The International User Modeling Conferences are the events at which research foundations are being laid for the personalization of computer systems. In the last 15 years, the field of user modeling has produced significant new theories and methods to analyze and model computer users in short and long term interactions. A user model is an explicit representation of properties of individual users or user classes. It allows the system to adapt its performance to user needs and preferences. Methods for personalizing human computer interaction based on user models have been successfully developed and applied in a number of domains, such as information filtering, adaptive natural language and hypermedia presentation, tutoring systems, e commerce and medicine. There is also a growing recognition of the need to evaluate the results of new user modeling methods and prototypes in empirical studies and a growing focus on evaluation methods. New trends in HCI create new and interesting challenges for user modeling. While consolidating results in traditional domains of interest, the user modeling field now also addresses problems of personalized interaction in mobile and ubiquitous computing and adaptation to user attitudes and affective states. Finally, with the spread of user modeling in everyday applications and on the Web, new concerns about privacy preservation are emerging. All these topics are covered in the proceedings of UM 2003, the 9th International Conference on User Modeling.
Peter Brusilovsky & Albert Corbett
User Modeling 2003 [PDF ebook]
9th International Conference, UM 2003, Johnstown, PA, USA, June 22-26, 2003, Proceedings
User Modeling 2003 [PDF ebook]
9th International Conference, UM 2003, Johnstown, PA, USA, June 22-26, 2003, Proceedings
Mua cuốn sách điện tử này và nhận thêm 1 cuốn MIỄN PHÍ!
Ngôn ngữ Anh ● định dạng PDF ● ISBN 9783540449638 ● Biên tập viên Peter Brusilovsky & Albert Corbett ● Nhà xuất bản Springer Berlin Heidelberg ● Được phát hành 2003 ● Có thể tải xuống 3 lần ● Tiền tệ EUR ● TÔI 6318341 ● Sao chép bảo vệ Adobe DRM
Yêu cầu trình đọc ebook có khả năng DRM