SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Following the User’s Interests in Mobile Context-Aware
                           Recommender Systems : The hybrid-ε-greedy algorithm




                             Djallel Bouneffouf, Amel Bouzeghoub & Alda Lopes Gançarski
           Department of Computer Science, Télécom SudParis, UMR CNRS Samovar, 91011 Evry Cedex, France
                         {Djallel.Bouneffouf, Amel.Bouzeghoub, Alda.Gancarski}@it-sudparis.eu



Abstract— The wide development of mobile applications               based on his current context. This goal matches with the goal
provides a considerable amount of data of all types (images,        of recommender systems.
texts, sounds, videos, etc.). In this sense, Mobile Context-aware        Both context-aware systems and recommender systems
Recommender Systems (MCRS) suggest the user suitable                are used to provide users with relevant information and/or
information depending on her/his situation and interests. Two       services; the first based on the user’s context; the second
key questions have to be considered 1) how to recommend the         based on the user’s interests. Therefore, the next logical step
user information that follows his/her interests evolution? 2)       is to combine these two systems within the so-called mobile
how to model the user’s situation and its related interests? To     context-aware recommender systems.
the best of our knowledge, no existing work proposing a MCRS
                                                                         The notion of context is not new. In general, it refers to
tries to answer both questions as we do. This paper describes
an ongoing work on the implementation of a MCRS based on
                                                                    any information that is relevant to the user and his/her
the hybrid-ε-greedy algorithm we propose, which combines the        surroundings. The main difficulty when dealing with context
standard ε-greedy algorithm and both content-based filtering        is its high dynamicity and its constant change. A change in
and case-based reasoning techniques.                                one contextual feature may generate changes in other
                                                                    contextual features. That’s why context-aware systems have
    Keywords-component; context-aware recommender systems;          to be adapted to highly dynamic user situations and context
personalization; situation.                                         models need to capture the dynamic interactions between
                                                                    contextual information.
                      I.    INTRODUCTION                                 Several works in context-aware systems have addressed
                                                                    the problem of context modeling and interesting single or
     Mobile technologies have made access to a huge                 hybrid models exist. Most of them are gathered in the survey
collection of information, anywhere and anytime. Thereby,           done in [5]. However, these models have not been widely
information is customized according to users’ needs and             applied to the mobile application domain. The dynamic
preferences. This brings big challenges for the                     interactions between contextual dimensions and user profiles
Recommender System field. Indeed, technical features of             have not been fully represented by the existing models which
mobile devices yield to navigation practices which are more         often focus on modeling static associations among different
difficult than the traditional navigation task.                     contextual information.
     Recommender systems are systems that produce                        In recommender systems, a considerable amount of
individualized suggestions concerning interesting content the       research has been done in recommending relevant
user might like out of a large number of alternatives. Often,       information for mobile users. Earlier techniques ([12], [15])
recommender systems using collaborative or content-based            are based solely on the computational behavior of the user to
filtering algorithms are applied.                                   model his interests regardless of his surrounding
     In mobile applications, information personalization is         environment (location, time, nearby people). The main
even more important, because of the limitations of mobile           limitation of such approaches is that they do not take into
devices in terms of displays, input capabilities, bandwidth         account the contextual evolution of the user interests w. r. t.
etc. It is then desirable to personalize not only using pre-        his context.
defined user profiles, but also the user’s context such as the           This study gives rise to another category of
current location.                                                   recommendation techniques that tackle these limitations
     We can find similar challenges in context-aware systems        when building situation-aware user profiles. Two key
area. A general definition of context-aware systems is given        questions have to be considered, namely 1) how to
in [4]: “A system is context-aware if it uses context to            recommend the user information that follows his/her
provide relevant information and/or services to the user,           interests evolution? 2) how to model the user’s situation and
where relevancy depends on the user’s task.”                        its related user’s interests?
     The key goal of context-aware systems is hence to
provide a user with relevant information and/or services
In order to tackle these problems, our approach consists     documents may be chosen. However, obtaining information
of:                                                                about the documents’ average rewards (i.e., exploration) can
         Capturing context through communication with             refine B’s estimate of the documents’ rewards and in turn
          diverse information sources: from the mobile device      increase long-term user’s satisfaction. Clearly, neither a
          GPS capability, if it is possible, or by inferring a     purely exploring nor a purely exploiting algorithm works
          user’s location based on the user’s calendar or other    best in general, and a good tradeoff is needed. The authors
          devices in the neighborhood.                             on [7, 8, 16] describe a smart way to balance exploration and
         Storing history for future use or user habit analysis.   exploitation. However, none of them consider the user’s
         Reasoning and learning capabilities to be able to (i)    situation during the recommendation.
          use the collected contextual information for mapping     B. Modeling the situation and user profile
          low-level information to symbolic contextual
          information (e.g. mapping an exact coordinate to a           Few research works are dedicated to manage the user’s
          symbolic location such as an address) or to deduce       situation on recommendation. In [2, 9, 10] the authors
          higher level information i.e. identify user situation    propose a method which consists of building a dynamic
          and recommend the most relevant content according        user’s profile based on time and user’s experience. The
          to the situation (e.g. determine that the user is in a   user’s preferences in the user’s profile are weighted
          room where a meeting is in progress so the cell          according to the situation (time, location) and the user’s
          phone should be switched to silent mode); (ii) learn     behavior. To model the evolution on the user’s preferences
          the behavior based on reasoning and the history data     according to his temporal situation in different periods, (like
          (e.g. whenever the user enters a room which has a        workday or vacations), the weighted association for the
          meeting in progress or where the next event is a         concepts in the user’s profile is established for every new
          meeting, the user turns the volume of the cell phone     experience of the user. The user’s activity combined with the
          down and searches for the meeting agenda. The            user's profile are used together to filter and recommend
          system may learn this behavior for the next time).       relevant content.
                                                                       Another work [6] describes a MCRS operating on three
    The remainder of the paper is organized as follows.            dimensions of context that complement each other to get
Section II reviews some related works. Section III presents        highly targeted. First, the MCRS analyzes information such
the user model. Section IV introduces the recommendation           as clients’ address books to estimate the level of social
algorithm and the last section concludes the paper and points      affinity among users. Second, it combines social affinity with
out possible directions for future work.                           the spatiotemporal dimensions and the user’s history in order
                                                                   to improve the quality of the recommendations.
                       II.   BACKGROUND                                In [1], the authors present a technique to perform user-
                                                                   based collaborative filtering. Each user’s mobile device
    We mention now recent relevant recommendation
                                                                   stores all explicit ratings made by its owner as well as ratings
techniques that tackle the two issues mentioned above,
                                                                   received from other users. Only users in spatiotemporal
namely: following the evolution of user’s interests and
                                                                   proximity are able to exchange ratings and they show how
modeling the situation and user profile.
                                                                   this provides a natural filtering based on social contexts.
A. Following the evolution of user’s interests                         Each work cited above tries to recommend interesting
     The trend today on recommender systems is to suggest          information to users on contextual situation; however they
relevant information to users, using supervised machine            do not consider the evolution of the user interest.
learning techniques. In these approaches, the recommender
system has to execute two steps: (1) the learning step, where         To summarize, none of the mentioned works tackles both
the system learns from samples and gradually adjusts its           problems. As a result, our approach exploits the following
parameters; (2) the exploitation step, where new samples are       new features:
presented to the system to perform a generalization [18].              We consider user situations as a multi-dimensional
     These approaches suffer from the following drawbacks:                space where each dimension is represented by a
(i) need for initial information about the user’s interests               domain ontology. Unlike in [1, 2, 6, 10], where
provided by an expert; (ii) difficulty in following the                   context items are low level data, in our approach
evolution of the user’s interests. Some works found in the                they correspond to concepts of social, location and
literature [7, 8, 16] address these problems as a need for                time ontologies. Each situation is associated to
balancing exploration and exploitation studied in the “bandit             specific user profile and preferences.
algorithm”. A bandit algorithm B exploits its past experience          Inspired by models of human reasoning developed
to select documents that appear more frequently. Besides,                 by [14] in robotic, we propose to consider user's
these seemingly optimal documents may in fact be                          situation in the bandit algorithm by using case-based
suboptimal, due to imprecision in B’s knowledge. In order to              reasoning technique, which is not considered in [7,
avoid this undesired situation, B has to explore documents                8, 9, 16].
by actually choosing seemingly suboptimal documents so as              In [7, 8, 16] authors use a smart bandit algorithm to
to gather more information about them. Exploitation can                   manage the exploration/exploitation strategy,
increase short-term user’s satisfaction since some suboptimal             however they do not take into account the content in
the strategy. Our intuition is that, considering the          - The indirect preference: it is the information that we
        content when managing the exploration/exploitation        extract from the user system interaction, for example the
        strategy will improve it. This is why we propose to       number of clicks on the visited documents or the time spent
        use content-based filtering techniques together with      on a document.
        ε-greedy algorithm.                                           Let UP be the preferences submitted by a specific user in
                                                                  the system at a given situation. Each document in UP is
    In what follows, we define the structure of the proposed      represented as a single vector d=(c1,...,cn), where ci (i=1, ..,
user model and the methods for inferring the                      n) is the value of a component characterizing the preferences
recommendation situations. Then, we explain how to build          of d. We consider the following components: the total
dynamic user profiles, and how to manage the                      number of clicks on d, the total time spent reading d, the
exploration/exploitation strategy, according to the current       number of times d was recommended, and the direct
situation.                                                        preference rate on d.
                                                                    2) History
                                                                      All the interactions between the user and the system are
             III.   THE PROPOSED USER’S MODEL                     stored as well as the situations in order to exploit this data to
    As stated in Section II, static approaches for building the   improve the recommendation process.
user’s profile [12, 15] are poorly useful in our context, so we       calendar Before each meeting, the user has to fill-up the
rather focus on more dynamic techniques, capable of               calendar with information concerning the person(s) to meet,
continuously adjusting the user’s interests to the current        Time and Location instances are automatically inferred by
situation.                                                        the system.
    Figure 1 depicts the diagram of the proposed user model.
                                                                  B. User Situation
                                                                      A situation S can be represented as a triple whose
                                                                  features X are the values assigned to each dimension: S = (Xl,
                                                                  Xt, Xs), where Xl (resp. Xt and Xs) is the value of the location
                                                                  (resp. time and social) dimension.
                                                                      Suppose the user is associated to: the location
                                                                  "38.868143, 2.3484122" from his phone’s GPS; the time
                                                                  "Mon Oct 3 12:10:00 2011" from his phone’s watch; and the
                                                                  meeting with Paul Gerard from his calendar. To build the
                                                                  situation, we associate to this kind of low level data, directly
                                                                  acquired from mobile devices capabilities, more abstracted
                                                                  concepts using ontologies reasoning means.
                                                                     1) Location
                                                                      There are different ways to characterize a location. As
                    Figure 1. User model diagram
                                                                  returned by location sensor systems (like GPS), location is a
A. User Profile                                                   position in systems based on geographic coordinates, or may
                                                                  also be defined by an address. Simple automated place
The user profile is composed of the user’s personal data and      labeling systems are already commercialized (Google maps,
other dynamic information, including his preferences, his         Yahoo local...) and consist of merging data such as postal
calendar and the history of his interactions with the system.     addresses with maps.
   1) UserPreferences                                                 In our user model, we use a local spatial ontology to
    The user preferences are contextual and might depend on       represent and reason on geographic information. Using this
many factors, like the location or the current task within an     ontology, for the above example, we get, from location
activity. Thus, they are associated to the user situation and     "38.86, 2.34", the value “Paris” to insert in the location
the user activity. Preferences are deduced during user            dimension of the situation.
navigation activities. They contain the set of navigation            2) Time
documents used by the user in a situation. A navigation               The temporal information is complex: it is continuous
activity expresses the following sequence of events: (i) the      and can be represented at different levels of granularity. To
user logs in the system and navigates across documents to         define the temporal aspects characterizing the user’s
get the desired information; (ii) the user expresses his          situation, we suggest to abstract the continuum time into
preferences on the visited documents. We assume that a            specific and significant periods (abstract time classes), which
visited document is relevant, and thus belongs to the user’s      we expect having an effect on the user’s behavior (e.g.
preferences, if there are some observable user’s behaviors        morning, weekend). To allow a good representation of the
through 2 types of preference:                                    temporal information and its manipulation, we propose to
    - The direct preference: the user expresses his interest in   use OWL-Time ontology [11] which is today a reference for
the document by inserting a rate, like for example putting        representing and reasoning about time. We propose to base
stars (“*”) at the top of the document.                           our work on this ontology and extend it if necessary. Taking
                                                                  the example above, for the time value "Mon Oct 3 12:10:00
2011", we get, using the OWL-Time ontology, the value               defines the exploration/exploitation tradeoff; ε is the
“workday”.                                                          probability of recommending a random exploratory
  3) Social connection                                              document.
    The social connection refers to the information of the
user’s interlocutors (e. g. a friend, an important customer, a       Algorithm 1 The ε-greedy algorithm
colleague or his manager). To define the neighborhood                1: Input: ε, UPc, N
people aspects characterizing the user, a clear model for the        2: Output: D
representation and reasoning on social clustering is
necessary. We use the FOAF Ontology [13] to describe the             3: D = Ø
social network by a set of concepts and properties. For              4: For i =1 to N do
example, the information about “the meeting with Paul                5:     q = Random({0,1})
Gerard” can yield the value “wine client” for the social
dimension.
                                                                     6:           arg max (getCTR(d)) if q ≤ ε
                                                                                      d(UP  D )

    IV.      THE PROPOSED RECOMMENDATION ALGORITHM                   7:    di =
    In our MCRS, documents’ recommendation is modeled                8:           Random(UPc)                 otherwise
as a multi-armed bandit problem. Formally, a bandit                  9:    D= D ∪ di
algorithm proceeds in discrete rounds t = 1,… T. For each            10: Endfor
round t, the algorithm performs the following tasks:
                                                                     11: Return D
    Task 1. It observes the current user’s situation St and a set
Dt of documents with their feature vectors xt,d for d  Dt. The
                                                                         To select the document to be recommended, there are
vector xt,d gives information of both user’s situation St and
                                                                    several strategies which provide an approximate solution for
document d.
                                                                    the bandit problem. Here, we focus on two of them (as in
    Task 2. Based on observed rewards in previous rounds, it
                                                                    [16]):
chooses a document dt  Dt, and receives reward rt ,d whose
                                                        t           - the greedy strategy (Alg. 1, line 6), which estimates each
expectation depends on both the user’s situation St and the         document’s CTR; then it always chooses the best documents,
document dt.                                                        i.e. the ones having the higher CTR; thus it only performs
   Task 3. It then improves its document-selection strategy         exploitation;
with the new observation.                                           - the ε-greedy strategy, which adds some greedy exploration
     In tasks 1 to 3, the total T-round reward of D is defined      policy to the greedy strategy, choosing the best document
                           as T r                                  with probability 1–ε (Alg. 1, line 6) or a randomly picked
                                 t 1 t , d
                                       t
                                                                    document otherwise (probability ε) (Alg. 1, line 8).
                                                                    B. The proposed hybrid-ε-greedy algorithm
                                          
while the optimal expected T-round reward is defined as
                          t 1 rt ,d *
                               T
                                                                        We propose a two-fold improvement on the performance
                                       t
                                                                    of the ε-greedy algorithm: integrating case base reasoning
where  dt* is the document with maximum expected reward at          (CBR) and content based filtering (CBF). This new proposed
round t. Our goal is to design the bandit algorithm so that the     algorithm is called hybrid-ε-greedy and is described in
expected total reward is maximized.                                 Algorithm 4.
    In the field of document recommendation, when a                     To improve exploitation of the ε-greedy algorithm, we
document is presented to the user and this one selects it by a      propose to integrate CBR into each iteration: before choosing
click, a reward of 1 is incurred; otherwise, the reward is 0.       the document, the algorithm computes the similarity between
With this definition of reward, the expected reward of a            the present situation and each one in the situation base; if
document is precisely its Click Through Rate (CTR). The             there is a situation that can be re-used, the algorithm
CTR is the average number of clicks on a recommended                retrieves it, and then applies an exploration/exploitation
document, computed diving the total number of clicks on it          strategy.
by the number of times it was recommended.                              In this situation-aware computing approach, the premise
A. The ε-greedy algorithm                                           part of a case is a specific situation S of a mobile user when
                                                                    he navigates on his mobile device, while the value part of a
The ε-greedy strategy is sketched in Algorithm 1. For a
                                                                    case is the user’s preferences UP to be used for the
given user’s situation, the algorithm recommends a pre-
                                                                    recommendation. Each case from the case base is denoted as
defined number of documents, specified by the parameter N.
                                                                    C= (S, UP).
In this algorithm, UPc={d1,…,dP} is the set of documents
                                                                        Let Sc=(Xlc, Xtc, Xsc) be the current situation of the user,
corresponding to the current user’s preferences;
                                                                    UP the current user’s preferences and PS={S1,....,Sn} the set
                                                                        c
D={d1,….,dN} is the set of documents to recommend;
                                                                    of past situations. The proposed hybrid-ε-greedy algorithm
getCTR (Alg. 1, line 6) is the function which estimates the
                                                                    involves the following four methods.
CTR of a given document; Random (Alg. 1, lines 5 and 8) is
the function returning a random element from a given set; q            1) RetriveCase() (Alg. 4, line 4)
is a random value uniformly distributed over [0, 1] which
Given the current situation Sc, the RetrieveCase method
determines the expected user preferences by comparing Sc
with the situations in past cases in order to choose the most             Algorithm 2 The RecommendDocuments() method
similar one Ss. The method returns, then, the corresponding          1:    Input: ε, UPc, N
case (Ss, UPs).                                                      2:    Output: D
    Ss is selected from PS by computing the following                3:    D=Ø
expression as it done by [9]:                                        4:    For i=1 to N do
                                               
      S s = arg max   α j  sim j X c ,X ij        (1)          5:      q = Random({0, 1})
                                      j        
              S PS
               i
                          j                                        6:       j = Random({0, 1})
    In equation 1, simj is the similarity metric related to          7:           arg max (getCTR(d))           if j<q<ε
dimension j between two situation vectors and αj the weight                       d(UP  D )

associated to dimension j. αj is not considered in the scope of      8: di = CBF(UPc-D, arg max (getCTR(d))               if q≤ j≤ε
this paper, taking a value of 1 for all dimensions.                                             d(UP  D )

    The similarity between two concepts of a dimension j in          9:       Random(UPc)                               otherwise
an ontological semantic depends on how closely they are              10: D = D ∪ {di }
related in the corresponding ontology (location, time or             11: Endfor
social). We use the same similarity measure as [17] defined          12: Return D
by equation 2:
        sim X c , X i   2 
                                 deph( LCS )                (2)      Algorithm 3 The CBF() algorithm
                              (deph( X c )  deph( X ij ))
            j   j    j
                                       j                             1: Input: UP, db
Here, LCS is the Least Common Subsumer of Xjc and Xji, and           2: Output: ds
depth is the number of nodes in the path from the node to the        3: ds= arg max (cossim( db , d))
ontology root.                                                                   dUP
   2) RecommendDocuments() (Alg. 4, line 6)                          4:   Return ds
    In order to insure a better precision of the recommender
results, the recommendation takes place only if the following
condition is verified: sim(Sc, Ss) ≥ B (Alg. 4, line 5), where B       3) UpdateCase() & InsertCase()
is a threshold value and                                                After recommending documents applying the
                 sim(S c , S s ) = sim j X c ,X s 
                                             j    j
                                                                    RecommendDocuments method (Alg. 4, line 6), the user’s
                                       j                            preferences are updated w. r. t. number of clicks and number
    In the RecommendDocuments() method, sketched in                 of recommendations for each recommended document on
Algorithm 2, we propose to improve the ε-greedy strategy by         which the user clicked at least one time. This is done by the
applying CBF in order to have the possibility to recommend,         UpdatePreferences function (Alg. 4, line 7).
not the best document, but the most similar to it (Alg. 2, line         Depending on the similarity between the current situation
8). We believe this may improve the user’s satisfaction.            Sc and its most similar situation Ss (computed with
    The CBF algorithm (Algorithm 3) computes the                    RetriveCase()), being 3 the number of dimensions in the
similarity between each document d=(c1,..,ck) from UP               context, two scenarios are possible:
(except already recommended documents D) and the best               - sim(Sc, Ss) ≠ 3: the current situation does not exist in the
document db=(cjb ,.., ckb ) and returns the most similar one.       case base (Alg. 4, line 8); the InsertCase() method adds to
The degree of similarity between d and db is determined by          the case base the new case composed of the current situation
using the cosine measure, as indicated in equation 3:               Sc and the updated UP.
                                    ck  ck              (3)       - sim(Sc, Ss) = 3: the situation exists in the case base (Alg. 4,
                      d db                                         line 10); the UpdateCase() method updates the case having
    cos sim(d , d b )                        k

                          d  db                                    premise situation Sc with the updated UP.
                                           c
                                           k
                                                   b
                                                   k
                                                       2
                                                           c kb2
                                                           k
Algorithm 4 hybrid-ε-greedy algorithm
1. Input: B, ε, N, PS, Ss, UPs, Sc, UPc
2. Output: D
3. D = Ø                                                                       [4]    Dey, A. K. Providing Architectural Support for Building Context-
                                                                                      Aware Applications. Ph.D. thesis, College of Computing, Georgia
4. (Ss , UPs) = RetriveCase(Sc, PS)                                                   Institute of Technology, 2000.
5. if sim(Sc,Ss) ≥ B then                                                      [5]    Dobson, S. Leveraging the subtleties of location, in Proc. of Smart
                                                                                      Objects and Ambient Intelligence, 2005.
6.      D = RecommendDocuments(ε, UPs, N)
                                                                               [6]    Lakshmish R, Deepak P, Ramana P, Kutila G, Dinesh Garg, Karthik
7.      UPc = UpdatePreferences(UPs, D)                                               V, Shivkumar K. Tenth International Conference on Mobile Data
                                                                                      Management: Systems, Services and Middleware CAESAR: A
8.       if sim(Sc, Ss) ≠ 3 then                                                      Mobile context-aware, Social Recommender System for Low-End
9.            PS = InsertCase(Sc, UPc)                                                Mobile Devices, 2009.
10.      else                                                                  [7]    Lihong Li, Presented at the Nineteenth International Conference on
                                                                                      World Wide Web, Raleigh, NC, USA, 2010 A Contextual-Bandit
11.           PS = UpdateCase(Sp, UPc)                                                Approach to Personalized News Article Recommendation, 2010.
12.      end if                                                                [8]    Mieczysław A. Kłopotek. Approaches to Cold-Start in recommender
                                                                                      systems. studia informatica Systems and information technology,
13. else      PS = InsertCase(Sc, UPc);                                               2009.
14. end if                                                                     [9]    Ourdia, B.,Tamine, L., Boughanem M. Dynamically Personalizing
                                                                                      Search Results for Mobile Users: FQAS'09, pp. 99-110. In
15. Return D                                                                          Proceedings of the 8th International Conference on Flexible Query
                                                                                      Answering Systems (2009).
                           V.     CONCLUSION                                   [10]   Panayiotou, C., Samaras, G. Mobile User Personalization with
    This paper describes our approach for implementing a                              Dynamic Profiles. On the Move to Meaningful Internet Systems,
MCRS. Our contribution is to make a deal between                                      2006.
exploration and exploitation for learning and maintaining                      [11]   Pan, F. Representing complex temporal phenomena for the semantic
                                                                                      web and natural language. Ph.D thesis, University of Southern
user’s interests based on his navigation history.                                     California, Dec, 2007.
    In the future, we plan to evaluate our approach on real                    [12]   Samaras, G., Panayiotou, C. Personalized portals for the wireless user
mobile navigation contexts obtained from a diary study                                based on mobile agents. Proc. 2nd Int'l workshop on Mobile
conducted with collaboration with the Nomalys French                                  Commerce, pp. 70-74, 2002.
company. This study will yield to know if considering the                      [13]   Sparck-Jones, K. Index Term Weighting, Information Storage and
situation    on     the    exploration/exploitation strategy                          Retrieval, vol. 9, no. 2011, pp. 619-633, 1973.
significantly increases the performance of the system on                       [14]   Taylor E and PeterStone. Transfer learning for bandit algorithm
following the user’s interests.                                                       domains: A survey. Journal of Machine Learning Research,
                                                                                      10(1):1633–1685, 2009.
                                                                               [15]    Varma, V., Sriharsha, N., Pingali, P. Personalized web search engine
                              REFERENCES                                              for mobile devices, Int'l Workshop on Intelligent Information Access,
                                                                                      IIIA'06, 2006.
[1]   Alexandre S, Moira C. Norrie, Michael Grossniklaus and Beat Signer,      [16]   Wei Li ,Exploitation and Exploration in a Performance based
      “Spatio-Temporal Proximity as a Basis for Collaborative Filtering in            Contextual Advertising SystemProceedings of the 16th ACM
      Mobile Environments”.Workshop on Ubiquitous Mobile Information                  SIGKDD international conference on Knowledge discovery and data
      and Collaboration Systems, CAiSE, 2006.                                         miningACM New York, NY, USA, 2010.
[2]   Bellotti, V., Begole, B., Chi, E.H., Ducheneaut, N., Fang, J., Isaacs,   [17]   Wu, Z., Palmer, M. Verb Semantics and Lexical Selection. In
      E. Activity-Based Serendipitous Recommendations with the Magitti                Proceedings of the 32nd Annual Meeting of the Association for
      Mobile Leisure Guide. Proceedings On the Move, 2008.                            Computational Linguistics, 1994.
[3]   Bettini, C., et al., A survey of context modelling and reasoning         [18]   Zhang T. and Iyengar, V. “Recommender systems using linear
      techniques, Pervasive and Mobile Computing, 2009.
                                                                                      classifiers,” The Journal of Machine Learning Research, vol. 2, p.
                                                                                      334, 2002.

Weitere ähnliche Inhalte

Was ist angesagt?

ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...Ville Antila
 
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...Ville Antila
 
PerCol 2012 - Presentation
PerCol 2012 - Presentation PerCol 2012 - Presentation
PerCol 2012 - Presentation Ville Antila
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalizationeSAT Journals
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalizationeSAT Publishing House
 
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status Updates
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status UpdatesMindTrek2011 - ContextCapture: Context-based Awareness Cues in Status Updates
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status UpdatesVille Antila
 
Improvement in the usability of gis based services by
Improvement in the usability of gis based services byImprovement in the usability of gis based services by
Improvement in the usability of gis based services byeSAT Publishing House
 
RoutineMaker: Towards End-user Automation of Daily Routines using Smartphones
RoutineMaker: Towards End-user Automation of Daily Routines using SmartphonesRoutineMaker: Towards End-user Automation of Daily Routines using Smartphones
RoutineMaker: Towards End-user Automation of Daily Routines using SmartphonesVille Antila
 
From Context-awareness to Human Behavior Patterns
From Context-awareness to Human Behavior PatternsFrom Context-awareness to Human Behavior Patterns
From Context-awareness to Human Behavior PatternsVille Antila
 
Exploration exploitation trade off in mobile context-aware recommender systems
Exploration  exploitation trade off in mobile context-aware recommender systemsExploration  exploitation trade off in mobile context-aware recommender systems
Exploration exploitation trade off in mobile context-aware recommender systemsBouneffouf Djallel
 
A contextual bandit algorithm for mobile context-aware recommender system
A contextual bandit algorithm for mobile context-aware recommender systemA contextual bandit algorithm for mobile context-aware recommender system
A contextual bandit algorithm for mobile context-aware recommender systemBouneffouf Djallel
 
A survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sA survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sIOSR Journals
 
Agent based frameworks for distributed association rule mining an analysis
Agent based frameworks for distributed association rule mining  an analysis  Agent based frameworks for distributed association rule mining  an analysis
Agent based frameworks for distributed association rule mining an analysis ijfcstjournal
 
An ontology for semantic modelling of virtual world
An ontology for semantic modelling of virtual worldAn ontology for semantic modelling of virtual world
An ontology for semantic modelling of virtual worldijaia
 
Harvesting Intelligence from User Interactions
Harvesting Intelligence from User Interactions Harvesting Intelligence from User Interactions
Harvesting Intelligence from User Interactions R A Akerkar
 
Learning and inference engine applied to ubiquitous recommender system
Learning and inference engine applied to ubiquitous recommender systemLearning and inference engine applied to ubiquitous recommender system
Learning and inference engine applied to ubiquitous recommender systemBouneffouf Djallel
 
Understanding interaction context for development interactive models
Understanding interaction context for development interactive modelsUnderstanding interaction context for development interactive models
Understanding interaction context for development interactive modelspaperpublications3
 

Was ist angesagt? (20)

ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
 
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
 
PerCol 2012 - Presentation
PerCol 2012 - Presentation PerCol 2012 - Presentation
PerCol 2012 - Presentation
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalization
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalization
 
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status Updates
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status UpdatesMindTrek2011 - ContextCapture: Context-based Awareness Cues in Status Updates
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status Updates
 
Improvement in the usability of gis based services by
Improvement in the usability of gis based services byImprovement in the usability of gis based services by
Improvement in the usability of gis based services by
 
RoutineMaker: Towards End-user Automation of Daily Routines using Smartphones
RoutineMaker: Towards End-user Automation of Daily Routines using SmartphonesRoutineMaker: Towards End-user Automation of Daily Routines using Smartphones
RoutineMaker: Towards End-user Automation of Daily Routines using Smartphones
 
From Context-awareness to Human Behavior Patterns
From Context-awareness to Human Behavior PatternsFrom Context-awareness to Human Behavior Patterns
From Context-awareness to Human Behavior Patterns
 
Exploration exploitation trade off in mobile context-aware recommender systems
Exploration  exploitation trade off in mobile context-aware recommender systemsExploration  exploitation trade off in mobile context-aware recommender systems
Exploration exploitation trade off in mobile context-aware recommender systems
 
A contextual bandit algorithm for mobile context-aware recommender system
A contextual bandit algorithm for mobile context-aware recommender systemA contextual bandit algorithm for mobile context-aware recommender system
A contextual bandit algorithm for mobile context-aware recommender system
 
A survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sA survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’s
 
Agent based frameworks for distributed association rule mining an analysis
Agent based frameworks for distributed association rule mining  an analysis  Agent based frameworks for distributed association rule mining  an analysis
Agent based frameworks for distributed association rule mining an analysis
 
An ontology for semantic modelling of virtual world
An ontology for semantic modelling of virtual worldAn ontology for semantic modelling of virtual world
An ontology for semantic modelling of virtual world
 
Introductionto agents
Introductionto agentsIntroductionto agents
Introductionto agents
 
Harvesting Intelligence from User Interactions
Harvesting Intelligence from User Interactions Harvesting Intelligence from User Interactions
Harvesting Intelligence from User Interactions
 
Agent basedqos
Agent basedqosAgent basedqos
Agent basedqos
 
E0341021025
E0341021025E0341021025
E0341021025
 
Learning and inference engine applied to ubiquitous recommender system
Learning and inference engine applied to ubiquitous recommender systemLearning and inference engine applied to ubiquitous recommender system
Learning and inference engine applied to ubiquitous recommender system
 
Understanding interaction context for development interactive models
Understanding interaction context for development interactive modelsUnderstanding interaction context for development interactive models
Understanding interaction context for development interactive models
 

Ähnlich wie Following the user’s interests in mobile context aware recommender systems

Hybrid-e-greedy for mobile context-aware recommender system
Hybrid-e-greedy for mobile context-aware recommender systemHybrid-e-greedy for mobile context-aware recommender system
Hybrid-e-greedy for mobile context-aware recommender systemBouneffouf Djallel
 
An Extensible Web Mining Framework for Real Knowledge
An Extensible Web Mining Framework for Real KnowledgeAn Extensible Web Mining Framework for Real Knowledge
An Extensible Web Mining Framework for Real KnowledgeIJEACS
 
Ambiences on the-fly usage of available resources through personal devices
Ambiences  on the-fly usage of available resources through personal devicesAmbiences  on the-fly usage of available resources through personal devices
Ambiences on the-fly usage of available resources through personal devicesijasuc
 
MODELING THE ADAPTION RULE IN CONTEXTAWARE SYSTEMS
MODELING THE ADAPTION RULE IN CONTEXTAWARE SYSTEMSMODELING THE ADAPTION RULE IN CONTEXTAWARE SYSTEMS
MODELING THE ADAPTION RULE IN CONTEXTAWARE SYSTEMSijasuc
 
Modeling the Adaption Rule in Contextaware Systems
Modeling the Adaption Rule in Contextaware SystemsModeling the Adaption Rule in Contextaware Systems
Modeling the Adaption Rule in Contextaware Systemsijasuc
 
Recommender systems: a novel approach based on singular value decomposition
Recommender systems: a novel approach based on singular  value decompositionRecommender systems: a novel approach based on singular  value decomposition
Recommender systems: a novel approach based on singular value decompositionIJECEIAES
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
 
Caaa07 Presentation February Final
Caaa07 Presentation February FinalCaaa07 Presentation February Final
Caaa07 Presentation February Finalpbihler
 
Travel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingTravel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingIRJET Journal
 
Support for Goal Oriented Requirements Engineering in Elastic Cloud Applications
Support for Goal Oriented Requirements Engineering in Elastic Cloud ApplicationsSupport for Goal Oriented Requirements Engineering in Elastic Cloud Applications
Support for Goal Oriented Requirements Engineering in Elastic Cloud Applicationszillesubhan
 
Activity Context Modeling in Context-Aware
Activity Context Modeling in Context-AwareActivity Context Modeling in Context-Aware
Activity Context Modeling in Context-AwareEditor IJCATR
 
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESS
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESSA HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESS
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESSIJNSA Journal
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.docbutest
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.docbutest
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.docbutest
 
RCAMM_IEEE_RAICS_2013_6745453
RCAMM_IEEE_RAICS_2013_6745453RCAMM_IEEE_RAICS_2013_6745453
RCAMM_IEEE_RAICS_2013_6745453Shekhar Parkhi
 
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTUREA USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTUREIJCNC
 

Ähnlich wie Following the user’s interests in mobile context aware recommender systems (20)

Hybrid-e-greedy for mobile context-aware recommender system
Hybrid-e-greedy for mobile context-aware recommender systemHybrid-e-greedy for mobile context-aware recommender system
Hybrid-e-greedy for mobile context-aware recommender system
 
An Extensible Web Mining Framework for Real Knowledge
An Extensible Web Mining Framework for Real KnowledgeAn Extensible Web Mining Framework for Real Knowledge
An Extensible Web Mining Framework for Real Knowledge
 
Ambiences on the-fly usage of available resources through personal devices
Ambiences  on the-fly usage of available resources through personal devicesAmbiences  on the-fly usage of available resources through personal devices
Ambiences on the-fly usage of available resources through personal devices
 
MODELING THE ADAPTION RULE IN CONTEXTAWARE SYSTEMS
MODELING THE ADAPTION RULE IN CONTEXTAWARE SYSTEMSMODELING THE ADAPTION RULE IN CONTEXTAWARE SYSTEMS
MODELING THE ADAPTION RULE IN CONTEXTAWARE SYSTEMS
 
Modeling the Adaption Rule in Contextaware Systems
Modeling the Adaption Rule in Contextaware SystemsModeling the Adaption Rule in Contextaware Systems
Modeling the Adaption Rule in Contextaware Systems
 
81-T48
81-T4881-T48
81-T48
 
Ijsrdv7 i10842
Ijsrdv7 i10842Ijsrdv7 i10842
Ijsrdv7 i10842
 
Recommender systems: a novel approach based on singular value decomposition
Recommender systems: a novel approach based on singular  value decompositionRecommender systems: a novel approach based on singular  value decomposition
Recommender systems: a novel approach based on singular value decomposition
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
 
Caaa07 Presentation February Final
Caaa07 Presentation February FinalCaaa07 Presentation February Final
Caaa07 Presentation February Final
 
Travel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingTravel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social Networking
 
Support for Goal Oriented Requirements Engineering in Elastic Cloud Applications
Support for Goal Oriented Requirements Engineering in Elastic Cloud ApplicationsSupport for Goal Oriented Requirements Engineering in Elastic Cloud Applications
Support for Goal Oriented Requirements Engineering in Elastic Cloud Applications
 
Activity Context Modeling in Context-Aware
Activity Context Modeling in Context-AwareActivity Context Modeling in Context-Aware
Activity Context Modeling in Context-Aware
 
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESS
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESSA HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESS
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESS
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.doc
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.doc
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.doc
 
RCAMM_IEEE_RAICS_2013_6745453
RCAMM_IEEE_RAICS_2013_6745453RCAMM_IEEE_RAICS_2013_6745453
RCAMM_IEEE_RAICS_2013_6745453
 
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTUREA USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
 
Al26234241
Al26234241Al26234241
Al26234241
 

Kürzlich hochgeladen

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Kürzlich hochgeladen (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Following the user’s interests in mobile context aware recommender systems

  • 1. Following the User’s Interests in Mobile Context-Aware Recommender Systems : The hybrid-ε-greedy algorithm Djallel Bouneffouf, Amel Bouzeghoub & Alda Lopes Gançarski Department of Computer Science, Télécom SudParis, UMR CNRS Samovar, 91011 Evry Cedex, France {Djallel.Bouneffouf, Amel.Bouzeghoub, Alda.Gancarski}@it-sudparis.eu Abstract— The wide development of mobile applications based on his current context. This goal matches with the goal provides a considerable amount of data of all types (images, of recommender systems. texts, sounds, videos, etc.). In this sense, Mobile Context-aware Both context-aware systems and recommender systems Recommender Systems (MCRS) suggest the user suitable are used to provide users with relevant information and/or information depending on her/his situation and interests. Two services; the first based on the user’s context; the second key questions have to be considered 1) how to recommend the based on the user’s interests. Therefore, the next logical step user information that follows his/her interests evolution? 2) is to combine these two systems within the so-called mobile how to model the user’s situation and its related interests? To context-aware recommender systems. the best of our knowledge, no existing work proposing a MCRS The notion of context is not new. In general, it refers to tries to answer both questions as we do. This paper describes an ongoing work on the implementation of a MCRS based on any information that is relevant to the user and his/her the hybrid-ε-greedy algorithm we propose, which combines the surroundings. The main difficulty when dealing with context standard ε-greedy algorithm and both content-based filtering is its high dynamicity and its constant change. A change in and case-based reasoning techniques. one contextual feature may generate changes in other contextual features. That’s why context-aware systems have Keywords-component; context-aware recommender systems; to be adapted to highly dynamic user situations and context personalization; situation. models need to capture the dynamic interactions between contextual information. I. INTRODUCTION Several works in context-aware systems have addressed the problem of context modeling and interesting single or Mobile technologies have made access to a huge hybrid models exist. Most of them are gathered in the survey collection of information, anywhere and anytime. Thereby, done in [5]. However, these models have not been widely information is customized according to users’ needs and applied to the mobile application domain. The dynamic preferences. This brings big challenges for the interactions between contextual dimensions and user profiles Recommender System field. Indeed, technical features of have not been fully represented by the existing models which mobile devices yield to navigation practices which are more often focus on modeling static associations among different difficult than the traditional navigation task. contextual information. Recommender systems are systems that produce In recommender systems, a considerable amount of individualized suggestions concerning interesting content the research has been done in recommending relevant user might like out of a large number of alternatives. Often, information for mobile users. Earlier techniques ([12], [15]) recommender systems using collaborative or content-based are based solely on the computational behavior of the user to filtering algorithms are applied. model his interests regardless of his surrounding In mobile applications, information personalization is environment (location, time, nearby people). The main even more important, because of the limitations of mobile limitation of such approaches is that they do not take into devices in terms of displays, input capabilities, bandwidth account the contextual evolution of the user interests w. r. t. etc. It is then desirable to personalize not only using pre- his context. defined user profiles, but also the user’s context such as the This study gives rise to another category of current location. recommendation techniques that tackle these limitations We can find similar challenges in context-aware systems when building situation-aware user profiles. Two key area. A general definition of context-aware systems is given questions have to be considered, namely 1) how to in [4]: “A system is context-aware if it uses context to recommend the user information that follows his/her provide relevant information and/or services to the user, interests evolution? 2) how to model the user’s situation and where relevancy depends on the user’s task.” its related user’s interests? The key goal of context-aware systems is hence to provide a user with relevant information and/or services
  • 2. In order to tackle these problems, our approach consists documents may be chosen. However, obtaining information of: about the documents’ average rewards (i.e., exploration) can  Capturing context through communication with refine B’s estimate of the documents’ rewards and in turn diverse information sources: from the mobile device increase long-term user’s satisfaction. Clearly, neither a GPS capability, if it is possible, or by inferring a purely exploring nor a purely exploiting algorithm works user’s location based on the user’s calendar or other best in general, and a good tradeoff is needed. The authors devices in the neighborhood. on [7, 8, 16] describe a smart way to balance exploration and  Storing history for future use or user habit analysis. exploitation. However, none of them consider the user’s  Reasoning and learning capabilities to be able to (i) situation during the recommendation. use the collected contextual information for mapping B. Modeling the situation and user profile low-level information to symbolic contextual information (e.g. mapping an exact coordinate to a Few research works are dedicated to manage the user’s symbolic location such as an address) or to deduce situation on recommendation. In [2, 9, 10] the authors higher level information i.e. identify user situation propose a method which consists of building a dynamic and recommend the most relevant content according user’s profile based on time and user’s experience. The to the situation (e.g. determine that the user is in a user’s preferences in the user’s profile are weighted room where a meeting is in progress so the cell according to the situation (time, location) and the user’s phone should be switched to silent mode); (ii) learn behavior. To model the evolution on the user’s preferences the behavior based on reasoning and the history data according to his temporal situation in different periods, (like (e.g. whenever the user enters a room which has a workday or vacations), the weighted association for the meeting in progress or where the next event is a concepts in the user’s profile is established for every new meeting, the user turns the volume of the cell phone experience of the user. The user’s activity combined with the down and searches for the meeting agenda. The user's profile are used together to filter and recommend system may learn this behavior for the next time). relevant content. Another work [6] describes a MCRS operating on three The remainder of the paper is organized as follows. dimensions of context that complement each other to get Section II reviews some related works. Section III presents highly targeted. First, the MCRS analyzes information such the user model. Section IV introduces the recommendation as clients’ address books to estimate the level of social algorithm and the last section concludes the paper and points affinity among users. Second, it combines social affinity with out possible directions for future work. the spatiotemporal dimensions and the user’s history in order to improve the quality of the recommendations. II. BACKGROUND In [1], the authors present a technique to perform user- based collaborative filtering. Each user’s mobile device We mention now recent relevant recommendation stores all explicit ratings made by its owner as well as ratings techniques that tackle the two issues mentioned above, received from other users. Only users in spatiotemporal namely: following the evolution of user’s interests and proximity are able to exchange ratings and they show how modeling the situation and user profile. this provides a natural filtering based on social contexts. A. Following the evolution of user’s interests Each work cited above tries to recommend interesting The trend today on recommender systems is to suggest information to users on contextual situation; however they relevant information to users, using supervised machine do not consider the evolution of the user interest. learning techniques. In these approaches, the recommender system has to execute two steps: (1) the learning step, where To summarize, none of the mentioned works tackles both the system learns from samples and gradually adjusts its problems. As a result, our approach exploits the following parameters; (2) the exploitation step, where new samples are new features: presented to the system to perform a generalization [18].  We consider user situations as a multi-dimensional These approaches suffer from the following drawbacks: space where each dimension is represented by a (i) need for initial information about the user’s interests domain ontology. Unlike in [1, 2, 6, 10], where provided by an expert; (ii) difficulty in following the context items are low level data, in our approach evolution of the user’s interests. Some works found in the they correspond to concepts of social, location and literature [7, 8, 16] address these problems as a need for time ontologies. Each situation is associated to balancing exploration and exploitation studied in the “bandit specific user profile and preferences. algorithm”. A bandit algorithm B exploits its past experience  Inspired by models of human reasoning developed to select documents that appear more frequently. Besides, by [14] in robotic, we propose to consider user's these seemingly optimal documents may in fact be situation in the bandit algorithm by using case-based suboptimal, due to imprecision in B’s knowledge. In order to reasoning technique, which is not considered in [7, avoid this undesired situation, B has to explore documents 8, 9, 16]. by actually choosing seemingly suboptimal documents so as  In [7, 8, 16] authors use a smart bandit algorithm to to gather more information about them. Exploitation can manage the exploration/exploitation strategy, increase short-term user’s satisfaction since some suboptimal however they do not take into account the content in
  • 3. the strategy. Our intuition is that, considering the - The indirect preference: it is the information that we content when managing the exploration/exploitation extract from the user system interaction, for example the strategy will improve it. This is why we propose to number of clicks on the visited documents or the time spent use content-based filtering techniques together with on a document. ε-greedy algorithm. Let UP be the preferences submitted by a specific user in the system at a given situation. Each document in UP is In what follows, we define the structure of the proposed represented as a single vector d=(c1,...,cn), where ci (i=1, .., user model and the methods for inferring the n) is the value of a component characterizing the preferences recommendation situations. Then, we explain how to build of d. We consider the following components: the total dynamic user profiles, and how to manage the number of clicks on d, the total time spent reading d, the exploration/exploitation strategy, according to the current number of times d was recommended, and the direct situation. preference rate on d. 2) History All the interactions between the user and the system are III. THE PROPOSED USER’S MODEL stored as well as the situations in order to exploit this data to As stated in Section II, static approaches for building the improve the recommendation process. user’s profile [12, 15] are poorly useful in our context, so we calendar Before each meeting, the user has to fill-up the rather focus on more dynamic techniques, capable of calendar with information concerning the person(s) to meet, continuously adjusting the user’s interests to the current Time and Location instances are automatically inferred by situation. the system. Figure 1 depicts the diagram of the proposed user model. B. User Situation A situation S can be represented as a triple whose features X are the values assigned to each dimension: S = (Xl, Xt, Xs), where Xl (resp. Xt and Xs) is the value of the location (resp. time and social) dimension. Suppose the user is associated to: the location "38.868143, 2.3484122" from his phone’s GPS; the time "Mon Oct 3 12:10:00 2011" from his phone’s watch; and the meeting with Paul Gerard from his calendar. To build the situation, we associate to this kind of low level data, directly acquired from mobile devices capabilities, more abstracted concepts using ontologies reasoning means. 1) Location There are different ways to characterize a location. As Figure 1. User model diagram returned by location sensor systems (like GPS), location is a A. User Profile position in systems based on geographic coordinates, or may also be defined by an address. Simple automated place The user profile is composed of the user’s personal data and labeling systems are already commercialized (Google maps, other dynamic information, including his preferences, his Yahoo local...) and consist of merging data such as postal calendar and the history of his interactions with the system. addresses with maps. 1) UserPreferences In our user model, we use a local spatial ontology to The user preferences are contextual and might depend on represent and reason on geographic information. Using this many factors, like the location or the current task within an ontology, for the above example, we get, from location activity. Thus, they are associated to the user situation and "38.86, 2.34", the value “Paris” to insert in the location the user activity. Preferences are deduced during user dimension of the situation. navigation activities. They contain the set of navigation 2) Time documents used by the user in a situation. A navigation The temporal information is complex: it is continuous activity expresses the following sequence of events: (i) the and can be represented at different levels of granularity. To user logs in the system and navigates across documents to define the temporal aspects characterizing the user’s get the desired information; (ii) the user expresses his situation, we suggest to abstract the continuum time into preferences on the visited documents. We assume that a specific and significant periods (abstract time classes), which visited document is relevant, and thus belongs to the user’s we expect having an effect on the user’s behavior (e.g. preferences, if there are some observable user’s behaviors morning, weekend). To allow a good representation of the through 2 types of preference: temporal information and its manipulation, we propose to - The direct preference: the user expresses his interest in use OWL-Time ontology [11] which is today a reference for the document by inserting a rate, like for example putting representing and reasoning about time. We propose to base stars (“*”) at the top of the document. our work on this ontology and extend it if necessary. Taking the example above, for the time value "Mon Oct 3 12:10:00
  • 4. 2011", we get, using the OWL-Time ontology, the value defines the exploration/exploitation tradeoff; ε is the “workday”. probability of recommending a random exploratory 3) Social connection document. The social connection refers to the information of the user’s interlocutors (e. g. a friend, an important customer, a Algorithm 1 The ε-greedy algorithm colleague or his manager). To define the neighborhood 1: Input: ε, UPc, N people aspects characterizing the user, a clear model for the 2: Output: D representation and reasoning on social clustering is necessary. We use the FOAF Ontology [13] to describe the 3: D = Ø social network by a set of concepts and properties. For 4: For i =1 to N do example, the information about “the meeting with Paul 5: q = Random({0,1}) Gerard” can yield the value “wine client” for the social dimension. 6: arg max (getCTR(d)) if q ≤ ε d(UP  D ) IV. THE PROPOSED RECOMMENDATION ALGORITHM 7: di = In our MCRS, documents’ recommendation is modeled 8: Random(UPc) otherwise as a multi-armed bandit problem. Formally, a bandit 9: D= D ∪ di algorithm proceeds in discrete rounds t = 1,… T. For each 10: Endfor round t, the algorithm performs the following tasks: 11: Return D Task 1. It observes the current user’s situation St and a set Dt of documents with their feature vectors xt,d for d  Dt. The To select the document to be recommended, there are vector xt,d gives information of both user’s situation St and several strategies which provide an approximate solution for document d. the bandit problem. Here, we focus on two of them (as in Task 2. Based on observed rewards in previous rounds, it [16]): chooses a document dt  Dt, and receives reward rt ,d whose t - the greedy strategy (Alg. 1, line 6), which estimates each expectation depends on both the user’s situation St and the document’s CTR; then it always chooses the best documents, document dt. i.e. the ones having the higher CTR; thus it only performs Task 3. It then improves its document-selection strategy exploitation; with the new observation. - the ε-greedy strategy, which adds some greedy exploration In tasks 1 to 3, the total T-round reward of D is defined policy to the greedy strategy, choosing the best document as T r with probability 1–ε (Alg. 1, line 6) or a randomly picked t 1 t , d t document otherwise (probability ε) (Alg. 1, line 8). B. The proposed hybrid-ε-greedy algorithm   while the optimal expected T-round reward is defined as  t 1 rt ,d * T We propose a two-fold improvement on the performance t of the ε-greedy algorithm: integrating case base reasoning where dt* is the document with maximum expected reward at (CBR) and content based filtering (CBF). This new proposed round t. Our goal is to design the bandit algorithm so that the algorithm is called hybrid-ε-greedy and is described in expected total reward is maximized. Algorithm 4. In the field of document recommendation, when a To improve exploitation of the ε-greedy algorithm, we document is presented to the user and this one selects it by a propose to integrate CBR into each iteration: before choosing click, a reward of 1 is incurred; otherwise, the reward is 0. the document, the algorithm computes the similarity between With this definition of reward, the expected reward of a the present situation and each one in the situation base; if document is precisely its Click Through Rate (CTR). The there is a situation that can be re-used, the algorithm CTR is the average number of clicks on a recommended retrieves it, and then applies an exploration/exploitation document, computed diving the total number of clicks on it strategy. by the number of times it was recommended. In this situation-aware computing approach, the premise A. The ε-greedy algorithm part of a case is a specific situation S of a mobile user when he navigates on his mobile device, while the value part of a The ε-greedy strategy is sketched in Algorithm 1. For a case is the user’s preferences UP to be used for the given user’s situation, the algorithm recommends a pre- recommendation. Each case from the case base is denoted as defined number of documents, specified by the parameter N. C= (S, UP). In this algorithm, UPc={d1,…,dP} is the set of documents Let Sc=(Xlc, Xtc, Xsc) be the current situation of the user, corresponding to the current user’s preferences; UP the current user’s preferences and PS={S1,....,Sn} the set c D={d1,….,dN} is the set of documents to recommend; of past situations. The proposed hybrid-ε-greedy algorithm getCTR (Alg. 1, line 6) is the function which estimates the involves the following four methods. CTR of a given document; Random (Alg. 1, lines 5 and 8) is the function returning a random element from a given set; q 1) RetriveCase() (Alg. 4, line 4) is a random value uniformly distributed over [0, 1] which
  • 5. Given the current situation Sc, the RetrieveCase method determines the expected user preferences by comparing Sc with the situations in past cases in order to choose the most Algorithm 2 The RecommendDocuments() method similar one Ss. The method returns, then, the corresponding 1: Input: ε, UPc, N case (Ss, UPs). 2: Output: D Ss is selected from PS by computing the following 3: D=Ø expression as it done by [9]: 4: For i=1 to N do   S s = arg max   α j  sim j X c ,X ij  (1) 5: q = Random({0, 1})  j  S PS i  j  6: j = Random({0, 1}) In equation 1, simj is the similarity metric related to 7: arg max (getCTR(d)) if j<q<ε dimension j between two situation vectors and αj the weight d(UP  D ) associated to dimension j. αj is not considered in the scope of 8: di = CBF(UPc-D, arg max (getCTR(d)) if q≤ j≤ε this paper, taking a value of 1 for all dimensions. d(UP  D ) The similarity between two concepts of a dimension j in 9: Random(UPc) otherwise an ontological semantic depends on how closely they are 10: D = D ∪ {di } related in the corresponding ontology (location, time or 11: Endfor social). We use the same similarity measure as [17] defined 12: Return D by equation 2: sim X c , X i   2  deph( LCS ) (2) Algorithm 3 The CBF() algorithm (deph( X c )  deph( X ij )) j j j j 1: Input: UP, db Here, LCS is the Least Common Subsumer of Xjc and Xji, and 2: Output: ds depth is the number of nodes in the path from the node to the 3: ds= arg max (cossim( db , d)) ontology root. dUP 2) RecommendDocuments() (Alg. 4, line 6) 4: Return ds In order to insure a better precision of the recommender results, the recommendation takes place only if the following condition is verified: sim(Sc, Ss) ≥ B (Alg. 4, line 5), where B 3) UpdateCase() & InsertCase() is a threshold value and After recommending documents applying the sim(S c , S s ) = sim j X c ,X s  j j RecommendDocuments method (Alg. 4, line 6), the user’s j preferences are updated w. r. t. number of clicks and number In the RecommendDocuments() method, sketched in of recommendations for each recommended document on Algorithm 2, we propose to improve the ε-greedy strategy by which the user clicked at least one time. This is done by the applying CBF in order to have the possibility to recommend, UpdatePreferences function (Alg. 4, line 7). not the best document, but the most similar to it (Alg. 2, line Depending on the similarity between the current situation 8). We believe this may improve the user’s satisfaction. Sc and its most similar situation Ss (computed with The CBF algorithm (Algorithm 3) computes the RetriveCase()), being 3 the number of dimensions in the similarity between each document d=(c1,..,ck) from UP context, two scenarios are possible: (except already recommended documents D) and the best - sim(Sc, Ss) ≠ 3: the current situation does not exist in the document db=(cjb ,.., ckb ) and returns the most similar one. case base (Alg. 4, line 8); the InsertCase() method adds to The degree of similarity between d and db is determined by the case base the new case composed of the current situation using the cosine measure, as indicated in equation 3: Sc and the updated UP.  ck  ck (3) - sim(Sc, Ss) = 3: the situation exists in the case base (Alg. 4, d db line 10); the UpdateCase() method updates the case having cos sim(d , d b )   k d  db premise situation Sc with the updated UP. c k b k 2  c kb2 k
  • 6. Algorithm 4 hybrid-ε-greedy algorithm 1. Input: B, ε, N, PS, Ss, UPs, Sc, UPc 2. Output: D 3. D = Ø [4] Dey, A. K. Providing Architectural Support for Building Context- Aware Applications. Ph.D. thesis, College of Computing, Georgia 4. (Ss , UPs) = RetriveCase(Sc, PS) Institute of Technology, 2000. 5. if sim(Sc,Ss) ≥ B then [5] Dobson, S. Leveraging the subtleties of location, in Proc. of Smart Objects and Ambient Intelligence, 2005. 6. D = RecommendDocuments(ε, UPs, N) [6] Lakshmish R, Deepak P, Ramana P, Kutila G, Dinesh Garg, Karthik 7. UPc = UpdatePreferences(UPs, D) V, Shivkumar K. Tenth International Conference on Mobile Data Management: Systems, Services and Middleware CAESAR: A 8. if sim(Sc, Ss) ≠ 3 then Mobile context-aware, Social Recommender System for Low-End 9. PS = InsertCase(Sc, UPc) Mobile Devices, 2009. 10. else [7] Lihong Li, Presented at the Nineteenth International Conference on World Wide Web, Raleigh, NC, USA, 2010 A Contextual-Bandit 11. PS = UpdateCase(Sp, UPc) Approach to Personalized News Article Recommendation, 2010. 12. end if [8] Mieczysław A. Kłopotek. Approaches to Cold-Start in recommender systems. studia informatica Systems and information technology, 13. else PS = InsertCase(Sc, UPc); 2009. 14. end if [9] Ourdia, B.,Tamine, L., Boughanem M. Dynamically Personalizing Search Results for Mobile Users: FQAS'09, pp. 99-110. In 15. Return D Proceedings of the 8th International Conference on Flexible Query Answering Systems (2009). V. CONCLUSION [10] Panayiotou, C., Samaras, G. Mobile User Personalization with This paper describes our approach for implementing a Dynamic Profiles. On the Move to Meaningful Internet Systems, MCRS. Our contribution is to make a deal between 2006. exploration and exploitation for learning and maintaining [11] Pan, F. Representing complex temporal phenomena for the semantic web and natural language. Ph.D thesis, University of Southern user’s interests based on his navigation history. California, Dec, 2007. In the future, we plan to evaluate our approach on real [12] Samaras, G., Panayiotou, C. Personalized portals for the wireless user mobile navigation contexts obtained from a diary study based on mobile agents. Proc. 2nd Int'l workshop on Mobile conducted with collaboration with the Nomalys French Commerce, pp. 70-74, 2002. company. This study will yield to know if considering the [13] Sparck-Jones, K. Index Term Weighting, Information Storage and situation on the exploration/exploitation strategy Retrieval, vol. 9, no. 2011, pp. 619-633, 1973. significantly increases the performance of the system on [14] Taylor E and PeterStone. Transfer learning for bandit algorithm following the user’s interests. domains: A survey. Journal of Machine Learning Research, 10(1):1633–1685, 2009. [15] Varma, V., Sriharsha, N., Pingali, P. Personalized web search engine REFERENCES for mobile devices, Int'l Workshop on Intelligent Information Access, IIIA'06, 2006. [1] Alexandre S, Moira C. Norrie, Michael Grossniklaus and Beat Signer, [16] Wei Li ,Exploitation and Exploration in a Performance based “Spatio-Temporal Proximity as a Basis for Collaborative Filtering in Contextual Advertising SystemProceedings of the 16th ACM Mobile Environments”.Workshop on Ubiquitous Mobile Information SIGKDD international conference on Knowledge discovery and data and Collaboration Systems, CAiSE, 2006. miningACM New York, NY, USA, 2010. [2] Bellotti, V., Begole, B., Chi, E.H., Ducheneaut, N., Fang, J., Isaacs, [17] Wu, Z., Palmer, M. Verb Semantics and Lexical Selection. In E. Activity-Based Serendipitous Recommendations with the Magitti Proceedings of the 32nd Annual Meeting of the Association for Mobile Leisure Guide. Proceedings On the Move, 2008. Computational Linguistics, 1994. [3] Bettini, C., et al., A survey of context modelling and reasoning [18] Zhang T. and Iyengar, V. “Recommender systems using linear techniques, Pervasive and Mobile Computing, 2009. classifiers,” The Journal of Machine Learning Research, vol. 2, p. 334, 2002.