MultiA-Pro 2011 - The Second International Workshop on User Profiles in Multi-application Environments
On 22/08/2011 at 09:00 to 17:45. Lyon
Informations contact : Elöd EGYED-ZSIGOMOND. email@example.com. 04 72 43 62 97.
The workshop is part of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence
Conference website: http://www.wi-iat-2011.org/
Topics of interest include, but are not limited to
- Multi-application user modeling
- User modeling in social networks
- User modeling in ubiquitous computing
- User modeling and e-learning
- User modeling, privacy and anonymity
- User modeling and security
- User profile representation
- User profile evolution
- User profile data collection
- User profile management and personalization
- Web identity management
- Web identity and security
- Personalized searching and personalized sharing among communities
- Personalized storage and information retrieval with user-context
- Context-aware profile in distributed environments
- Users' reliability and trust in open communities
Workshop paper submissions: April 22, 2011
Notification of Workshop paper acceptance: June 1, 2011
Workshop general chair:
- Shlomo Berkovsky, Senior Research Scientist, CSIRO, TasICT Centre
Hobart, Tasmania, Australia
- Nadia Bennani, Université de Lyon, INSA, LIRIS
- Elöd Egyed-Zsigmond, Université de Lyon, INSA, LIRIS
- Marco Viviani, Université de Lyon, INSA, LIRIS
Technical program committee:
- Fabian Abel, TU Delft, the Netherlands
- Mohand Boughanem, IRIT Toulouse, France
- Sylvie Calabretto, LIRIS, Lyon, France
- Max Chevalier, IRIT Toulouse, France
- Ernesto Damiani, Universita Di Milano, Milano, Italy
- Dick Hardt, USA
- Dominicus Heckmann, Saarland University, Germany
- Stéphanie Jean-Daubias, LIRIS, Lyon, France
- Jérome Gensel, LIG, Grenoble, France
- Philippe Lopisteguy, IUT Bayonne, France
- Salma Noor, University of Southampton, UK
- Henning Olesen, Aalborg University Copenhagen, Denmark
- Aris M. Ouksel, The University of Illinois, USA
- Béatrice Rumpler, LIRIS, Lyon, France
- Carsten Rust, Morpho, Germany
- Johann Stan, Alcatel-Lucent Bell Labs, France
- Henry Story, Sun Microsystems, France
- Lynda Tamine, IRIT Toulouse, France
- Gottfried Zimmermann, University of Tübingen, Germany
Nowadays, many different applications in different areas (e-learning, digital libraries, search engines, online databases, e-commerce, social networks, ubiquitous computing, ...) are concentrating on collecting information about users for service personalization.
Because any specific network representation (in a specific application) uses different network models and different user modeling, aim of this workshop is to organize a common discussion among different scientific and industrial communities on evolving and secure multi-application personalization.
A first problem to address in this kind of scenario is to define accurately what the profile content is and how to represent users' properties and behaviors. Even for mono-application profiles there are several definitions and structure models, content categories and profile creation and enrichment methods. Are these techniques still valid in a multi-application context?
The profile management has to be user-centric. The user has to be an active actor and needs to be aware and to be able to control the stored information and its evolution. How to find and group similar profiles to enrich them mutually? Are similar profiles part of the same social community? How the profile modifications caused by an application affect the profile for another application? How to make the profile context-sensitive?
The user-centric character of the profile management means also that the actions of the user could affect the profile in an automatic manner. User tasks and action history model has to be taken into account in profile management.
Another difficulty with multi-application profiles is the security management due to profile data and structure sharing among different applications. Users must have the possibility to manage the confidentiality of their data in a direct and practical fashion. A credible solution must come with data security management taking into account user needs and application requirements. Which profile content can be shared, modified and used by several applications? What is useful, what is necessary and what is forbidden to be shared? How to guarantee users anonymity and privacy? How to prevent identity disclosure when profile content is shared among applications? Which trust and reputation techniques could be taken into account?