2012
DOI: 10.1002/dac.2331
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent route generation: discovery and search of correlation between shared resources

Abstract: Sharing information and resources on the Internet has become an important activity for education. The use of ubiquitous devices makes it possible for learning participants to be engaged in an open and connected social environment, and also allows the learning activities to be performed at any time and any place. In this study, the discovery of correlation among shared resources is concentrated. A hypothetical scenario is considered that the information, such as photos and thoughts, is applicable to be shared w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
11
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 32 publications
0
11
0
Order By: Relevance
“…The location is estimated based on the knowledge of device IP address. Such IP-based location is used for a great number of location-aware services and applications, including web content and social network personalization [1]; user behaviour analysis [2] (including visitor maps for websites); load balancing by redirecting users to geographically close data/resource replicas [3]; geographical-based data collection from a large number of users [4]; spam filtering by sender location; detection of ID and password sharing; detection of credit card online fraud [5]; and law enforcement on media distribution by delivery restrictions.…”
Section: Introductionmentioning
confidence: 99%
“…The location is estimated based on the knowledge of device IP address. Such IP-based location is used for a great number of location-aware services and applications, including web content and social network personalization [1]; user behaviour analysis [2] (including visitor maps for websites); load balancing by redirecting users to geographically close data/resource replicas [3]; geographical-based data collection from a large number of users [4]; spam filtering by sender location; detection of ID and password sharing; detection of credit card online fraud [5]; and law enforcement on media distribution by delivery restrictions.…”
Section: Introductionmentioning
confidence: 99%
“…With the rapid development of information technology, human kinds are more likely to read and share information by similar intelligent applications. For example, the distributed and collaborative learning [7], semantic representation of scientific documents for supporting elearning [8], discovering and searching of correlation between shared resources [9], and smart component technologies for human centric computing [10],etc.…”
Section: Introductionmentioning
confidence: 99%
“…The other is 'the internal nodes interconnect closely; nodes between the communities interconnect sparsely' [2]. However, there is a common problem in these algorithm is that they cannot assure the precision and speed simultaneously, the community detection algorithm which has a low precision does not help us analyze the community structure much, yet some algorithms with high precision may not apply to such large scale of datasets [11,23,24]. Community detection algorithm, as the method that can reveal the network community structure precisely, has been researched extensively and deeply in the past decades.…”
Section: Introductionmentioning
confidence: 99%