Strategies for avoiding preference profiling in agent-based e-commerce environments
Published 2013 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Strategies for avoiding preference profiling in agent-based e-commerce environments
Authors
Keywords
Privacy, Agent-based e-commerce, Preference profiling, Interaction analysis, Data mining
Journal
APPLIED INTELLIGENCE
Volume 40, Issue 1, Pages 127-142
Publisher
Springer Nature
Online
2013-06-12
DOI
10.1007/s10489-013-0448-2
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Data mining agent conversations: A qualitative approach to multiagent systems analysis
- (2013) Emilio Serrano et al. INFORMATION SCIENCES
- A novel method for coevolving PS-optimizing negotiation strategies using improved diversity controlling EDAs
- (2012) Jeonghwan Gwak et al. APPLIED INTELLIGENCE
- Mining interesting user behavior patterns in mobile commerce environments
- (2012) Bai-En Shie et al. APPLIED INTELLIGENCE
- Predicting student failure at school using genetic programming and different data mining approaches with high dimensional and imbalanced data
- (2012) Carlos Márquez-Vera et al. APPLIED INTELLIGENCE
- Magentix2: A privacy-enhancing Agent Platform
- (2012) Jose M. Such et al. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE
- An approach to debug interactions in multi-agent system software tests
- (2012) Emilio Serrano et al. INFORMATION SCIENCES
- Ontology-based user profile learning
- (2011) Victoria Eyharabide et al. APPLIED INTELLIGENCE
- Simultaneous optimization of artificial neural networks for financial forecasting
- (2011) Kyoung-jae Kim et al. APPLIED INTELLIGENCE
- Partial identities as a foundation for trust and reputation
- (2011) Jose M. Such et al. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE
- A new approach to simultaneous localization and map building with implicit model learning using neuro evolutionary optimization
- (2010) Jeong-Gwan Kang et al. APPLIED INTELLIGENCE
- A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
- (2010) Kok-Chin Khor et al. APPLIED INTELLIGENCE
- Learning opponent’s preferences for effective negotiation: an approach based on concept learning
- (2010) Reyhan Aydoğan et al. AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS
- A group-oriented secure multiagent platform
- (2010) Jose M. Such et al. SOFTWARE-PRACTICE & EXPERIENCE
- Debugging complex software systems by means of pathfinder networks
- (2009) Emilio Serrano et al. INFORMATION SCIENCES
- Intelligent data analysis applied to debug complex software systems
- (2009) Emilio Serrano et al. NEUROCOMPUTING
- Privacy and Identity Management
- (2008) Marit Hansen et al. IEEE SECURITY & PRIVACY
- Engineering Privacy
- (2008) S. Spiekermann et al. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now