Nome |
# |
Recommendation in persuasive eHealth systems: An effective strategy to spot users' losing motivation to exercise, file e2f56ed7-d53d-3eaf-e053-3a05fe0a5d97
|
588
|
Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact, file e2f56ed8-a4ef-3eaf-e053-3a05fe0a5d97
|
562
|
Forecasting E-commerce products prices by combining an autoregressive integrated moving average (ARIMA) model and Google Trends data, file e2f56ed8-53e3-3eaf-e053-3a05fe0a5d97
|
400
|
A semantic approach to remove incoherent items from a user profile and improve the accuracy of a recommender system, file e2f56ed7-8277-3eaf-e053-3a05fe0a5d97
|
332
|
ART: group recommendation approaches for automatically detected groups, file e2f56ed7-8273-3eaf-e053-3a05fe0a5d97
|
326
|
Preface, file e2f56ed6-b873-3eaf-e053-3a05fe0a5d97
|
264
|
A holistic auto-configurable ensemble machine learning strategy for financial trading, file e2f56ed9-3b22-3eaf-e053-3a05fe0a5d97
|
264
|
Introduction to the special issue on human–computer interaction and the social web, file e2f56ed7-a1a2-3eaf-e053-3a05fe0a5d97
|
252
|
Predicting workout quality to help coaches support sportspeople, file e2f56ed9-9e9e-3eaf-e053-3a05fe0a5d97
|
201
|
Evaluating the benefits of using proactive transformed-domain-based techniques in fraud detection tasks, file e2f56eda-a3e3-3eaf-e053-3a05fe0a5d97
|
197
|
A new perspective on recommender systems: A class path information model, file e2f56ed7-8279-3eaf-e053-3a05fe0a5d97
|
193
|
Internet of entities (IoE): A blockchain-based distributed paradigm for data exchange between wireless-based devices, file e2f56ed8-0e43-3eaf-e053-3a05fe0a5d97
|
160
|
An e-coaching ecosystem: design and effectiveness analysis of the engagement of remote coaching on athletes, file e2f56eda-bb0e-3eaf-e053-3a05fe0a5d97
|
159
|
Popularity prediction of instagram posts, file e2f56ed9-a7cb-3eaf-e053-3a05fe0a5d97
|
142
|
FootApp: An AI-powered system for football match annotation, file 8cf89869-f553-4f63-abee-e2a6614e0ecf
|
137
|
Statistical arbitrage powered by Explainable Artificial Intelligence, file 5a539080-6469-4b6d-ac3e-39625da65218
|
127
|
Guest Editorial: Behavioral-Data Mining in Information Systems and the Big Data Era, file e2f56ed9-6d04-3eaf-e053-3a05fe0a5d97
|
98
|
Explainable Machine Learning Exploiting News and Domain-Specific Lexicon for Stock Market Forecasting, file e2f56eda-867a-3eaf-e053-3a05fe0a5d97
|
93
|
A local feature engineering strategy to improve network anomaly detection, file e2f56ed9-a30b-3eaf-e053-3a05fe0a5d97
|
64
|
Event Detection in Finance Using Hierarchical Clustering Algorithms on News and Tweets, file e2f56eda-6da7-3eaf-e053-3a05fe0a5d97
|
47
|
Ensembling and Dynamic Asset Selection for Risk-Controlled Statistical Arbitrage, file e2f56eda-7df8-3eaf-e053-3a05fe0a5d97
|
30
|
Influencing brain waves by evoked potentials as biometric approach: taking stock of the last six years of research, file 8bb93c3a-55ba-4a00-881c-566a061c6116
|
24
|
CulturAI: Semantic Enrichment of Cultural Data Leveraging Artificial Intelligence, file 7ca2f590-ac10-4645-b32d-beca108eccdb
|
18
|
Wireless internet, multimedia, and artificial intelligence: new applications and infrastructures, file e2f56eda-4604-3eaf-e053-3a05fe0a5d97
|
13
|
Fair performance-based user recommendation in eCoaching systems, file 0f450558-2bce-49bd-9062-507de97a3cdd
|
10
|
A Practical Approach for Vehicle Speed Estimation in Smart Cities, file 3200b483-4f5e-4dc5-aca9-0ac14b50f632
|
8
|
Design Guidelines for an Enhanced Interaction Experience in the Domain of Smartphone-Based Applications for Sport and Fitness, file e2f56ed4-0975-3eaf-e053-3a05fe0a5d97
|
8
|
A Region-based Training Data Segmentation Strategy to Credit Scoring, file 438dcd96-ab64-4561-ae54-bfde73127a02
|
7
|
Semantics-aware content-based recommender systems: Design and architecture guidelines, file e2f56ed6-af5a-3eaf-e053-3a05fe0a5d97
|
7
|
Fraud detection for E-commerce transactions by employing a prudential Multiple Consensus model, file e2f56ed7-f38a-3eaf-e053-3a05fe0a5d97
|
7
|
Leveraging the Training Data Partitioning to Improve Events Characterization in Intrusion Detection Systems, file e91fe897-ef1a-4f6d-9251-12507b2a5f69
|
7
|
null, file e2f56ed6-ae3a-3eaf-e053-3a05fe0a5d97
|
5
|
Fully-automated deep learning pipeline for segmentation and classification of breast ultrasound images, file faf558df-c685-4b47-a58c-fd2abf29f76c
|
5
|
Discovery and representation of the preferences of automatically detected groups: Exploiting the link between group modeling and clustering, file e2f56ed6-b486-3eaf-e053-3a05fe0a5d97
|
4
|
Improving the accuracy of latent-space-based recommender systems by introducing a cut-off criterion, file e2f56ed6-b5d8-3eaf-e053-3a05fe0a5d97
|
4
|
Using neural word embeddings to model user behavior and detect user segments, file e2f56ed6-b8ad-3eaf-e053-3a05fe0a5d97
|
4
|
A discretized extended feature space (DEFS) model to improve the anomaly detection performance in network intrusion detection systems, file e2f56ed8-d4ca-3eaf-e053-3a05fe0a5d97
|
4
|
Credit scoring by leveraging an ensemble stochastic criterion in a transformed feature space, file e2f56eda-05a8-3eaf-e053-3a05fe0a5d97
|
4
|
Experiences from a long run with a virtual personal trainer, file e2f56ed4-20e9-3eaf-e053-3a05fe0a5d97
|
3
|
44.6% processing cycles reduction in GSM voice coding by low-power reconfigurable co-processor architecture, file e2f56ed5-30ca-3eaf-e053-3a05fe0a5d97
|
3
|
Influence of rating prediction on group recommendation's accuracy, file e2f56ed6-ae39-3eaf-e053-3a05fe0a5d97
|
3
|
Binary sieves: Toward a semantic approach to user segmentation for behavioral targeting, file e2f56ed6-b260-3eaf-e053-3a05fe0a5d97
|
3
|
Popularity does not always mean triviality: introduction of popularity criteria to improve the accuracy of a recommender system, file e2f56ed6-b5dc-3eaf-e053-3a05fe0a5d97
|
3
|
A linear-dependence-based approach to design proactive credit scoring models, file e2f56ed6-b879-3eaf-e053-3a05fe0a5d97
|
3
|
Network-adaptive management of computation energy in wireless sensor networks, file e2f56ed6-bcd9-3eaf-e053-3a05fe0a5d97
|
3
|
A fourier spectral pattern analysis to design credit scoring models, file e2f56ed8-13d4-3eaf-e053-3a05fe0a5d97
|
3
|
A wavelet-based data analysis to credit scoring, file e2f56ed8-13d6-3eaf-e053-3a05fe0a5d97
|
3
|
Introducing a vector space model to perform a proactive credit scoring, file e2f56ed8-36e3-3eaf-e053-3a05fe0a5d97
|
3
|
A supervised multi-class multi-label word embeddings approach for toxic comment classification, file e2f56ed8-7ff9-3eaf-e053-3a05fe0a5d97
|
3
|
A discretized enriched technique to enhance machine learning performance in credit scoring, file e2f56ed8-b686-3eaf-e053-3a05fe0a5d97
|
3
|
null, file e2f56eda-8140-3eaf-e053-3a05fe0a5d97
|
3
|
Deep learning and time series-to-image encoding for financial forecasting, file e2f56eda-93ea-3eaf-e053-3a05fe0a5d97
|
3
|
Efficient thumbnail identification through object recognition, file e2f56eda-a784-3eaf-e053-3a05fe0a5d97
|
3
|
Dynamic Industry-Specific Lexicon Generation for Stock Market Forecast, file e2f56eda-c09c-3eaf-e053-3a05fe0a5d97
|
3
|
Brain Waves and Evoked Potentials as Biometric User Identification Strategy: An Affordable Low-cost Approach, file 92a6379d-cd69-469c-8d50-e84d881c2e6e
|
2
|
The role of social interaction on users motivation to exercise: A persuasive web framework to enhance the self-management of a healthy lifestyle, file e2f56ed6-b39b-3eaf-e053-3a05fe0a5d97
|
2
|
UP SCHOOL: Introduction of pervasive learning technologies to enhance classic educational models, file e2f56ed6-b435-3eaf-e053-3a05fe0a5d97
|
2
|
A proactive Time-Frame Convolution Vector (TFCV) technique to detect frauds attempts in e-commerce transactions, file e2f56ed6-b648-3eaf-e053-3a05fe0a5d97
|
2
|
An entropy based algorithm for credit scoring, file e2f56ed6-b7da-3eaf-e053-3a05fe0a5d97
|
2
|
A class-based strategy to user behavior modeling in recommender systems, file e2f56ed6-b7de-3eaf-e053-3a05fe0a5d97
|
2
|
Exploiting the evaluation frequency of the items to enhance the recommendation accuracy, file e2f56ed6-b7df-3eaf-e053-3a05fe0a5d97
|
2
|
Introducing a weighted ontology to improve the graph-based semantic similarity measures, file e2f56ed6-b839-3eaf-e053-3a05fe0a5d97
|
2
|
A frequency-domain-based pattern mining for credit card fraud detection, file e2f56ed6-b875-3eaf-e053-3a05fe0a5d97
|
2
|
Keep the beat: Audio guidance for runner training, file e2f56ed6-b912-3eaf-e053-3a05fe0a5d97
|
2
|
NewsVallum: Semantics-Aware Text and Image Processing for Fake News Detection system, file e2f56ed7-a92e-3eaf-e053-3a05fe0a5d97
|
2
|
Evaluating credit card transactions in the frequency domain for a proactive fraud detection approach, file e2f56ed8-584f-3eaf-e053-3a05fe0a5d97
|
2
|
A General Approach for Risk Controlled Trading Based on Machine Learning and Statistical Arbitrage, file e2f56ed9-c1f7-3eaf-e053-3a05fe0a5d97
|
2
|
Automated tag enrichment by semantically related trends, file e2f56eda-a787-3eaf-e053-3a05fe0a5d97
|
2
|
Methods for hardware reduction and overall performance improvement in communication systems, file e2f56ed3-a0c6-3eaf-e053-3a05fe0a5d97
|
1
|
Area and Power Modeling for Networks-on-Chip with Layout Awareness, file e2f56ed3-c383-3eaf-e053-3a05fe0a5d97
|
1
|
Reconfigurable Coprocessor for Multimedia Application Domain, file e2f56ed3-d921-3eaf-e053-3a05fe0a5d97
|
1
|
A FEEDBACK-BASED APPROACH TO DVFS IN DATA-FLOW APPLICATIONS, file e2f56ed3-d925-3eaf-e053-3a05fe0a5d97
|
1
|
Workshop on engineering human-computer interaction in recommender systems, file e2f56ed6-ac6a-3eaf-e053-3a05fe0a5d97
|
1
|
Exploiting a determinant-based metric to evaluate a word-embeddings matrix of Items, file e2f56ed6-af57-3eaf-e053-3a05fe0a5d97
|
1
|
Representing items as word-embedding vectors and generating recommendations by measuring their linear independence, file e2f56ed6-b266-3eaf-e053-3a05fe0a5d97
|
1
|
Analysis of the properties that affect the accuracy of a group recommender system, file e2f56ed7-8e7b-3eaf-e053-3a05fe0a5d97
|
1
|
Recommender system lets coaches identify and help athletes who begin losing motivation, file e2f56ed7-9cc9-3eaf-e053-3a05fe0a5d97
|
1
|
Using behavioral data mining to produce friend recommendations in a social bookmarking system, file e2f56ed7-a13a-3eaf-e053-3a05fe0a5d97
|
1
|
Employing document embeddings to solve the "new catalog" problem in user targeting, and provide explanations to the users, file e2f56ed7-c2e2-3eaf-e053-3a05fe0a5d97
|
1
|
Friend recommendation in a social bookmarking system: Design and architecture guidelines, file e2f56ed7-d450-3eaf-e053-3a05fe0a5d97
|
1
|
A latent semantic pattern recognition strategy for an untrivial targeted advertising, file e2f56ed7-d8cd-3eaf-e053-3a05fe0a5d97
|
1
|
Multiple behavioral models: A divide and conquer strategy to fraud detection in financial data streams, file e2f56ed7-dc3e-3eaf-e053-3a05fe0a5d97
|
1
|
Second workshop on engineering computer-human interaction in recommender systems (EnCHIReS), file e2f56ed7-eca4-3eaf-e053-3a05fe0a5d97
|
1
|
Modeling real-time data and contextual information from workouts in eCoaching platforms to predict users’ sharing behavior on Facebook, file e2f56ed8-1ed8-3eaf-e053-3a05fe0a5d97
|
1
|
A combined entropy-based approach for a proactive credit scoring, file e2f56ed8-c689-3eaf-e053-3a05fe0a5d97
|
1
|
Fraud detection for E-commerce transactions by employing a prudential Multiple Consensus model, file e2f56ed9-224f-3eaf-e053-3a05fe0a5d97
|
1
|
null, file e2f56ed9-5ecf-3eaf-e053-3a05fe0a5d97
|
1
|
A Two-Step Feature Space Transforming Method to Improve Credit Scoring Performance, file e2f56ed9-c1f5-3eaf-e053-3a05fe0a5d97
|
1
|
A feature space transformation to intrusion detection systems, file e2f56ed9-d965-3eaf-e053-3a05fe0a5d97
|
1
|
null, file e2f56ed9-dbc8-3eaf-e053-3a05fe0a5d97
|
1
|
null, file e2f56ed9-f4f6-3eaf-e053-3a05fe0a5d97
|
1
|
A Voice User Interface for football event tagging applications, file e2f56eda-ae2a-3eaf-e053-3a05fe0a5d97
|
1
|
Totale |
4.875 |