标题
Strategies for avoiding preference profiling in agent-based e-commerce environments
作者
关键词
Privacy, Agent-based e-commerce, Preference profiling, Interaction analysis, Data mining
出版物
APPLIED INTELLIGENCE
Volume 40, Issue 1, Pages 127-142
出版商
Springer Nature
发表日期
2013-06-12
DOI
10.1007/s10489-013-0448-2
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Data mining agent conversations: A qualitative approach to multiagent systems analysis
- (2013) Emilio Serrano et al. INFORMATION SCIENCES
- A novel method for coevolving PS-optimizing negotiation strategies using improved diversity controlling EDAs
- (2012) Jeonghwan Gwak et al. APPLIED INTELLIGENCE
- Mining interesting user behavior patterns in mobile commerce environments
- (2012) Bai-En Shie et al. APPLIED INTELLIGENCE
- Predicting student failure at school using genetic programming and different data mining approaches with high dimensional and imbalanced data
- (2012) Carlos Márquez-Vera et al. APPLIED INTELLIGENCE
- Magentix2: A privacy-enhancing Agent Platform
- (2012) Jose M. Such et al. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE
- An approach to debug interactions in multi-agent system software tests
- (2012) Emilio Serrano et al. INFORMATION SCIENCES
- Ontology-based user profile learning
- (2011) Victoria Eyharabide et al. APPLIED INTELLIGENCE
- Simultaneous optimization of artificial neural networks for financial forecasting
- (2011) Kyoung-jae Kim et al. APPLIED INTELLIGENCE
- Partial identities as a foundation for trust and reputation
- (2011) Jose M. Such et al. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE
- A new approach to simultaneous localization and map building with implicit model learning using neuro evolutionary optimization
- (2010) Jeong-Gwan Kang et al. APPLIED INTELLIGENCE
- A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
- (2010) Kok-Chin Khor et al. APPLIED INTELLIGENCE
- Learning opponent’s preferences for effective negotiation: an approach based on concept learning
- (2010) Reyhan Aydoğan et al. AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS
- A group-oriented secure multiagent platform
- (2010) Jose M. Such et al. SOFTWARE-PRACTICE & EXPERIENCE
- Debugging complex software systems by means of pathfinder networks
- (2009) Emilio Serrano et al. INFORMATION SCIENCES
- Intelligent data analysis applied to debug complex software systems
- (2009) Emilio Serrano et al. NEUROCOMPUTING
- Privacy and Identity Management
- (2008) Marit Hansen et al. IEEE SECURITY & PRIVACY
- Engineering Privacy
- (2008) S. Spiekermann et al. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
Become a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get StartedAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started