Online citations, reference lists, and bibliographies.
← Back to Search

Competitive Agents For Information Filtering

Paul E. Baclace
Published 1992 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
(See Table 2 for rule examples.) Many of the rules were shared by more than one user. Such rules could form the basis Of stereotypes, which could be used as initial filters for new users. Preliminary results also show that users employed a small number Of goal types and message types in their rules, and that each user's rules were consistent among themselves. There were never two rules where the same conjunctive clause implied that a user would both read and not read a message. Also, if more than one rule applied to a ruessage, all Of the rules would imply the same reading decision. This provides a basis for automating rule learning because many machine-learning algorithms require little or no noise in the data set (e.g., no contradictions). Some of the goals and domain concepts news readers used to describe messages were more abstract and will be more difficult to acquire for the user models. Abstract goals (e.g., look in documentation, ignore impossible configurations) and abstract domain categories (e.g., actually experienced, factual, popular, easy, new, informative) are more difficult to find or parse from a message and are harder to acquire from the user because they develop as the user reads messages and cannot be known beforehand. Thus, the abstract categories cannot be used in the initial phase of knowledge acquisition when the user first specifies his or her user model. In the study, news readers used them to describe the message and their reading decision for as many as one-third of the messages. These categories will require more elaborate representation and acquisition techniques than those currently used for the user models. It is important for information filters to model users' interests, though it is difficult to keep such models accurate. However, there appear to be some things that can be done to make such models and information filters based on them more useful. [ ] 1. Furnas, G.W., Landauer, T.K., Gomez, L.M. and Dumais, S.T. The vocabulary problem in human-system communication. Commun. A C M , 30(11):964-971, 1987. 2. Gaines, B.R. and Shaw, M.L.G. Comparing the conceptual systems of experts. In Eleventh International Conference on Artif icial Intelligence (1989), pp. 633-638. 3. Stadnyk, I. and Kass, R. Modeling users' interests in information filters. Tech. Rep. CFAR-92-006, Center for Advanced Research, 1992.
This paper references



This paper is referenced by
10.1002/smr.271
A model of factors affecting an information system's change in state
J. Heales (2002)
10.1109/CNMT.2009.5374518
Key Management Integrated with Intrusion Detection in Wireless Sensor Networks
Xing Zhang (2009)
Design of a System Providing Customizable Content-Based Message filtering for OSN’s
N. Alekya (2014)
10.1016/j.adhoc.2006.05.014
Access control in wireless sensor networks
Yun Zhou (2007)
10.14257/IJDTA.2014.7.3.12
Eliminating unwanted messages in SNS using Decision tree
Venkata Naresh Mandhala (2014)
To Assess Numerous Procedures in combination with a Neural learning plan to semantically classify short texts
Vijya Sai KumarSheela (2015)
10.1007/s11047-008-9068-x
Autopoiesis, the immune system, and adaptive information filtering
Nikolaos Nanas (2008)
Nootropia : A Self-Organising Agent for Adaptive Document Filtering Tech Report kmi-04-2
Nikolaos Nanas (2005)
10.1016/0164-1212(94)00093-3
An empirical analysis of software effort estimate alterations
Girish H. Subramanian (1995)
An Efficient Filtering Technique over Undesirable Data of OSN User Walls
Rakesh Singampalli (2014)
10.1109/ICCPCT.2014.7054762
Content based filtering in online social network using inference algorithm
N. Thilagavathi (2014)
10.1109/CCECE.2007.249
Securing XML Web Services with Elliptic Curve Cryptography
Y. Liu (2007)
10.1109/TKDE.2011.230
A System to Filter Unwanted Messages from OSN User Walls
M. Vanetti (2013)
10.1002/eng2.12176
Multi‐user broadcast authentication scheme for wireless sensor network based on elliptic curve cryptography
Philemon Kasyoka (2020)
10.1002/sec.1591
Provably secure biometric-based user authentication and key agreement scheme in cloud computing
M. Wazid (2016)
Towards a Medium for Agent-Based Interaction
A. Wood (1994)
10.5120/19918-2065
A Survey on OSN Message Filtering
Kalpesh Gandhi (2015)
10.3923/JSE.2007.1.12
A Systematic Literature Review of Software Defect Prediction: Research Trends, Datasets, Methods and Frameworks
R. S. Wahono (2007)
10.1109/ICCIT.2009.275
Security Considerations on Node Mobility in Wireless Sensor Networks
X. Zhang (2009)
10.1007/s10664-006-9023-3
An empirical study of the effect of complexity, platform, and program type on software development effort of business applications
Girish H. Subramanian (2006)
10.1007/978-3-030-36691-9_20
Detecting brute-force attacks on cryptocurrency wallets
E. Kiktenko (2019)
10.1007/978-94-011-7108-3_52
Adaptive User Models for Intelligent Information Filtering
Kenrick J. Mock (1995)
10.1080/09558543.1992.12031209
Authoring for English Literature in HyperCard: Where in the World is Blake's Tyger?
D. Dowling (1992)
10.1007/978-3-642-60018-0
Intelligent Information Agents
M. Klusch (1999)
Information Filtering In Automated Text Categorization
G. Shoba (2014)
10.1016/j.jss.2010.08.056
Efficient key management for preserving HIPAA regulations
Hui-Feng Huang (2011)
10.1109/ICIII.2009.569
Key Management for Feeder Automation Systems with Centralized Mode
Zhongwei Sun (2009)
10.1109/JIOT.2017.2706752
Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment
M. Wazid (2017)
10.1002/sec.1140
An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks
S. Chatterjee (2015)
An Unwanted Messages Filtering System from OSN User Walls using Blacklist Mechanism
G. Lavanya (2014)
Survey onFiltration of Unwanted Messages from OSN Using Customizable Filtering Rules
S. Dhivya (2015)
Filtering of Unwanted Messages from OSN User Walls
Narsampalli Bhargavi (2015)
See more
Semantic Scholar Logo Some data provided by SemanticScholar