Loading...
Search for: world-wide-web
0.012 seconds
Total 48 records

    CCGG: A deep autoregressive model for class-conditional graph generation

    , Article 31st ACM Web Conference, WWW 2022, 25 April 2022 ; 2022 , Pages 1092-1098 ; 9781450391306 (ISBN) Ommi, Y ; Yousefabadi, M ; Faez, F ; Sabour, A ; Soleymani Baghshah, M ; Rabiee, H. R ; ACM SIGWEB ; Sharif University of Technology
    Association for Computing Machinery, Inc  2022
    Abstract
    Graph data structures are fundamental for studying connected entities. With an increase in the number of applications where data is represented as graphs, the problem of graph generation has recently become a hot topic. However, despite its significance, conditional graph generation that creates graphs with desired features is relatively less explored in previous studies. This paper addresses the problem of class-conditional graph generation that uses class labels as generation constraints by introducing the Class Conditioned Graph Generator (CCGG). We built CCGG by injecting the class information as an additional input into a graph generator model and including a classification loss in its... 

    ROSE: Role-based Signed Network Embedding

    , Article 29th International World Wide Web Conference, WWW 2020, 20 April 2020 through 24 April 2020 ; 2020 , Pages 2782-2788 Javari, A ; Derr, T ; Esmailian, P ; Tang, J ; Kevin Chen-C. C ; Chunghwa Telecom; et al.; Microsoft; Quanta Computer; Taiwan Mobile; ZOOM ; Sharif University of Technology
    Association for Computing Machinery, Inc  2020
    Abstract
    In real-world networks, nodes might have more than one type of relationship. Signed networks are an important class of such networks consisting of two types of relations: positive and negative. Recently, embedding signed networks has attracted increasing attention and is more challenging than classic networks since nodes are connected by paths with multi-types of links. Existing works capture the complex relationships by relying on social theories. However, this approach has major drawbacks, including the incompleteness/inaccurateness of such theories. Thus, we propose network transformation based embedding to address these shortcomings. The core idea is that rather than directly finding the... 

    Externalities and fairness

    , Article 2019 World Wide Web Conference, WWW 2019, 13 May 2019 through 17 May 2019 ; 2019 , Pages 538-548 ; 9781450366748 (ISBN) Seddighin, M ; Saleh, H ; Ghodsi, M ; Amazon; Bloomberg; Criteo AI Lab; et al.; Google; Microsoft ; Sharif University of Technology
    Association for Computing Machinery, Inc  2019
    Abstract
    One of the important yet insufficiently studied subjects in fair allocation is the externality effect among agents. For a resource allocation problem, externalities imply that the share allocated to an agent may affect the utilities of other agents. In this paper, we conduct a study of fair allocation of indivisible goods when the externalities are not negligible. Inspired by the models in the context of network diffusion, we present a simple and natural model, namely network externalities, to capture the externalities. To evaluate fairness in the network externalities model, we generalize the idea behind the notion of maximin-share (MMS) to achieve a new criterion, namely,... 

    Extracting implicit social relation for social recommendation techniques in user rating prediction

    , Article 26th International World Wide Web Conference, WWW 2017 Companion, 3 April 2017 through 7 April 2017 ; 2019 , Pages 1343-1351 ; 9781450349147 (ISBN) Taheri, S. M ; Elahe Ghalebi, K ; Mahyar, H ; Grosu, R ; Firouzi, M ; Movaghar, A ; Sharif University of Technology
    International World Wide Web Conferences Steering Committee  2019
    Abstract
    Recommendation plays an increasingly important role in our daily lives. Recommender systems automatically suggest items to users that might be interesting for them. Recent studies illustrate that incorporating social trust in Matrix Factorization methods demonstrably improves accuracy of rating prediction. Such approaches mainly use the trust scores explicitly expressed by users. However, it is often challenging to have users provide explicit trust scores of each other. There exist quite a few works, which propose Trust Metrics to compute and predict trust scores between users based on their interactions. In this paper, first we present how social relation can be extracted from users'... 

    Centrality-based group formation in group recommender systems

    , Article 26th International World Wide Web Conference, WWW 2017 Companion, 3 April 2017 through 7 April 2017 ; 2019 , Pages 1187-1196 ; 9781450349147 (ISBN) Mahyar, H ; Khalili, S ; Elahe Ghalebi, K ; Grosu, R ; Mojde Morshedi, S ; Movaghar, A ; Sharif University of Technology
    International World Wide Web Conferences Steering Committee  2019
    Abstract
    Recommender Systems have become an attractive field within the recent decade because they facilitate users' selection process within limited time. Conventional recommender systems have proposed numerous methods focusing on recommendations to individual users. Recently, due to a significant increase in the number of users, studies in this field have shifted to properly identify groups of people with similar preferences and provide a list of recommendations for each group. Offering a recommendations list to each individual requires significant computational cost and it is therefore often not efficient. So far, most of the studies impose four restrictive assumptions: (1) limited number of... 

    Extracting implicit social relation for social recommendation techniques in user rating prediction

    , Article 26th International World Wide Web Conference, WWW 2017 Companion, 3 April 2017 through 7 April 2017 ; 2019 , Pages 1343-1351 ; 9781450349147 (ISBN) Taheri, S. M ; Elahe Ghalebi, K ; Mahyar, H ; Grosu, R ; Firouzi, M ; Movaghar, A ; Sharif University of Technology
    International World Wide Web Conferences Steering Committee  2019
    Abstract
    Recommendation plays an increasingly important role in our daily lives. Recommender systems automatically suggest items to users that might be interesting for them. Recent studies illustrate that incorporating social trust in Matrix Factorization methods demonstrably improves accuracy of rating prediction. Such approaches mainly use the trust scores explicitly expressed by users. However, it is often challenging to have users provide explicit trust scores of each other. There exist quite a few works, which propose Trust Metrics to compute and predict trust scores between users based on their interactions. In this paper, first we present how social relation can be extracted from users'... 

    Towards a goal-driven method for web service choreography validation

    , Article 2016 2nd International Conference on Web Research, ICWR 2016, 27 April 2016 through 28 April 2016 ; 2016 , Pages 66-71 ; 9781509021666 (ISBN) Parsa, S ; Ebrahimifard, A ; Amiri, M. J ; Khoramabadi Arani, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Nowadays web services composition that presents capabilities in response to customers' complex requirements has a special importance in real businesses. However, service choreography as a form of service composition, still faces many challenges. One of the most important challenges of the choreography domain is how to validate the model based on the corresponding requirements. To this end, in this paper processes choreographies are modeled using the interaction view of BPMN 2.0 standard. Then, goal modeling is suggested to extract the requirements. For each requirement all possible valid scenarios are considered and finally using Savara tool, the requirements' scenarios are modeled and the... 

    Multiple cell tracking algorithm assessment using simulation of spermatozoa movement

    , Article 2015 IEEE 15th International Conference on Bioinformatics and Bioengineering, BIBE 2015, 2 November 2015 through 4 November 2015 ; 2015 ; 9781467379830 (ISBN) Arasteh, A ; Vahdat, B. V ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this research, a web-based simulator is developed, which can be used for generating image sequences of moving spermatozoa cells. It can be used for assessment of multiple object tracking algorithms, especially Computer Aided Sperm Analysis (CASA) systems. The developed software has many useful parameters such as blurring images or adding noise and it also gives full control of sperm counts and types. To illustrate performance of the developed simulator, three parameters (spermatozoa population, standard deviation of Gaussian blur filter and noise intensity) have been swept and the results of three different multiple object tracking algorithms were compared as an application of this... 

    Utilizing mixed methods research in analyzing Iranian researchers' informarion search behaviour in the web and presenting the current pattern

    , Article Iranian Journal of Information Processing Management ; Volume 31, Issue 1 , 2015 , Pages 27-57 ; 22518223 (ISSN) Asadi, M ; Hariri, N ; Sharif University of Technology
    Iranian Research Institute for Scientific Information and Documentation  2015
    Abstract
    Using mixed method research the current study has analyzed Iranian researchers' information searching behavior on the Web. Based on extracted concepts, the model of their information searching behavior was revealed. Forty-four participants, including academic staff from universities and research centers were recruited for this study selected by purposive sampling. Data were gathered from questionnaires including ten questions and semi-structured interview. Each participant's memos were analyzed using grounded theory methods adapted from Strauss & Corbin (1998). Results showed that the main objectives of subjects were doing a research, writing a paper, studying, doing assignments, downloading... 

    ExceptionTracer: A Solution Recommender for Exceptions in an Integrated Development Environment

    , Article 23rd IEEE International Conference on Program Comprehension, ICPC 2015, 18 May 2015 through 19 May 2015 ; Volume 2015-August , May , 2015 , Pages 299-302 ; 9781467381598 (ISBN) Amintabar, V ; Heydarnoori, A ; Ghafari, M ; Sharif University of Technology
    IEEE Computer Society  2015
    Abstract
    Exceptions are an indispensable part of the software development process. However, developers usually rely on imprecise results from a web search to resolve exceptions. More specifically, they should personally take into account the context of an exception, then, choose and adapt a relevant solution to solve the problem. In this paper, we present Exception Tracer, an Eclipse plug in that helps developers to resolve exceptions with respect to the stack trace in Java programs. In particular, Exception Tracer automatically provides candidate solutions to an exception by mining software systems in the Source Forge, as well as listing relevant discussions about the problem from the Stack Overflow... 

    Event-driven web application testing based on model-based mutation testing

    , Article Information and Software Technology ; Volume 67 , 2015 , Pages 159-179 ; 09505849 (ISSN) Habibi, E ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
    Elsevier  2015
    Abstract
    Context Event-Driven Software (EDS) is a class of software whose behavior is driven by incoming events. Web and desktop applications that respond to user-initiated events on their Graphical User Interface (GUI), or embedded software responding to events and signals received from the equipment in its operating environment are examples of EDS. Testing EDS poses great challenges to software testers. One of these challenges is the need to generate a huge number of possible event sequences that could sufficiently cover the EDS's state space. Objective In this paper, we introduce a new six-stage testing procedure for event-driven web applications to overcome EDS testing challenges. Method The... 

    A study of employees' views of strategic information systems in Iranian banks: The case of internet banking

    , Article International Journal of Information and Communication Technology ; Volume 7, Issue 1 , 2015 , Pages 52-72 ; 14666642 (ISSN) Farzaneh, M ; Najafloo, F ; Rasouli, H ; Sharif University of Technology
    Inderscience Enterprises Ltd  2015
    Abstract
    Internet banking is a tool to achieve competitive advantage and its usage has been spreading rapidly in recent years. This paper strives to identify a comprehensive study of the major internet banking quality measurements, which covers a wide range of literature relevant to international papers and scholars and then evaluate them through using a precise method, Shannon entropy. At the last stage the validated criteria were exploited to survey in Iranian banks. The empirical research consists of a quantitative study of internet banking by a sample of employees in two banks of Iran. In this regard, the raised question is about whether or not the internet banking is a strategic information... 

    Network reconstruction under compressive sensing

    , Article Proceedings of the 2012 ASE International Conference on Social Informatics, SocialInformatics ; 2013 , Pages 19-25 ; 9780769550152 (ISBN) Siyari, P ; Rabiee, H. R ; Salehi, M ; Mehdiabadi, M. E ; Academy of Science and Engineering (ASE) ; Sharif University of Technology
    2013
    Abstract
    Many real-world systems and applications such as World Wide Web, and social interactions can be modeled as networks of interacting nodes. However, in many cases, one encounters the situation where the pattern of the node-to-node interactions (i.e., edges) or the structure of a network is unknown. We address this issue by studying the Network Reconstruction Problem: Given a network with missing edges, how is it possible to uncover the network structure based on certain observable quantities extracted from partial measurements? We propose a novel framework called CS-NetRec based on a newly emerged paradigm in sparse signal recovery called Compressive Sensing (CS). The results demonstrate that... 

    Efficient stochastic algorithms for document clustering

    , Article Information Sciences ; Volume 220 , 2013 , Pages 269-291 ; 00200255 (ISSN) Forsati, R ; Mahdavi, M ; Shamsfard, M ; Meybodi, M. R ; Sharif University of Technology
    2013
    Abstract
    Clustering has become an increasingly important and highly complicated research area for targeting useful and relevant information in modern application domains such as the World Wide Web. Recent studies have shown that the most commonly used partitioning-based clustering algorithm, the K-means algorithm, is more suitable for large datasets. However, the K-means algorithm may generate a local optimal clustering. In this paper, we present novel document clustering algorithms based on the Harmony Search (HS) optimization method. By modeling clustering as an optimization problem, we first propose a pure HS based clustering algorithm that finds near-optimal clusters within a reasonable time.... 

    An introduction to the next generation of radiology in the web 2.0 world

    , Article IFMBE Proceedings, 30 April 2010 through 2 May 2010 ; Volume 32 IFMBE , April , 2010 , Pages 459-462 ; 16800737 (ISSN) ; 9783642149979 (ISBN) Moein, A ; Malekmohammadi, M ; Youssefi, K ; Sharif University of Technology
    2010
    Abstract
    "Web 2.0" refers to a second generation of web development and design, that facilitates communication, secure information sharing, interoperability, and collaboration on the World Wide Web. The truth is that Web 2.0 is a difficult term to define, even for web experts. Usually phrases like "the web as platform" and "architecture of participation" are used to describe this term. Examples of Web 2.0 include web-based communities, hosted services, web applications, social-networking sites, video-sharing sites, wikis, blogs, mashups and folksonomies. The Internet is changing medicine and Web 2.0 is the current buzz word in the World Wide Web dictionary. Radiology in the Web 2.0 probably refers to... 

    A survey of human interactive proof systems

    , Article International Journal of Innovative Computing, Information and Control ; Volume 6, Issue 3 , 2010 , Pages 855-874 ; 13494198 (ISSN) Shirali Shahreza, S ; Shirali Shahreza, M ; Sharif University of Technology
    2010
    Abstract
    Nowadays, a great amount of information is circulated through the Internet. Some of them exclusively belong to a special group of users and require protection and safeguarding against unauthorized access. To this end, a category of systems called HIP (Human Interactive Proof) are designed to distinguish between various groups of users. An important task on the Internet websites is registration. Some hackers write programs to make fake registration that waste the resources of the web sites or even stop them from providing services. Therefore, human users should be distinguished from computer programs. CAPTCHA (Completely Automatic Public Turing Test to Tell Computer and Human Apart) methods... 

    On the uniform sampling of the web: An improvement on bucket based sampling

    , Article 2009 International Conference on Communication Software and Networks, ICCSN 2009, Macau, 27 February 2009 through 28 February 2009 ; 2009 , Pages 205-209 ; 9780769535227 (ISBN) Heidari, S ; Mousavi, H ; Movaghar, A ; Sharif University of Technology
    2009
    Abstract
    Web is one of the biggest sources of information. The tremendous size, the dynamicity, and the structure of the Web have made the information retrieval process of the web a challenging issue. Web Search Engines (WSEs) have started to help users with this matter. However, these types of application, to perform more effectively, always need current information about many characteristics of the Web. To determine these characteristics, one way is to use statistical sampling of the Web pages. In this kind of approaches, instead of analyzing a large number of Web pages, a rather smaller and more uniform set of Web pages is used. This research attempts to analyze the presented methods for... 

    Trust inference in web-based social networks using resistive networks

    , Article Proceedings- 3rd International Conference on Internet and Web Applications and Services, ICIW 2008, Athens, 8 June 2008 through 13 June 2008 ; 2008 , Pages 233-238 ; 9780769531632 (ISBN) Taherian, M ; Amini, M ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    By the immense growth of the Web-Based Social Networks (WBSNs), the role of trust in connecting people together through WBSNs is getting more important than ever. In other words, since the probability of malicious behavior in WBSNs is increasing, it is necessary to evaluate the reliability of a person before trying to communicate with. Hence, it is desirable to find out how much a person should trust another one in a network. The approach to answer this question is usually called trust inference. In this paper, we propose a new trust inference algorithm (Called RN-Trust) based on the resistive networks concept. The algorithm, in addition to being simple, resolves some problems of previously... 

    Highlighting CAPTCHA

    , Article 2008 Conference on Human System Interaction, HSI 2008, Krakow, 25 May 2008 through 27 May 2008 ; 2008 , Pages 247-250 ; 1424415438 (ISBN); 9781424415434 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    There are many sites specially designed for mobile phones. In cases such as the registering in websites, some hackers write programs to make automatic false enrolments which waste the resources of the website. Therefore, it is necessary to distinguish between human users and computer programs. These systems are known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weak points of OCR (Optical Character Recognition) systems while using them difficult in tools such as PDAs (Personal Digital Assistant) or mobile phones that lack a big keyboard. So the Non-OCR-Based CAPTCHA methods are proposed which are do not need... 

    Web page clustering using harmony search optimization

    , Article IEEE Canadian Conference on Electrical and Computer Engineering, CCECE 2008, Niagara Falls, ON, 4 May 2008 through 7 May 2008 ; 2008 , Pages 1601-1604 ; 08407789 (ISSN) ; 9781424416431 (ISBN) Forsati, R ; Mahdavi, M ; Kangavari, M ; Safarkhani, B ; Sharif University of Technology
    2008
    Abstract
    Clustering has become an increasingly important task in modern application domains. Targeting useful and relevant information on the World Wide Web is a topical and highly complicated research area. Clustering techniques have been applied to categorize documents on web and extracting knowledge from the web. In this paper we propose novel clustering algorithms based on Harmony Search (HS) optimization method that deals with web document clustering. By modeling clustering as an optimization problem, first, we propose a pure HS based clustering algorithm that finds near global optimal clusters within a reasonable time. Then we hybridize K-means and harmony clustering to achieve better...