  author = {Sunyaev, A. and Tremmel, F. and Mauro, C. and Leimeister, J. M. and Krcmar, H.},
  title = {A Re-Classification of IS security analysis approaches},
  booktitle = {Proceedings of the Fifteenth Americas Conference on Information Systems (AMCIS)},
  year = {2009},
  note = {127 (11-09)},
  url = {http://www.uni-kassel.de/fb7/ibwl/leimeister/pub/JML_137.pdf}
}
Hornung, G. Systems and Data Protection Legislation in Germany 2008   article  
BibTeX:
@article{Hornung2008g,
  author = {Hornung, Gerrit},
  title = {Systems and Data Protection Legislation in Germany},
  year = {2008},
  pages = {1088-1093}
}
Jäschke, R., Marinho, L., Hotho, A., Schmidt-Thieme, L. & Stumme, G. Tag Recommendations in Social Bookmarking Systems 2008 AI Communications   article DOIURL  
Abstract: Collaborative tagging systems allow users to assign keywords - so called "tags" - to resources. Tags are used for navigation, finding resources and serendipitous browsing and thus provide an immediate benefit for users. These systems usually include tag recommendation mechanisms easing the process of finding good tags for a resource, but also consolidating the tag vocabulary across users. In practice, however, only very basic recommendation strategies are applied.
this paper we evaluate and compare several recommendation algorithms on large-scale real life datasets: an adaptation of
er-based collaborative filtering, a graph-based recommender built on top of the FolkRank algorithm, and simple methods based on counting tag occurences. We show that both FolkRank and Collaborative Filtering provide better results than non-personalized baseline methods. Moreover, since methods based on counting tag occurrences are computationally cheap, and thus usually preferable for real time scenarios, we discuss simple approaches for improving the performance of such methods. We show, how a simple recommender based on counting tags from users and resources can perform almost as good as the best recommender.
BibTeX:
@article{jaeschke2008tag,
  author = {Jäschke, Robert and Marinho, Leandro and Hotho, Andreas and Schmidt-Thieme, Lars and Stumme, Gerd},
  title = {Tag Recommendations in Social Bookmarking Systems},
  journal = {AI Communications},
  publisher = {IOS Press},
  year = {2008},
  volume = {21},
  number = {4},
  pages = {231-247},
  url = {http://dx.doi.org/10.3233/AIC-2008-0438},
  doi = {http://dx.doi.org/10.3233/AIC-2008-0438}
}
Krause, B., Schmitz, C., Hotho, A. & Stumme, G. The Anti-Social Tagger - Detecting Spam in Social Bookmarking Systems 2008 Proc. of the Fourth International Workshop on Adversarial Information Retrieval on the Web   inproceedings URL  
BibTeX:
@inproceedings{krause2008antisocialb,
  author = {Krause, Beate and Schmitz, Christoph and Hotho, Andreas and Stumme, Gerd},
  title = {The Anti-Social Tagger - Detecting Spam in Social Bookmarking Systems},
  booktitle = {Proc. of the Fourth International Workshop on  Adversarial Information Retrieval on the Web},
  year = {2008},
  url = {http://airweb.cse.lehigh.edu/2008/submissions/krause_2008_anti_social_tagger.pdf}
}

Created by JabRef export filters on 24/04/2024 by the social publication management platform PUMA