Difference between revisions of "TRESSS 2010"

From Openresearch
Jump to: navigation, search
(Social Search, Computational Trust, User Behavioural Models, Personalisation, Multi-agent Systems, Log Analysis, Search Analytics)
 
(paper deadline extended (confirmed))
 
(3 intermediate revisions by 2 users not shown)
Line 13: Line 13:
 
|Submission deadline=2010/04/16
 
|Submission deadline=2010/04/16
 
}}
 
}}
''Social Search and applications based on mining logs of web activity are gaining momentum after the rapid growth of web 2.0. This rapid expansion has converted the Web into a multitude of user-generated applications, which in turn generate a very large and noisy dataset of logs. These datasets represent an extremely valuable source of information, strategic to augment marketing, business intelligence and to enhance information retrieval via social search engines.
+
Social Search and applications based on mining logs of web activity are gaining momentum after the rapid growth of web 2.0. This rapid expansion has converted the Web into a multitude of user-generated applications, which in turn generate a very large and noisy dataset of logs. These datasets represent an extremely valuable source of information, strategic to augment marketing, business intelligence and to enhance information retrieval via social search engines.
  
 
Modern search systems, as well as online marketing and web-analytics applications can benefit greatly from using additional information about user's behaviour. Implicit or explicit feedback data based on direct interaction (e.g., clicks, scrolling, etc.), as well as user profiles/preferences, have proven a valuable source for enhancing and personalizing information retrieval and other web-related applications, such as customer segmentation and marketing. One of the main challenges remains how to effectively mine a large set of complex data affected by great level of noise, represented by non-pertinent, untrustworthy or even malicious data. Moreover, the challenge is to define models of users’ behaviour that can resists malicious attack, low quality information and preserve privacy.
 
Modern search systems, as well as online marketing and web-analytics applications can benefit greatly from using additional information about user's behaviour. Implicit or explicit feedback data based on direct interaction (e.g., clicks, scrolling, etc.), as well as user profiles/preferences, have proven a valuable source for enhancing and personalizing information retrieval and other web-related applications, such as customer segmentation and marketing. One of the main challenges remains how to effectively mine a large set of complex data affected by great level of noise, represented by non-pertinent, untrustworthy or even malicious data. Moreover, the challenge is to define models of users’ behaviour that can resists malicious attack, low quality information and preserve privacy.
 +
 
Trust and Recommender systems, along with personalization techniques, and models of users’ behaviour appear to be essential candidates to enhance and support an effective analysis of web activity. These mechanisms could help filter, interpret and rank web-users' behaviour to assign the relevance of web-search results and deliver the most reliable and adequate content. Similarly, they may be helpful to define user-based anti-spam techniques, support web-analytics applications that mine only trustworthy sites and users’ activity, help users’ segmentation and decisions support tools for online marketing. This workshop focuses on discussing and identifying the most promising research directions with respect to applying reputation, trust systems and implicit or explicit users’ models in the analysis and exploitation of web-activity logs.  
 
Trust and Recommender systems, along with personalization techniques, and models of users’ behaviour appear to be essential candidates to enhance and support an effective analysis of web activity. These mechanisms could help filter, interpret and rank web-users' behaviour to assign the relevance of web-search results and deliver the most reliable and adequate content. Similarly, they may be helpful to define user-based anti-spam techniques, support web-analytics applications that mine only trustworthy sites and users’ activity, help users’ segmentation and decisions support tools for online marketing. This workshop focuses on discussing and identifying the most promising research directions with respect to applying reputation, trust systems and implicit or explicit users’ models in the analysis and exploitation of web-activity logs.  
  
 
The focus of the workshops are innovative and challenging applications of recommendation and trust systems, personalization techniques, users models and data mining in the field of social search, user analysis and understanding. Particular interests are the following challenges:
 
The focus of the workshops are innovative and challenging applications of recommendation and trust systems, personalization techniques, users models and data mining in the field of social search, user analysis and understanding. Particular interests are the following challenges:
  
    * How to built implicit/explicit models to rank and filter information based on users activity analysis
+
* How to built implicit/explicit models to rank and filter information based on users activity analysis
    * How trust and recommender systems can be used to enhance web logs analysis and social search engine
+
* How trust and recommender systems can be used to enhance web logs analysis and social search engine
    * Users models resistant to attack and privacy-aware
+
* Users models resistant to attack and privacy-aware
    * Implicit users or trust models based on web-logs mining  
+
* Implicit users or trust models based on web-logs mining  
''
+
 
  
 
==Topics==
 
==Topics==
 
The workshop brings together researchers from Recommender/Trust Systems as well as Data Mining, Multi-agent Systems, Information Retrieval and Human Computer Interaction. Topics of interest include, but are not limited to:
 
The workshop brings together researchers from Recommender/Trust Systems as well as Data Mining, Multi-agent Systems, Information Retrieval and Human Computer Interaction. Topics of interest include, but are not limited to:
  
    * Trust, Reputation and Recommender systems for Social Search
+
* Trust, Reputation and Recommender systems for Social Search
    * Trust and Reputation based on User Behavioural Analysis
+
* Trust and Reputation based on User Behavioural Analysis
    * Reasoning and Data-Mining approach to trust and reputation using Web-logs
+
* Reasoning and Data-Mining approach to trust and reputation using Web-logs
    * Anonymity and privacy-aware solutions for Social Search Systems
+
* Anonymity and privacy-aware solutions for Social Search Systems
    * Users profiling and personalization in Social Search and Web-analytics
+
* Users profiling and personalization in Social Search and Web-analytics
    * Cognitive models of users on the Web
+
* Cognitive models of users on the Web
    * Mining and Learning reputation and Users behaviour on the Web
+
* Mining and Learning reputation and Users behaviour on the Web
    * Applications of recommender and trust systems to web analytics, information retrieval, marketing analysis, social search
+
* Applications of recommender and trust systems to web analytics, information retrieval, marketing analysis, social search
    * Web Information Filtering and Retrieval in social networks and multi-agent systems
+
* Web Information Filtering and Retrieval in social networks and multi-agent systems
    * Web Security, Integrity, Privacy and Trust
+
* Web Security, Integrity, Privacy and Trust
    * Agent Systems Modelling and Methodology
+
* Agent Systems Modelling and Methodology
    * Autonomous Knowledge and Information Agents (web entities)
+
* Autonomous Knowledge and Information Agents (web entities)
    * Distributed Intelligence and Multi-agent paradigms for Social Search  
+
* Distributed Intelligence and Multi-agent paradigms for Social Search  
  
 
==Submissions==
 
==Submissions==
 
 
  
 
All papers for the 2010 TRESSS Workshop are to be submitted through the WI/IAT 2010 Workshop Paper Submission system.
 
All papers for the 2010 TRESSS Workshop are to be submitted through the WI/IAT 2010 Workshop Paper Submission system.
  
Paper should be formatted using the IEEE 2-colum format. Detailed formatting instructions can be found here.
+
Paper should be formatted using the IEEE 2-column format. Detailed formatting instructions can be found here.
  
 
Submissions describing original research are categorized as follows.
 
Submissions describing original research are categorized as follows.
  
    * full papers (up to 8 pages)
+
* full papers (up to 8 pages)
    * position papers (up to 4 pages)  
+
* position papers (up to 4 pages)  
 
 
 
  
 
All submissions must include the author's name(s), affiliation, complete mailing address, phone number, fax number and email address. All papers must be submitted in PDF format.
 
All submissions must include the author's name(s), affiliation, complete mailing address, phone number, fax number and email address. All papers must be submitted in PDF format.
Line 62: Line 59:
 
All submitted papers will be reviewed by at least two members of the Program Committee on the basis of:
 
All submitted papers will be reviewed by at least two members of the Program Committee on the basis of:
  
    * technical quality
+
* technical quality
    * strategies and approach with experimental results will be privileged
+
* strategies and approach with experimental results will be privileged
    * relevance to Web Information Retrieval Support Systems
+
* relevance to Web Information Retrieval Support Systems
    * originality, innovation and significance of the research
+
* originality, innovation and significance of the research
    * clarity of the writing
+
* clarity of the writing
    * commercialization viability Publication  
+
* commercialization viability Publication  
  
  
 
==Important Dates==
 
==Important Dates==
  
Apr. 16 2010: Papers Submission
+
* Apr. 23 (was Apr. 16 2010) : Papers Submission
Jun. 7 2010: Papers Notification
+
* Jun. 7 2010: Papers Notification
Jun. 21 2010: Deadline for camera-ready versions of accepted papers
+
* Jun. 21 2010: Deadline for camera-ready versions of accepted papers
Aug. 31 2010: WI-IAT 2010 Workshops
+
* Aug. 31 2010: WI-IAT 2010 Workshops
Sept. 1-3 2010: WI-IAT Conference
+
* Sept. 1-3 2010: WI-IAT Conference
 
 
==Committees==
 
  
 
* General Co-Chairs
 
* General Co-Chairs
 
** [[Luca Longo]], Trinity College Dublin, Ireland
 
** [[Luca Longo]], Trinity College Dublin, Ireland
 
** [[Pierpaolo Dondio]], Trinity College Dublin, Ireland
 
** [[Pierpaolo Dondio]], Trinity College Dublin, Ireland

Latest revision as of 13:01, 11 April 2010

TRESSS 2010
Trust and Recommender Systems for Social Search and Web-log analysis
Event in series In collab. with IEEE/WIC/ACM Intl. conf. on Web-Intelligence (WI-10), Intelligent Agent Technology (IAT-10)
Subevent of In collab. with IEEE/WIC/ACM Intl. conf. on Web-Intelligence (WI-10), Intelligent Agent Technology (IAT-10)
Dates 2010/08/31 (iCal) - 2010/08/31
Homepage: www.tresss.org
Location
Location: Toronto, Canada
Loading map...

Important dates
Submissions: 2010/04/16
Table of Contents


Social Search and applications based on mining logs of web activity are gaining momentum after the rapid growth of web 2.0. This rapid expansion has converted the Web into a multitude of user-generated applications, which in turn generate a very large and noisy dataset of logs. These datasets represent an extremely valuable source of information, strategic to augment marketing, business intelligence and to enhance information retrieval via social search engines.

Modern search systems, as well as online marketing and web-analytics applications can benefit greatly from using additional information about user's behaviour. Implicit or explicit feedback data based on direct interaction (e.g., clicks, scrolling, etc.), as well as user profiles/preferences, have proven a valuable source for enhancing and personalizing information retrieval and other web-related applications, such as customer segmentation and marketing. One of the main challenges remains how to effectively mine a large set of complex data affected by great level of noise, represented by non-pertinent, untrustworthy or even malicious data. Moreover, the challenge is to define models of users’ behaviour that can resists malicious attack, low quality information and preserve privacy.

Trust and Recommender systems, along with personalization techniques, and models of users’ behaviour appear to be essential candidates to enhance and support an effective analysis of web activity. These mechanisms could help filter, interpret and rank web-users' behaviour to assign the relevance of web-search results and deliver the most reliable and adequate content. Similarly, they may be helpful to define user-based anti-spam techniques, support web-analytics applications that mine only trustworthy sites and users’ activity, help users’ segmentation and decisions support tools for online marketing. This workshop focuses on discussing and identifying the most promising research directions with respect to applying reputation, trust systems and implicit or explicit users’ models in the analysis and exploitation of web-activity logs.

The focus of the workshops are innovative and challenging applications of recommendation and trust systems, personalization techniques, users models and data mining in the field of social search, user analysis and understanding. Particular interests are the following challenges:

  • How to built implicit/explicit models to rank and filter information based on users activity analysis
  • How trust and recommender systems can be used to enhance web logs analysis and social search engine
  • Users models resistant to attack and privacy-aware
  • Implicit users or trust models based on web-logs mining


Topics

The workshop brings together researchers from Recommender/Trust Systems as well as Data Mining, Multi-agent Systems, Information Retrieval and Human Computer Interaction. Topics of interest include, but are not limited to:

  • Trust, Reputation and Recommender systems for Social Search
  • Trust and Reputation based on User Behavioural Analysis
  • Reasoning and Data-Mining approach to trust and reputation using Web-logs
  • Anonymity and privacy-aware solutions for Social Search Systems
  • Users profiling and personalization in Social Search and Web-analytics
  • Cognitive models of users on the Web
  • Mining and Learning reputation and Users behaviour on the Web
  • Applications of recommender and trust systems to web analytics, information retrieval, marketing analysis, social search
  • Web Information Filtering and Retrieval in social networks and multi-agent systems
  • Web Security, Integrity, Privacy and Trust
  • Agent Systems Modelling and Methodology
  • Autonomous Knowledge and Information Agents (web entities)
  • Distributed Intelligence and Multi-agent paradigms for Social Search

Submissions

All papers for the 2010 TRESSS Workshop are to be submitted through the WI/IAT 2010 Workshop Paper Submission system.

Paper should be formatted using the IEEE 2-column format. Detailed formatting instructions can be found here.

Submissions describing original research are categorized as follows.

  • full papers (up to 8 pages)
  • position papers (up to 4 pages)

All submissions must include the author's name(s), affiliation, complete mailing address, phone number, fax number and email address. All papers must be submitted in PDF format.

All submitted papers will be reviewed by at least two members of the Program Committee on the basis of:

  • technical quality
  • strategies and approach with experimental results will be privileged
  • relevance to Web Information Retrieval Support Systems
  • originality, innovation and significance of the research
  • clarity of the writing
  • commercialization viability Publication


Important Dates

  • Apr. 23 (was Apr. 16 2010) : Papers Submission
  • Jun. 7 2010: Papers Notification
  • Jun. 21 2010: Deadline for camera-ready versions of accepted papers
  • Aug. 31 2010: WI-IAT 2010 Workshops
  • Sept. 1-3 2010: WI-IAT Conference