Advances in Bias and Fairness in Information Retrieval [[electronic resource] ] : 4th International Workshop, BIAS 2023, Dublin, Ireland, April 2, 2023, Revised Selected Papers / / edited by Ludovico Boratto, Stefano Faralli, Mirko Marras, Giovanni Stilo |
Autore | Boratto Ludovico |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (187 pages) |
Disciplina | 025.524 |
Altri autori (Persone) |
FaralliStefano
MarrasMirko StiloGiovanni |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer engineering
Computer networks Artificial intelligence Electronic commerce Computer Engineering and Networks Artificial Intelligence e-Commerce and e-Business |
ISBN | 3-031-37249-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Study on Accuracy, Miscalibration, and Popularity Bias in Recommendations -- Measuring Bias in Multimodal Models: Multimodal Composite Association Score -- Evaluating Fairness Metrics -- Utilizing Implicit Feedback for User Mainstreaminess Evaluation and Bias Detection in Recommender Systems -- Preserving Utility in Fair Top-k Ranking with Intersectional Bias -- Mitigating Position Bias in Hotels Recommender Systems -- Improving Recommender System Diversity with Variational Autoencoders -- Addressing Biases in the Texts using an End-to-End Pipeline Approach -- Bootless Application of Greedy Re-ranking Algorithms in Fair Neural Team Formation -- How do you feel? Information Retrieval in Psychotherapy and Fair Ranking Assessment -- Understanding Search Behavior Bias in Wikipedia -- Do you MIND? Reflections on the MIND dataset for research on diversity in news recommendations -- Detecting and Measuring Social Bias of Arabic Generative Models in the Context of Search and Recommendation -- What are we missing in algorithmic fairness? Discussing open challenges for fairness analysis in user profiling with Graph Neural Networks. |
Record Nr. | UNISA-996546825403316 |
Boratto Ludovico | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in Bias and Fairness in Information Retrieval : 4th International Workshop, BIAS 2023, Dublin, Ireland, April 2, 2023, Revised Selected Papers / / edited by Ludovico Boratto, Stefano Faralli, Mirko Marras, Giovanni Stilo |
Autore | Boratto Ludovico |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (187 pages) |
Disciplina | 025.524 |
Altri autori (Persone) |
FaralliStefano
MarrasMirko StiloGiovanni |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer engineering
Computer networks Artificial intelligence Electronic commerce Computer Engineering and Networks Artificial Intelligence e-Commerce and e-Business |
ISBN | 3-031-37249-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Study on Accuracy, Miscalibration, and Popularity Bias in Recommendations -- Measuring Bias in Multimodal Models: Multimodal Composite Association Score -- Evaluating Fairness Metrics -- Utilizing Implicit Feedback for User Mainstreaminess Evaluation and Bias Detection in Recommender Systems -- Preserving Utility in Fair Top-k Ranking with Intersectional Bias -- Mitigating Position Bias in Hotels Recommender Systems -- Improving Recommender System Diversity with Variational Autoencoders -- Addressing Biases in the Texts using an End-to-End Pipeline Approach -- Bootless Application of Greedy Re-ranking Algorithms in Fair Neural Team Formation -- How do you feel? Information Retrieval in Psychotherapy and Fair Ranking Assessment -- Understanding Search Behavior Bias in Wikipedia -- Do you MIND? Reflections on the MIND dataset for research on diversity in news recommendations -- Detecting and Measuring Social Bias of Arabic Generative Models in the Context of Search and Recommendation -- What are we missing in algorithmic fairness? Discussing open challenges for fairness analysis in user profiling with Graph Neural Networks. |
Record Nr. | UNINA-9910734876903321 |
Boratto Ludovico | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Digital Forensics X : 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XX, 335 p. 67 illus.) |
Disciplina | 364.168 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Computers and civilization Electronic commerce Information technology - Management Cryptography Data encryption (Computer science) Data and Information Security Computers and Society e-Commerce and e-Business Computer Application in Administrative Data Processing Cryptology |
ISBN | 3-662-44952-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Conditional Weighted Transaction Aggregation for Credit Card Fraud Detection -- Using Fraud Trees to Analyze Internet Credit Card Fraud -- Automated Analysis of Underground Marketplaces -- An Exploratory Profiling Study of Online Auction Fraudsters -- Web User Profiling Based on Browsing Behavior Analysis -- Validation Rules for Enhanced Foxy P2P Network Investigations -- Windows Event Forensic Process -- Schema Reconstruction in Database Forensics -- Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus -- Similarity Hashing Based on Levenshtein Distance -- Using Approximate Matching to Reduce the Volume of Digital Data -- Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision Fusion -- Breaking the Closed-World Assumption in Stylometric Authorship Attribution -- Preserving Dates and Timestamps for Incident Handling in Android Smartphones -- An Open Source Toolkit for iOS Filesystem Forensics -- Smartphones as Distributed Witnesses for Digital Forensics -- Smartphone Message Sentiment Analysis -- Forensic Analysis of the TomTom Navigation Application -- Performance of a Logical Five-Phase, Multithreaded, Bootable Triage Tool -- Towards Fully Automated Digital Alibis with Social Interactions -- Data Corpora for Digital Forensics Education and Research -- Educating the Next Generation of Cyberforensic Professionals. |
Record Nr. | UNINA-9910298995803321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Digital Forensics XI : 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XVIII, 357 p. 74 illus. in color.) |
Disciplina | 363.25968 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Computers and civilization Electronic commerce Information technology - Management Cryptography Data encryption (Computer science) Data and Information Security Computers and Society e-Commerce and e-Business Computer Application in Administrative Data Processing Cryptology |
ISBN | 3-319-24123-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Contents -- Contributing Authors -- Preface -- THEMES AND ISSUES -- A TALE OF TWO TRACES - DIPLOMATICS AND FORENSICS -- 1. Introduction -- 1.1 Causality as a Foundation of Science -- 1.2 Diplomatics -- 1.3 Archival Science and Public Records -- 1.4 Digital Records -- 1.5 Digital Diplomatics -- 1.6 Forensic Science -- 1.7 Digital Forensics -- 2. Digital Diplomatics and Forensics -- 2.1 Case 1 Background -- 2.2 Case 2 Background -- 2.3 Admitting the Documents -- 2.4 Related Information on Records -- 3. Case Resolution -- 3.1 Case 1 -- 3.2 Case 2 -- 4. Implications and the Path Forward -- 4.1 Implications -- 4.2 The Path Forward -- 5. Conclusions -- References -- NOTIONS OF HYPOTHESIS IN DIGITAL FORENSICS -- 1. Motivation -- 2. Related Work -- 3. Carrier's Work -- 3.1 History Duration -- 3.2 Primitive Storage System Configuration -- 3.3 Primitive Event System Configuration -- 3.4 Primitive State and Event Definition -- 3.5 Complex Storage System Configuration -- 3.6 Complex Event System Configuration -- 3.7 Complex State and Event Definition -- 4. Bunge's Classification -- 5. Limitations of the Study -- 6. Conclusions -- References -- USING YIN'S APPROACH TO CASE STUDIES AS A PARADIGM FOR CONDUCTING EXAMINATIONS -- 1. Introduction -- 2. Understanding a Case -- 2.1 What is a Case? -- 2.2 Case Study Design -- 2.3 Case Study Design -- 3. Digital Forensic Case Studies -- 3.1 Case Study 1 -- 3.2 Case Study 2 -- 3.3 Case Study 3 -- 4. Analytic Generalizations -- 5. Assessing Case Study Quality -- 6. Conclusions -- References -- AN INFORMATION EXTRACTION FRAMEWORK FOR DIGITAL FORENSIC INVESTIGATIONS -- 1. Introduction -- 2. Related Work -- 3. Information Extraction Framework -- 3.1 Named Entity Recognition -- 3.2 Relation Extraction -- 4. Experiments and Analysis -- 4.1 Dataset Description -- 4.2 Data Pre-Processing -- 4.3 Experimental Results.
5. Conclusions -- References -- INTERNET CRIME INVESTIGATIONS -- A GRAPH-BASED INVESTIGATION OF BITCOIN TRANSACTIONS -- 1. Introduction -- 2. Bitcoin System Overview -- 3. Transaction Data Collection -- 4. Graph-Based Bitcoin Transaction Analysis -- 4.1 Address Clustering -- 4.2 Address Graph Observations -- 4.3 Currency Flow Analysis -- 4.4 Mt. Gox Case Study -- 5. Discussion -- 6. Conclusions -- References -- PROFILING AND TRACKING ACYBERLOCKER LINK SHARERIN A PUBLIC WEB FORUM -- 1. Introduction -- 2. Related Work -- 3. Methodology -- 3.1 Data Collection -- 3.2 User Profile Construction -- 3.3 Multidimensional Scaling Analysis -- 3.4 Cluster Analysis -- 4. Experiments -- 4.1 Datasets -- 4.2 Evaluation Metric -- 4.3 Analysis of Sharers -- 4.4 Analysis of Sharers and Followers -- 5. Conclusions -- References -- A PRIVACY-PRESERVING ENCRYPTIONSCHEME FOR AN INTERNET REALNAMEREGISTRATION SYSTEM -- 1. Introduction -- 2. Background -- 2.1 Privacy -- 2.2 Real-Name Registration in South Korea -- 2.3 Real-Name Registration in China -- 3. Real-Name Registration Requirements -- 4. Real-Name Registration Overview -- 5. Privacy-Preserving Real-Name Registration -- 5.1 User Real-Name Registration Process -- 5.2 User Web-Name Registration Process -- 5.3 Privacy-Preserving Properties -- 6. Conclusions -- References -- A LOGIC-BASED NETWORK FORENSICMODEL FOR EVIDENCE ANALYSIS -- 1. Introduction -- 2. Background and Related Work -- 2.1 MulVAL and Logical Attack Graphs -- 2.2 Evidence Graphs -- 2.3 Related Work -- 3. Network Example -- 4. Attack Scenario Reconstruction -- 4.1 Rules and Facts -- 4.2 Evidence Graph Generation -- 5. Extending MulVAL -- 5.1 Using an Anti-Forensic Database -- 5.2 Integrating Evidence Standards -- 6. Experimental Results -- 7. Conclusions -- References -- FORENSIC TECHNIQUES -- CHARACTERISTICS OF MALICIOUSDLLS IN WINDOWS MEMORY. 1. Introduction -- 2. Motivation -- 3. Related Work -- 4. Test Data Generation -- 5. Data Classification -- 6. Injected DLL Characteristics -- 7. Threats to Validity -- 8. Conclusions -- References -- DETERMINING TRIGGERINVOLVEMENT DURING FORENSICATTRIBUTION IN DATABASES -- 1. Introduction -- 2. Background -- 2.1 Forensic Attribution -- 2.2 Triggers -- 3. Trigger Identification -- 4. Algorithm Implementation -- 5. Implementation Challenges -- 5.1 Scope and Visibility -- 5.2 Encryption -- 5.3 Case Sensitivity -- 5.4 False Positive Errors -- 5.5 Data Types -- 5.6 Recursion -- 5.7 Performance -- 6. Conclusions -- References -- USING INTERNAL MySQL/InnoDBB-TREE INDEX NAVIGATION FORDATA HIDING -- 1. Introduction -- 2. Background and Related Work -- 3. InnoDB Index -- 4. Data Removal -- 4.1 Physical Deletion of Data Records -- 4.2 Forensic Impact -- 5. Data Hiding -- 5.1 Manipulating Search Results -- 5.2 Reorganizing the Index -- 5.3 Hiding Data in Index Page Garbage Space -- 5.4 Hiding Data in Index Page Free Space -- 5.5 Removing a Page from the Index -- 6. Conclusions -- References -- IDENTIFYING PASSWORDSSTORED ON DISK -- 1. Introduction -- 2. Related Work -- 3. Background -- 3.1 Probabilistic Context-Free Grammars -- 4. Examining a Disk -- 4.1 Recovering Files from a Disk -- 4.2 Retrieving Tokens from Files -- 4.3 Initial Filtering -- 4.4 Specialized Alpha String Filtering -- 5. Identifying Passwords -- 5.1 Calculating Token Probabilities -- 5.2 Ranking Algorithms -- 6. Experimental Evaluation -- 6.1 Experimental Setup -- 6.2 Initial Filtering -- 6.3 Ranking Algorithms -- 6.4 Specialized Filtering -- 7. Conclusions -- References -- FRAGMENTED JPEG FILE RECOVERYUSING PSEUDO HEADERS -- 1. Introduction -- 2. Related Work -- 3. JPEG Background -- 3.1 Essential Configurations in JPEG Headers -- 3.2 Synchronization Point. 4. JPEG File Recovery Methodology -- 4.1 Huffman Table and Sub-Sampling Factor -- 4.2 Image Resolution -- 4.3 Quantization Table -- 5. Experimental Results -- 6. Conclusions -- References -- MOBILE DEVICEFORENSICS -- FORENSIC-READY SECURE iOS APPSFOR JAILBROKEN iPHONES -- 1. Introduction -- 2. Related Work -- 3. Implementation Methodology -- 3.1 Securing Apps -- 3.2 Preserving Dates and Timestamps -- 3.3 Static Library -- 3.4 Dynamic Library -- 4. Preventing Attacks and Anti-Forensics -- 4.1 Using the Static Library -- 4.2 Using the Dynamic Library -- 5. Experimental Results -- 6. Case Study -- 7. Conclusions -- References -- A FRAMEWORK FOR DESCRIBINGMULTIMEDIA CIRCULATION INA SMARTPHONE ECOSYSTEM -- 1. Introduction -- 2. Related Work -- 3. Using Graph Databases -- 4. Use Case Experiments -- 5. Results -- 6. System Design -- 7. Conclusions -- References -- CLOUD FORENSICS -- A TRUSTWORTHY CLOUDFORENSICS ENVIRONMENT -- 1. Introduction -- 2. Related Work -- 3. Desired Properties -- 4. Challenges -- 5. FECloud Architecture -- 5.1 Logger (Themis) -- 5.2 Data Possession Manager (Metis) -- 5.3 Timestamp Manager (Chronos) -- 5.4 Provenance Manager (Clio) -- 5.5 Proof Publisher (Brizo) -- 5.6 Evidence Access Interface (Horizon) -- 5.7 Forensics-Enabled Image -- 5.8 Preliminary Results -- 6. Conclusions -- References -- LOCATING AND TRACKING DIGITALOBJECTS IN THE CLOUD -- 1. Introduction -- 2. Background -- 2.1 Cloud Computing -- 2.2 Digital Forensics -- 2.3 Data Provenance -- 3. Related Work -- 3.1 Storing Provenance Data -- 3.2 Data Provenance Requirements -- 4. Cloud-Based Provenance Model -- 5. Using a Central Logging Server -- 5.1 File Wrapper -- 5.2 Tracking Wrapper Locations -- 6. Discussion -- 7. Conclusions -- References -- FORENSIC TOOLS -- A TOOL FOR EXTRACTING STATIC ANDVOLATILE FORENSIC ARTIFACTS OFWINDOWS 8.x APPS -- 1. Introduction. 2. Related Work -- 2.1 Windows 8 Forensics -- 2.2 Forensic Analysis of Apps -- 3. Background -- 3.1 Hibernation File -- 3.2 Swap File -- 3.3 Static vs. Volatile Artifacts -- 4. Experimental Methodology -- 5. Experimental Results -- 5.1 Facebook -- 5.2 Other Apps -- 5.3 Performance -- 6. Conclusions -- References -- CRITERIA FOR VALIDATINGSECURE WIPING TOOLS -- 1. Introduction -- 2. Deletion Effects and Deletion Types -- 2.1 Deletion Effects -- 2.2 Deletion Types -- 3. File Deletion Artifacts -- 3.1 MFT Records (Recycle Bin Deletion) -- 3.2 LogFile (Recycle Bin Deletion) -- 3.3 Hard Disk (Recycle Bin Deletion) -- 3.4 MFT Records (Permanent File Deletion) -- 3.5 LogFile (Permanent File Deletion) -- 3.6 Hard Disk (Permanent File Deletion) -- 4. Validation Criteria -- 4.1 Specifications -- 4.2 Test Assertions -- 4.3 Test Cases (SW-TC) -- 4.4 Relational Summary Table -- 5. Validation Testing of Eraser -- 6. Conclusions -- References -- DO DATA LOSS PREVENTIONSYSTEMS REALLY WORK? -- 1. Introduction -- 2. Related Work -- 3. Evaluated Systems -- 3.1 Agent-Based Solution -- 3.2 Agentless Solution -- 3.3 Hybrid Solution -- 3.4 File System Scanning Tool -- 4. Experimental Setup -- 5. Experimental Results -- 6. Discussion -- 7. Conclusions -- References. |
Record Nr. | UNINA-9910299205603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Digital Forensics XII : 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XVIII, 396 p. 99 illus.) |
Disciplina | 363.25 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Computers and civilization Electronic commerce Information technology - Management Cryptography Data encryption (Computer science) Data and Information Security Computers and Society e-Commerce and e-Business Computer Application in Administrative Data Processing Cryptology |
ISBN | 3-319-46279-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910254985803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Network and Distributed Systems Security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | New York, NY : , : Springer US : , : Imprint : Springer, , 2002 |
Descrizione fisica | 1 online resource (218 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | DeckerBart de <1958-> |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Computer science
Microprocessors Computer architecture Computer networks Electronic commerce Electronic data processing - Management Theory of Computation Processor Architectures Computer Communication Networks e-Commerce and e-Business IT Operations |
ISBN |
1-280-20490-7
9786610204908 0-306-46958-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Role-based Specification of the SET Payment Transaction Protocol -- Information Security: Mutual Authentication in E-commerce -- Software-based Receipt-freeness in On-line Elections -- ID-based Structured Multisignature Schemes -- Probabilistic Relations for the Solitaire Keystream Generator -- Hazard Analysis for Security Protocol Requirements -- Securing RMI Communication -- Secure Java Development with UML -- Security Through Aspect-oriented Programming -- Extending a Campus Network with Remote Bubbles Using IPsec -- Combining World Wide Web and Wireless Security -- On Mobile Agent Based Transactions in Moderately Hostile Environments -- Sparta -- Shell’s Trust Domain Infrastructure Security Certification. |
Record Nr. | UNINA-9910780042403321 |
New York, NY : , : Springer US : , : Imprint : Springer, , 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Network and Distributed Systems Security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | New York, NY : , : Springer US : , : Imprint : Springer, , 2002 |
Descrizione fisica | 1 online resource (218 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | DeckerBart de <1958-> |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Computer science
Microprocessors Computer architecture Computer networks Electronic commerce Electronic data processing - Management Theory of Computation Processor Architectures Computer Communication Networks e-Commerce and e-Business IT Operations |
ISBN |
1-280-20490-7
9786610204908 0-306-46958-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Role-based Specification of the SET Payment Transaction Protocol -- Information Security: Mutual Authentication in E-commerce -- Software-based Receipt-freeness in On-line Elections -- ID-based Structured Multisignature Schemes -- Probabilistic Relations for the Solitaire Keystream Generator -- Hazard Analysis for Security Protocol Requirements -- Securing RMI Communication -- Secure Java Development with UML -- Security Through Aspect-oriented Programming -- Extending a Campus Network with Remote Bubbles Using IPsec -- Combining World Wide Web and Wireless Security -- On Mobile Agent Based Transactions in Moderately Hostile Environments -- Sparta -- Shell’s Trust Domain Infrastructure Security Certification. |
Record Nr. | UNINA-9910825744303321 |
New York, NY : , : Springer US : , : Imprint : Springer, , 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets : AMEC/TADA 2015, Istanbul, Turkey, May 4, 2015, and AMEC/TADA 2016, New York, NY, USA, July 10, 2016, Revised Selected Papers / / edited by Sofia Ceppi, Esther David, Chen Hajaj, Valentin Robu, Ioannis A. Vetsikas |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (IX, 157 p. 49 illus.) |
Disciplina | 658.84 |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Electronic commerce
Artificial intelligence Information technology - Management Application software e-Commerce and e-Business E-Business Artificial Intelligence Computer Application in Administrative Data Processing Computer and Information Systems Applications |
ISBN | 3-319-54229-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Strategic Free Information Disclosure for a Vickrey Auction -- On Revenue-Maximizing Walrasian Equilibria for Multi-Minded Bidders -- Extending Parking Lots with Electricity Trading Agent Functionalities -- Auction Based Mechanisms for Dynamic Task Assignments in Expert Crowdsourcing -- An Effective Broker for the Power TAC 2014 -- Now, Later, or Both: a Closed-Form Optimal Decision for a Risk-Averse Buyer -- Investigation of Learning Strategies for the SPOT Broker in Power TAC -- On the Use of Off-the-Shelf Machine Learning Techniques to Predict Energy Demands of Power TAC Consumers -- A Genetic Algorithmic Approach to Automated Auction Mechanism Design -- AgentUDE: The Success Story of the Power TAC 2014’s Champion. . |
Record Nr. | UNINA-9910254838803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets : AMEC 2013, Saint Paul, MN, USA, May 6, 2013, TADA 2013, Bellevue, WA, USA, July 15, 2013, and AMEC and TADA 2014, Paris, France, May 5, 2014, Revised Selected Papers / / edited by Sofia Ceppi, Esther David, Vedran Podobnik, Valentin Robu, Onn Shehory, Sebastian Stein, Ioannis A. Vetsikas |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (IX, 171 p. 37 illus.) |
Disciplina | 658.84 |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Electronic commerce
Business information services Artificial intelligence Information technology - Management Application software e-Commerce and e-Business IT in Business Artificial Intelligence Computer Application in Administrative Data Processing Computer and Information Systems Applications |
ISBN | 3-319-13218-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | An Analysis of Power Trading Agent Competition 2014 -- Towards Modeling Securities Markets as a Society of Heterogeneous Trading Agents -- A Market-Based Coordinated Negotiation for QoS-Aware Service Selection -- Optimal Agendas for Sequential Negotiations -- An Empirical Analysis of QuiBids’ Penny Auctions -- Analysis of Fairness and Incentives of Profit Sharing Schemes in Group Buying -- Distributed Prediction Markets Modeled by Weighted Bayesian Graphical Games -- A Successful Broker Agent for Power TAC -- Online Double Auction for Perishable Goods -- Designing Tariffs in a Competitive Energy Market Using Particle Swarm Optimization Techniques -- Classification Driven Detection of Opportunistic Bids in TAC SCM -- An Intelligent Learning Mechanism for Trading Strategies for Local Energy Distribution. |
Record Nr. | UNINA-9910298967403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets : AMEC and TADA 2012, Valencia, Spain, June 4th, 2012, Revised Selected Papers / / edited by Esther David, Christopher Kiekintveld, Valentin Robu, Onn Shehory, Sebastian Stein |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XII, 161 p. 44 illus.) |
Disciplina | 658.84 |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Electronic commerce
Business information services Artificial intelligence Information technology - Management Application software e-Commerce and e-Business IT in Business Artificial Intelligence Computer Application in Administrative Data Processing Computer and Information Systems Applications |
ISBN | 3-642-40864-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Social Networking and Information Diffusion in Automated Markets -- Policy Search through Adaptive Function Approximation for Bidding in TAC SCM -- Designing Robust Strategies for Continuous Trading in Contemporary Power Markets -- JACK: A Java Auction Configuration Kit -- A Decision Framework for Broker Selection in Smart Grids -- Prediction Market-Based Information Aggregation for Multi-sensor Information Processing -- Agent Adaptation across Non-ideal Markets and Societies -- Incentives in Multi-dimensional Auctions under Information Asymmetry for Costs and Qualities -- A Model-Free Approach for a TAC-AA Trading Agent -- Ad Exchange – Proposal for a New Trading Agent Competition Game -- Competing Intermediaries in Online Display Advertising. |
Record Nr. | UNINA-9910437600803321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|