2007
DOI: 10.1109/mis.2007.43
|View full text |Cite
|
Sign up to set email alerts
|

Acquiring and Revising Preferences in a Critique-Based Mobile Recommender System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
111
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 156 publications
(111 citation statements)
references
References 4 publications
0
111
0
Order By: Relevance
“…Roberts et al (2008) describe the implementation of a mobile recommender system for leisure activities, named Magitti, which was built for commercial deployment under stringent scalability requirements. Ricci & Nguyen (2007) exploit the recommendation by proposal and critiquing techniques in the MobyRek system, that has been designed to run on a mobile phone with limited user input. It searches functionality, lets the user to formulate both must and wish conditions, and returns a ranked product list.…”
Section: Mobile Recommender Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Roberts et al (2008) describe the implementation of a mobile recommender system for leisure activities, named Magitti, which was built for commercial deployment under stringent scalability requirements. Ricci & Nguyen (2007) exploit the recommendation by proposal and critiquing techniques in the MobyRek system, that has been designed to run on a mobile phone with limited user input. It searches functionality, lets the user to formulate both must and wish conditions, and returns a ranked product list.…”
Section: Mobile Recommender Systemsmentioning
confidence: 99%
“…Therefore, the mechanisms using this approach are able to effectively deal with traditional security systems limitations that are designed for static environments. Nevertheless, most of the research regarding the development of context-aware authentication systems is limited or vague (Ricci & Nguyen, 2007). Usually, these systems only consider traditional aspects, e.g.…”
Section: Pervasive Security and Recommender Systemsmentioning
confidence: 99%
“…The usage context is usually characterized by the hour of the day, the day of the week and the location of the user, whereas the user's preferences are typically expressed with versatile profiles. In a more elaborative way, the user preferences can be further categorized into session-specific and long-term preferences [7].…”
Section: Introductionmentioning
confidence: 99%
“…[1] [7]) already exist that guide users to restaurants and bars according to the criteria such as the menu and the type of the restaurant or bar, the average price level, the distance from the user's current location, and the accepted methods of payment. However, especially as for the bars and nightclubs, the recommendations could also be given based on the match between the user's personal music preferences [8] and the music style of the entertainment premises.…”
Section: Introductionmentioning
confidence: 99%
“…In a previous paper [15], we presented our critique-based recommendation approach and its implementation in MobyRek, a mobile case-based RS that helps mobile users find their desired travel products (restaurants). In that paper, we also presented a live-user evaluation of MobyRek, and the experimental results showed that our recommendation methodology is effective in supporting mobile users in making product selection decisions.…”
Section: Introductionmentioning
confidence: 99%