Academic literature on the topic 'Federated user ID management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Federated user ID management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Federated user ID management"

1

Mikhalevskyi, V., and G. Mikhalevska. "TESTING AND FORMATION OF A REPORT ON THE IMPLEMENTATION OF HYBRID INFRASTRUCTURE." Herald of Khmelnytskyi National University. Technical sciences 289, no. 5 (2020): 95–100. https://doi.org/10.31891/2307-5732-2020-289-5-95-100.

Full text
Abstract:
The article considers and investigates the projected results of the hybrid infrastructure formation. Before starting the data transfer, you need to make sure that the infrastructure works properly after the previous settings. To do this, you must perform the series of tests that will detect any failures in different areas. Priority tests are performed globally to verify that the federated trust between the on-premises Exchange Server organization and the Exchange Online cloud service is properly established. As a result of the research, it was found that some objects in the cloud part, when they need to be accessed, have a different system of identifiers than similar objects in the local system. In the local infrastructure they are referred to by the name, while in the cloud infrastructure by the ID. Therefore, in this case, you need to make an additional query that will find the ID-object by its name. When writing a number of codes for data migration, it is proposed to use different approaches to the management of objects in the ground and cloud parts, which prevents the use of the same methods for systems of the same type. Microsoft Exchange exports the data collected during the infrastructure analysis, as well as the data of system users, to files on external media in the form of CSV files to be used by other modules and in the form of TXT or HTML for a spreadsheet that is analyzed by staff. During the transferring data to cloud storage, most companies pay special attention to how security policies will be applied to cloud resources. The main task of this testing stage is to establish that all security parameters exported from the local infrastructure has been imported into the cloud infrastructure successfully and applied at different levels stably. The most important series include tests: related to testing traffic rules and information leakage protection policies; designed to test security policies; tests of policies that affect the client connection. This type of system allows many large companies to avoid the problems associated with the process of migrating global local infrastructure settings to the cloud environment and to improve the data analysis process with subsequent automatic management of data migration in an IT environment with complex network infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
2

Karasawa, Mizuki, John Hover, and Shigeki Misawa. "Federated User Account Management." EPJ Web of Conferences 245 (2020): 07058. http://dx.doi.org/10.1051/epjconf/202024507058.

Full text
Abstract:
BNL SDCC (Scientific Data and Computing Center) recently deployed a centralized identity management solution to support Single Sign On (SSO) authentication across multiple IT systems. The system supports federated login access via CILogon and InCommon and multi-factor authentication (MFA) to meet security standards for various application and services such as Jupyterhub / Invenio that are provided to the SDCC user community. CoManage (cloud-based) and FreeIPA / Keycloak (local) are utilized to provided complex authorization for authenticated users. This talk will focus on technical overviews and strategies to tackle the challenges/obstacles in our facility.
APA, Harvard, Vancouver, ISO, and other styles
3

Goodrich, Michael T., Roberto Tamassia, and Danfeng (Daphne) Yao. "Notarized federated ID management and authentication*." Journal of Computer Security 16, no. 4 (2008): 399–418. http://dx.doi.org/10.3233/jcs-2008-0324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Keunok, Jihyeon Ryu, Hakjun Lee, Youngsook Lee, and Dongho Won. "Distributed and Federated Authentication Schemes Based on Updatable Smart Contracts." Electronics 12, no. 5 (2023): 1217. http://dx.doi.org/10.3390/electronics12051217.

Full text
Abstract:
Federated authentication, such as Google ID, enables users to conveniently access multiple websites using a single login credential. Despite this convenience, securing federated authentication services requires addressing a single point of failure, which can result from using a centralized authentication server. In addition, because the same login credentials are used, anonymity and protection against user impersonation attacks must be ensured. Recently, researchers introduced distributed authentication schemes based on blockchains and smart contracts (SCs) for systems that require high availability and reliability. Data on a blockchain are immutable, and deployed SCs cannot be changed or tampered with. Nonetheless, updates may be necessary to fix programming bugs or modify business logic. Recently, methods for updating SCs to address these issues have been investigated. Therefore, this study proposes a distributed and federated authentication scheme that uses SCs to overcome a single point of failure. Additionally, an updatable SC is designed to fix programming bugs, add to the function of an SC, or modify business logic. ProVerif, which is a widely known cryptographic protocol verification tool, confirms that the proposed scheme can provide protection against various security threats, such as single point of failure, user impersonation attacks, and user anonymity, which is vital in federated authentication services. In addition, the proposed scheme exhibits a performance improvement of 71% compared with other related schemes.
APA, Harvard, Vancouver, ISO, and other styles
5

Venkatraman, Sitalakshmi, and Sazia Parvin. "Developing an IoT Identity Management System Using Blockchain." Systems 10, no. 2 (2022): 39. http://dx.doi.org/10.3390/systems10020039.

Full text
Abstract:
Identity (ID) management systems have evolved based on traditional data modelling and authentication protocols that are facing security, privacy, and trust challenges with the growth of Internet of Things (IoT). Research surveys reveal that blockchain technology offers special features of self-sovereign identity and cryptography that can be leveraged to address the issues of security breach and privacy leaks prevalent in existing ID management systems. Although research studies are recently exploring the suitability of blockchain based support to existing infrastructure, there is a lack of focus on IoT ecosystem in the secured ID management with data provenance of digital assets in businesses. In this paper, we propose a blockchain based ID management system for computing assets in an IoT ecosystem comprising of devices, software, users, and data operations. We design and develop a proof-of-concept prototype using a federated and distributed blockchain platform with smart contracts to support highly trusted data storage and secure authentication of IoT resources and operations within a business case scenario.
APA, Harvard, Vancouver, ISO, and other styles
6

Bhandari, Gayatri M. "FEDNET - A Federated Learning Platform." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem45583.

Full text
Abstract:
Abstract Federated Learning (FL) is a decentralized approach to training machine learning models along with pre- serving data privacy. This paper introduces FedNet, a secure and efficient FL platform designed for model training across distributed clients. FedNet enhances the traditional FL framework by integrating Fernet encryption for secure communication, HTTP and Socket.IO-based real-time client-server interaction, and a JavaFX-powered user interface for ease of deployment. The platform supports multiple FL aggregation techniques, including FedAvg, FedProx, FedNova, and Zona, providing optimized global model updates. FedNet allows machine learning clients to upload, encrypt, and distribute their models securely while allowing clients to train them on local data without the risk of exposing sensitive information. The system provides authentication through model and client ID verification, encrypts model weights before transmission, and aggregates securely the received weights to improve performance. Experimental analysis demonstrates FedNet’s efficiency, scalability, and security in FL-based model training. The proposed platform bridges the gap between privacy-preserving machine learning and real-world deployment, making it suitable for applications in healthcare, finance, and other data-sensitive industries. Keywords: federated learning, machine learning, data privacy, artificial intelligence, data security
APA, Harvard, Vancouver, ISO, and other styles
7

Yusubov, Farkhod, and KangYoon Lee. "A Platform of Federated Learning Management for Enhanced Mobile Collaboration." Electronics 13, no. 20 (2024): 4104. http://dx.doi.org/10.3390/electronics13204104.

Full text
Abstract:
Federated learning (FL) has emerged as a crucial technology in today’s data-centric environment, enabling decentralized machine learning while safeguarding user privacy. This study introduces “Federated Learning ML Operations (FedOps) Mobile”, a novel FL framework optimized for the dynamic and heterogeneous ecosystem of mobile devices. FedOps Mobile addresses the inherent challenges of FL—such as system scalability, device heterogeneity, and operational efficiency—through advanced on-device training using TensorFlow Lite and CoreML. The framework’s innovative approach includes sophisticated client selection mechanisms that assess device readiness and capabilities, ensuring equitable and efficient participation across the network. Additionally, FedOps Mobile leverages remote device control for seamless task management and continuous learning, all without compromising the user experience. The main contribution of this study is the demonstration that federated learning across heterogeneous devices, especially those using different operating systems, can be both practical and efficient using the FedOps Mobile framework. This was validated through experiments that evaluated three key areas: operational efficiency, model personalization, and resource optimization in multi-device settings. The results showed that the proposed method excels in client selection, energy consumption, and model optimization, establishing a new benchmark for federated learning in diverse and complex environments.
APA, Harvard, Vancouver, ISO, and other styles
8

Stergiou, Christos L., Konstantinos E. Psannis, and Brij B. Gupta. "InFeMo: Flexible Big Data Management Through a Federated Cloud System." ACM Transactions on Internet Technology 22, no. 2 (2022): 1–22. http://dx.doi.org/10.1145/3426972.

Full text
Abstract:
This paper introduces and describes a novel architecture scenario based on Cloud Computing and counts on the innovative model of Federated Learning. The proposed model is named Integrated Federated Model , with the acronym InFeMo . InFeMo incorporates all the existing Cloud models with a federated learning scenario, as well as other related technologies that may have integrated use with each other, offering a novel integrated scenario. In addition to this, the proposed model is motivated to deliver a more energy efficient system architecture and environment for the users, which aims to the scope of data management. Also, by applying the InFeMo the user would have less waiting time in every procedure queue. The proposed system was built on the resources made available by Cloud Service Providers (CSPs) and by using the PaaS (Platform as a Service) model, in order to be able to handle user requests better and faster. This research tries to fill a scientific gap in the field of federated Cloud systems. Thus, taking advantage of the existing scenarios of FedAvg and CO-OP, we were keen to end up with a new federated scenario that merges these two algorithms, and aiming for a more efficient model that is able to select, depending on the occasion, if it “trains” the model locally in client or globally in server.
APA, Harvard, Vancouver, ISO, and other styles
9

Dr. C. Prema, Dr. G. Jemilda, Mrs.K. Emily Esther Rani, Santhanamari Abi M, Isabel S, and , Jemima Hannah P. "Loan Shield AI Intelligent ID Verification for Efficient Loan Waivers." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 05 (2025): 2682–87. https://doi.org/10.47392/irjaeh.2025.0398.

Full text
Abstract:
Identity authentication is a critical component in the processing of government loan waivers. Manual authentication tends to cause errors and forgery, thus delaying the approval of the loans. To address this, a smart system named Loan Shield AI has been created. It utilizes deep learning, OCR, and federated learning to authenticate documents such as Aadhaar and Smart Cards and auto-extract crucial details. A voice assistant is also provided to assist users by assisting them and completing loan forms from the extracted data. The system is containerized in an application for seamless deployment and tested for document verification, face matching, and fraud detection. Automation and voice support make the loan application quick, precise, and user-friendly. The system also accommodates various document types and various languages to enhance usability and dependability.
APA, Harvard, Vancouver, ISO, and other styles
10

L'Amrani, Hasnae, Younès El Bouzekri El Idrissi, and Rachida Ajhoun. "Technical Interoperability to Solve Cross-Domain Issues Among Federation Systems." International Journal of Smart Security Technologies 7, no. 1 (2020): 21–40. http://dx.doi.org/10.4018/ijsst.2020010102.

Full text
Abstract:
Digital identity management with the metamorphosis of web services enforces new security challenges. A set of identity management systems exists to deal with these identities, alongside the goal of improving user experience and gain secure access. Nowadays, one faces a large number of heterogeneous identity management approaches. This study treated several identity management systems. The federated system makes proof of it eligibility for the identity management. Thus, the researcher interest is on the federated model. Since it consists of the distribution of digital identity between different security domains. The base of security domains is a trust agreement between the entities in communication. Federated identity management faces the problem of interoperability between heterogeneous federated systems. This study is an approach of a technical interoperability between the federations. The authors propose an approach that will permit inter-operation and exchange identity information among heterogeneous federations.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Federated user ID management"

1

Feske, Norman, and Christian Helmuth. "Overlay Window Management: User interaction with multiple security domains." Technische Universität Dresden, 2004. https://tud.qucosa.de/id/qucosa%3A26247.

Full text
Abstract:
Graphical user interfaces for high-assurance systems must fulfill a range of security requirements such as protected and reliable presentation, prevention of unauthorized cross-domain talk, and prevention of user-input eavesdropping. Additionally, it is desirable to support legacy applications running in confined compartments. Standard isolation methods such as virtual-machine monitors provide one frame buffer per security domain, where each frame buffer is managed by one legacy window system. This raises the question of how to safely integrate multiple (legacy) window systems and protect the displayed data while preserving the usability of modern user interfaces. Our paper describes the OverlayWindow System, a general mechanism for multiplexing windows of multiple distinct window systems into the host frame buffer. Thus, each legacy window appears to the user as one corresponding host window that can be moved and resized. To achieve this, only slight modifications of the legacy window system are required whereby, the source code does not have to be available. Our implementation of an Overlay Window System successfully multiplexes Linux, GEM and native L4 applications.
APA, Harvard, Vancouver, ISO, and other styles
2

Khilji, Nasrullah. "Innovative communication, effective coordination and knowledge management in UK local authority planning departments." Thesis, University of West London, 2015. https://repository.uwl.ac.uk/id/eprint/2949/.

Full text
Abstract:
This thesis sets out to examine the scope for integrated knowledge based planning systems. Five planning departments in the South East Midlands of the UK have been investigated through environmental appraisal, conceptual modelling and empirical evidence gathering. The results of analyses suggest a number of configurations, which could provide reformation instruments in the context of technological innovation, social coordination and knowledge management for sustainable development. This research study provided the insights and learning into how to successfully develop and implement an integrated knowledge based planning system. The primary aspiration of this research was to develop a robust pragmatic framework to support an efficient and effective delivery of the planning system in the UK local government towards sustainable development. A mixed research methodology was employed for the research fieldwork. Firstly, an extensive review of literature took place to summarise and synthesise the arguments of the key research propositions contributing to the development of an integrated knowledge based planning system. Secondly, exploratory fieldwork took place as an appropriate methodology in this study, applying the semi-structured interview and questionnaire techniques to gather data from senior level planning officials who were directly involved in the planning system transformation. This study was initiated by examining the previous planning environment in the UK local government and its transformation from its conventional state to a contemporary emergent state. The fieldwork was carried out to identify the key supportive and preventive knowledge factors for both explicit and tacit knowledge domains. As a result, the nature of successful technology based initiatives was determined and solutions to the possible emerging challenges were appraised.
APA, Harvard, Vancouver, ISO, and other styles
3

Reeves, Leah. "OPTIMIZING THE DESIGN OF MULTIMODAL USER INTERFACES." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4130.

Full text
Abstract:
Due to a current lack of principle-driven multimodal user interface design guidelines, designers may encounter difficulties when choosing the most appropriate display modality for given users or specific tasks (e.g., verbal versus spatial tasks). The development of multimodal display guidelines from both a user and task domain perspective is thus critical to the achievement of successful human-system interaction. Specifically, there is a need to determine how to design task information presentation (e.g., via which modalities) to capitalize on an individual operator's information processing capabilities and the inherent efficiencies associated with redundant sensory information, thereby alleviating information overload. The present effort addresses this issue by proposing a theoretical framework (Architecture for Multi-Modal Optimization, AMMO) from which multimodal display design guidelines and adaptive automation strategies may be derived. The foundation of the proposed framework is based on extending, at a functional working memory (WM) level, existing information processing theories and models with the latest findings in cognitive psychology, neuroscience, and other allied sciences. The utility of AMMO lies in its ability to provide designers with strategies for directing system design, as well as dynamic adaptation strategies (i.e., multimodal mitigation strategies) in support of real-time operations. In an effort to validate specific components of AMMO, a subset of AMMO-derived multimodal design guidelines was evaluated with a simulated weapons control system multitasking environment. The results of this study demonstrated significant performance improvements in user response time and accuracy when multimodal display cues were used (i.e., auditory and tactile, individually and in combination) to augment the visual display of information, thereby distributing human information processing resources across multiple sensory and WM resources. These results provide initial empirical support for validation of the overall AMMO model and a sub-set of the principle-driven multimodal design guidelines derived from it. The empirically-validated multimodal design guidelines may be applicable to a wide range of information-intensive computer-based multitasking environments.<br>Ph.D.<br>Department of Industrial Engineering and Management Systems<br>Engineering and Computer Science<br>Industrial Engineering PhD
APA, Harvard, Vancouver, ISO, and other styles
4

Lorenz, Anja. "Rückführung von User Generated Content in Lernmaterialien: Ein Klassifikationsschema zur Bewertung des Lernkontextes." Gesellschaft für Information (GI), 2011. https://monarch.qucosa.de/id/qucosa%3A19635.

Full text
Abstract:
Lerncontentmodelle beschreiben den modularen Aufbau von Lernmaterialien auf verschiedenen Komplexitätsebenen von Assets bis hin zu fertigen Kursmaterialien. In Autorenwerkzeugen wird diese Untergliederung oft unterstützt, bspw. durch Mediendatenbanken, modularisierte Inhaltsstrukturen oder pädagogische Metadaten zum unterstützten Lernszenario. User Generated Content in Social-Software-Anwendungen entsteht nicht auf diesem strukturierten Weg, sondern spontan und abhängig von den bereitgestellten Funktionen. Der Beitrag zeigt, dass sie sich aber weiterhin bezüglich ihrer Abhängigkeit vom Lernkontext klassifizieren lassen. Als Abstufungen ergeben sich Assets, Informations- und Lernobjekte, zielgruppenbasierte Zusammenstellungen und Kursunterlagen. Damit soll einerseits eine taxonomische Grundlage geschaffen werden, um User Generated Content als Lernmaterialien einzuordnen, es ist aber vornehmlich ein erster Schritt hin zur deren systematischer Re-Integration in institutionelle Lernmaterialien.
APA, Harvard, Vancouver, ISO, and other styles
5

Mozuni, Mehdi, Maren Ohlhoff, and Gerhard Glatzel. "User Research im Zukunftsorientiertem Design-Thinking: Eine Ganzheitliche Methode für das Stakeholder-Management in der Service-Optimierung." Thelem Universitätsverlag & Buchhandlung GmbH & Co. KG, 2021. https://tud.qucosa.de/id/qucosa%3A75862.

Full text
Abstract:
User Research ist eine wichtige und in vielen Ansätzen die erste Phase eines iterativen Designprozesses. Aber wie kann eine valide User Research für eine in die weite Zukunft gerichtete Produktgestaltung durchgeführt werden? User Research erfordert die Einbindung zukünftiger NutzerInnen oder potentieller KundInnen. Diese können aber überwiegend keine plausible Auskunft über die eigenen Bedürfnisse der (fernen) Zukunft geben. Auch können sie ausgehend vom individuellen Ist-Zustand nicht zwischen realisierbaren und utopischen Produktkonzepten unterscheiden. In diesem Beitrag diskutieren wir die Herausforderungen von User Research speziell für mittel- und langfristige Zielsetzungen und stellen einen Lösungsansatz vor: Wir empfehlen daher den Designprozess mit einem Szenarioverfahren zu initiieren, welcher eine Trendanalyse und eine Expertenbefragung beinhaltet. Aufbauend auf den Ergebnissen aus der Szenarioarbeit werden die NutzerInnen in einer späteren Phase des Designprozesses zur Evaluierung von Nutzungsszenarien eingebunden. Anhand von zwei aktuellen transdisziplinären Projekten „Elektrifizierung von landwirtschaftlichen Betrieben“ und „Sustainable Energy-Efficient Aviation“, in denen der angenommene Status zukünftiger sozialer, wirtschaftlicher und politischer Trends die Perspektive und das Konsumverhalten fiktiver NutzerInnen kontinuierlich prägen wird, zeigen wir, wie wir Nutzerforschung in strategischen Designprozessen mit hoher Vorhersagegüte einsetzen.
APA, Harvard, Vancouver, ISO, and other styles
6

Costello, Anthony. "Facilitating Information Retrieval in Social Media User Interfaces." Doctoral diss., University of Central Florida, 2014. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/6257.

Full text
Abstract:
As the amount of computer mediated information (e.g., emails, documents, multi-media) we need to process grows, our need to rapidly sort, organize and store electronic information likewise increases. In order to store information effectively, we must find ways to sort through it and organize it in a manner that facilitates efficient retrieval. The instantaneous and emergent nature of communications across networks like Twitter makes them suitable for discussing events (e.g., natural disasters) that are amorphous and prone to rapid changes. It can be difficult for an individual human to filter through and organize the large amounts of information that can pass through these types of social networks when events are unfolding rapidly. A common feature of social networks is the images (e.g., human faces, inanimate objects) that are often used by those who send messages across these networks. Humans have a particularly strong ability to recognize and differentiate between human Faces. This effect may also extend to recalling information associated with each human Face. This study investigated the difference between human Face images, non-human Face images and alphanumeric labels as retrieval cues under different levels of Task Load. Participants were required to recall key pieces of event information as they emerged from a Twitter-style message feed during a simulated natural disaster. A counter-balanced within-subjects design was used for this experiment. Participants were exposed to low, medium and high Task Load while responding to five different types of recall cues: (1) Nickname, (2) Non-Face, (3) Non-Face & Nickname, (4) Face and (5) Face & Nickname. The task required participants to organize information regarding emergencies (e.g., car accidents) from a Twitter-style message feed. The messages reported various events such as fires occurring around a fictional city. Each message was associated with a different recall cue type, depending on the experimental condition. Following the task, participants were asked to recall the information associated with one of the cues they worked with during the task. Results indicate that under medium and high Task Load, both Non-Face and Face retrieval cues increased recall performance over Nickname alone with Non-Faces resulting in the highest mean recall scores. When comparing medium to high Task Load: Face & Nickname and Non-Face significantly outperformed the Face condition. The performance in Non-Face & Nickname was significantly better than Face & Nickname. No significant difference was found between Non-Faces and Non-Faces & Nickname. Subjective Task Load scores indicate that participants experienced lower mental workload when using Non-Face cues than using Nickname or Face cues. Generally, these results indicate that under medium and high Task Load levels, images outperformed alphanumeric nicknames, Non-Face images outperformed Face images, and combining alphanumeric nicknames with images may have offered a significant performance advantage only when the image is that of a Face. Both theoretical and practical design implications are provided from these findings.<br>Ph.D.<br>Doctorate<br>Industrial Engineering and Management Systems<br>Engineering and Computer Science<br>Industrial Engineering
APA, Harvard, Vancouver, ISO, and other styles
7

Tita, David Ndoh. "Collaborative Public Management: Exploring public-social enterprise partnerships in conceptualising innovative models of user involvement in the co-design and co-delivery of public services." Thesis, Anglia Ruskin University, 2013. https://arro.anglia.ac.uk/id/eprint/312144/1/David%20Ndoh%20Thesis.pdf.

Full text
Abstract:
This study explores partnership working as a mechanism for effective public service delivery. It investigates into how Public-Social Enterprise Partnerships (P-SEPs) can utilise innovative models of user involvement and Service Innovation (SI) in the co-design and co-delivery of user-led socially-oriented services to young adults (18-24) in East England. It identifies the inability of P-SEPs to conceptually explore innovative models of user involvement and SI when engaging young-adult end users in the co-design and co-delivery of user-led solutions to `wicked` issues like `rough sleeping` as a gap in knowledge which I will explore three interrelated research questions in filling. This study draws conceptual inspiration from the network theory, the Pragmatic research paradigm and the inductive-deductive research strategy in exploring the Concurrent Mixed Method underpinned by Likert-scale questionnaires and semi-structure interviews as my data gathering instruments. The emergent conceptual framework from my data analyses posits that high users` perception of their involvement in the co-design and co-delivery of user-led public services can engineer satisfaction, transformational outcomes and high service quality. A fieldtrip provided the conceptual opportunity for me to explore three multiple-case studies in gathering qualitative data through semi-structured interviews administered to staff as these were coded, thematised and analysed using NVivo. Quantitative data from questionnaires administered to end users were analysed using Excel. Evidence gleaned from both strands was integrated and triangulated in complementing and enhancing my research findings. This study challenges misconceptions and dominant ideologies which underpin user involvement while making three interconnected contributions to knowledge. First, it extends the frontiers of knowledge in the discipline by creating new insights and articulating four innovative models of user involvement. Second, at the practical level, it contributes to the ongoing debate on conceptualising, modernising and delivering more effective userengineered public services by informing professional practice and policymaking. And third, at the theoretical level, it contributes towards the development of a theory on user involvement. It thus underlines the factual conclusion that high users` perception of their involvement in the co-design and co-delivery of user-led outcomes can engineer high user satisfaction, high service quality and transformational outcomes. It successfully re-positions the debates on user involvement on new conceptual and empirical grounds.
APA, Harvard, Vancouver, ISO, and other styles
8

Krzywinski, Jens, Mario Linke, and Christian Wölfel. "Entwerfen Entwickeln Erleben 2016 - Beiträge zum Industrial Design: Dresden, 31. Juni – 1. Juli 2016." TUDpress - Verlag der Wissenschaften GmbH, 2016. https://tud.qucosa.de/id/qucosa%3A29548.

Full text
Abstract:
Die Konferenz »Entwerfen – Entwickeln – Erleben« bietet ein besonderes Podium zum Austausch von Wissenschaft und Praxis entlang des Produktentwicklungsprozess mit einem Schwerpunkt Industrial Design. Der vorliegende Band enthält Beiträge der Sessions zum Industrial Design sowie ausgewählte Posterveröffentlichungen der Konferenz 2016. Darin werden Themen und Ansätze von der Anwenderintegration, neuen Prototypen, Service Design, User Experience und der Gestaltung von Emotion über Design in der Digitalen Revolution und für eine nachhaltige Zukunft, Design in mobilen und für Sicherheitsanwendungen bis hin zu Designmanagement, Feasibilitydesign und Reengineering vorgestellt und diskutiert. Die Technische Universität Dresden und technischesdesign.org ermöglichten in Kooperation mit der Gruppe Virtuelle Produktentwicklung der Wissenschaftlichen Gesellschaft für Produktentwicklung (WiGeP) und dem Rat für Formgebung die fachübergreifende Diskussion des Schwerpunkt-Themas inmitten der interdisziplinären Dresdner Wissenschaftslandschaft. Ein zweiter Band »Entwerfen Entwickeln Erleben 2016« (ISBN 978-3-95908-062-0, herausgegeben von Ralph Stelzer) fasst die Beiträge zur Konstruktionstechnik und zur Virtuellen Produktentwicklung zusammen.:Hybride Prototypen im Design Sebastian Lorenz · Maria Klemm · Jens Krzywinski 11 Anwenderintegration in strategische Designprozesse von Industriegütern Frank Thomas Gärtner 23 Die Relevanz semiotischer Dimensionen als „System der möglichen Fehler“ für die Usability Klaus Schwarzfischer 37 Service Design = Kognitives Design – Über die Gestaltung von Berührungspunkten und Perzeption in analogen und digitalen Benutzungskontexten Oliver Gerstheimer 51 Design und User Experience in der Flugsicherung – Assistenzsystem zur Fernüberwachung im Multi-Airport-Betrieb Rodney Leitner · Astrid Oehme 63 Die Gestaltung in Zeiten der Digitalen Revolution Gerhard Glatzel 79 Designing a Sustainable Future with Mental Models Anke Bernotat · Jürgen Bertling · Christiane English · Judith Schanz 91 Design in globalen Industrien – Ein Blick hinter die Kulissen von Dräger Herbert Glass · Matthias Willner 105 Untersuchung von emotionalen Wirkungsmechanismen im Produktdesign Mareike Roth · Oliver Saiz 115 Strak als Schnittstelle zwischen Design und Konstruktion – Ergebnisse einer Prozessberatung bei Miele Norbert Hentsch · Matthias Knoke 127 Feasibility Design – „Designqualität in Serie bringen“ Knut Lender 139 Experimenteller Ansatz zu Effekten subjektiven Erlebens in VR-basierter Risikobeurteilung Patrick Puschmann · Tina Horlitz · Volker Wittstock · Astrid Schütz 153 Simulation komplexer Arbeitsabläufe im Bereich der digitalen Fabrik Thomas Kronfeld · Guido Brunnett 169 Vom Wert der designerischen Perspektive des Erlebens beim Re-Engineering von Produkten: ein Best-Practice-Project Philip Zerweck 183 Vorgehensweisen zum Einsatz universitärer Produktentwicklung als Innovationstreiber Bernd Neutschel · Martin Wiesner · Michael Schabacker · Sandor Vajna 197 Considering emotional impressions in product design: Taking on the challenges ahead Susan Gretchen Kett · Sandro Wartzack 215 Methode zur Verbesserung der Usability durch gezielte Förderung mentaler Modelle Marcus Jenke · Karoline Binder · Thomas Maier 233
APA, Harvard, Vancouver, ISO, and other styles
9

Rocha, Maria Alice Vasconcelos. "Study of consumer clothing behaviour and its relevance to the successful fashion product development." Thesis, University of Kent, 2007. http://www.research.ucreative.ac.uk/id/eprint/1055.

Full text
Abstract:
Previous research highlighted consumer dissatisfaction with fashion clothing products on offer. There is a lack of information about real consumers needs due to the industry standards of beauty and behaviour as well as a constant rush for innovation that feeds fashion cycles. This research identifies the elements that will enable fashion clothing companies to become more inclusive, and aims to find a methodological relationship between the stakeholders in the fashion industry: consumers, designers and companies. The research considered the difference between a mature market as opposed to emergent ones, and addressed differences between Western and Eastern cultures.
APA, Harvard, Vancouver, ISO, and other styles
10

Krzywinski, Jens, Mario Linke, Christian Wölfel, and Günter Kranke. "Entwerfen Entwickeln Erleben 2014 – Beiträge zum Technischen Design: Dresden, 26.-27. Juni 2014." TUDpress, 2014. https://tud.qucosa.de/id/qucosa%3A28131.

Full text
Abstract:
Die Konferenz »Entwerfen – Entwickeln – Erleben« bietet ein be­sonderes Podium zum Austausch von Wissenschaftlern und Praxis­vertretern aus den zentralen Bereichen der Produktentwicklung. Der vorliegende Band enthält Beiträge der EEE2014 unter anderem zu Innovationsstudien und Zukunftskonzepten für verschiedenste Bran­chen, zu Design Thinking und Designprozessen von frühen Phasen bis zum Qualitätsmanagement, Methoden und Werkzeugen von Mindcards bis Eye-Tracking sowie zu den Themen User Experience und Nutzererleben, Öko-Design, Universal Design und partizipative Gestaltung. Die Technischen Universität Dresden und technischesdesign.org er­möglichten in Kooperation mit der Gruppe Virtuelle Produktentwick­lung der Wissenschaftlichen Gesellschaft für Produktentwicklung (WiGeP), dem Mathematisch-Physikalischen Salon der Staatlichen Kunstsammlungen Dresden und der Hochschule für Bildende Küns­te Dresden die fachübergreifende Diskussion des Schwerpunkt-The­mas inmitten der Dresdner Altstadt. In diesem Band sind die Bei­träge zum Technischen Design enthalten, ein weiterer Band (http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-144963, herausgegeben von Ralph Stelzer) fasst die Beiträge zur Konstruktionstechnik und zur Virtuellen Produktentwick­lung zusammen.:Das Futur II Innovationskonzept zur Optimierung schienengebundener Fahrzeuge Christian Scholz 11 Eco Design Tool – Qualitative Entscheidungsunterstützung in der Produktgestaltung Georg Dwalischwili, Malte Koslowski und Nikolaus Marbach 27 Innovationsstudien als Treiber anwendungsorientierter Forschung – Beispiele aus dem Agrarbereich Christoph Philipp Schreiber, Thomas Herlitzius und Jens Krzywinski 43 Produktentwicklung von Bekleidung und technischen Textilien – 3DDesign/Konstruktion für biegeweiche Materialien Sybille Krzywinski, Ellen Wendt, Jana Siegmund und Lina Girdauskaite 57 Design Thinking: Allgemeingültiger Innovationsprozess? Gavin Melles und Rebekka Fuge 69 Neue Industrial Design Prozesse für die Produktentwicklung – Die Überarbeitung der VDI/VDE-Richtlinie 2424 Gerhard Reichert, Robert Watty und Christian Zimmermann 77 UXX Enterprise oder: Über den Sinn und Unsinn von Entwerfen, User Experience und Modellbau im Spannungsfeld zwischen Design Thinking und User Centered Design Oliver Gerstheimer 87 Anwenderorientierte strategische Ausrichtung von Design bei technologiegeprägten Unternehmen Frank Thomas Gärtner 103 Partizipative Softwareentwicklung am Beispiel der Findung eines Interaktionskonzeptes Ingmar S. Franke und Frank Peter 115 Die Konzeptvisualisierung als frühe Entscheidungsunterstützung im Rahmen komplexer Produktentwicklungen Frank Mühlbauer und Jens Krzywinski 129 Qualitätsmanagement im Designprozess Matthias Richter 145 Der Raum als unterstützendes Werkzeug im Designprozess. Wie wirkt sich das Design der Arbeitsumgebung auf kreative Teamarbeit aus? Danjela Hüsam, Claudia Nicolai, Dora Panayotova und Ulrich Weinberg 155 Entwickeln mit Mindcards – mehr Interaktion in kreativen Prozessen Stefan Boës, Moritz Mussgnug, Dominik Noli, Bastian Leutenecker und Mirko Meboldt 169 Learning in Action als mannigfaltige Methode zum Erlernen, Erleben und Problem Reframing Andrea Augsten 181 Potenziale und Herausforderungen für das Design in der Konzeptionsphase von soziotechnischen Systemen Jennifer Müller, Christophe Kunze und Madeleine Berger 195 Einsatz von mobilen Eye Tracking Technologien in der nutzerorientierten Produktentwicklung Moritz Mussgnug, Quentin Lohmeyer und Mirko Meboldt 209 Methode zur nutzergerechten Interfacegestaltung auf der Basis eines idealen Informationsablaufs zwischen funktionalen und formalen Anforderungen Markus Schmid 219 Multimodale HMI – Untersuchungen zur Erweiterung der Arbeitsgedächtniskapazität durch visuell-taktile Anzeiger Matti Schwalk und Thomas Maier 233 Assistenzsysteme im industriellen Kontext – Interviews und Kontextanalyse Anja Knöfel, Ralph Stelzer, Rainer Groh und Jens Krzywinski 243 Design im Bereich der Sicherheitstechnik Christian Fritz 255 Gestaltungsprinzipien für herstellerproprietäre, mobilfunkbasierte Arbeitsmittel Applikationen – Die Zielgruppenbefragung Friedrich Niehaus und Tobias Kehrein 263 Optimierung gestalterischer Faktoren für die altersgerechte Mensch-Produkt-Schnittstelle durch Greifkraftmessung Benedikt Janny, Matthias Haug und Thomas Maier 279 Iteratives Design in der Produktentstehung Gerhard Glatzel 291 Streaming alternativer Inhalte ermöglicht Barrierefreiheit für einige – und Mehrwerte für viele Zuschauer Mathias Knigge und Jörn Erkau 303 Kein schales Schimmern – Die Goldene Regel im Designkontext Heike Raap 309 Möbelentwicklung im Wandel Tony Gauser 319 Solarkraft in der Produktentwicklung – Anwendungen für Westafrika Jörg Reiff-Stephan 327 Universal Design – Möglichkeiten und Grenzen Susanne Trabandt, Linda Geißler und Stefan Schmidt 341 Wahrnehmungsgerechtheit als Gestaltungsaufgabe im Produktdesign Thomas Gatzky 351
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Federated user ID management"

1

Varnum, Kenneth J. Exploring Discovery: The Front Door to a Library's Licensed and Digitized Content. Facet Publishing, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Federated user ID management"

1

Rubio-Montero, A. J., E. Huedo, and R. Mayo-García. "User-Guided Provisioning in Federated Clouds for Distributed Calculations." In Adaptive Resource Management and Scheduling for Cloud Computing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-28448-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Poursalidis, Vassilis, and Christos Nikolaou. "A New User-Centric Identity Management Infrastructure for Federated Systems." In Trust and Privacy in Digital Business. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11824633_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Fuyu, and Erdogan Dogdu. "A User Management System for Federated Databases Using Web Services." In Computational Science and Its Applications - ICCSA 2006. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11751632_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wen, Wenkan, Yiwen Liu, Yanxia Gao, Zhirong Zhu, Yuanquan Shi, and Xiaoning Peng. "Federated Learning Based User Scheduling for Real-Time Multimedia Tasks in Edge Devices." In Edge Computing and IoT: Systems, Management and Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-28990-3_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Livenson, Ilja, Ahti Saar, Marina Adomeit, et al. "Federated Resource Allocation for HPC Services." In Communications in Computer and Information Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-86240-3_9.

Full text
Abstract:
Abstract This paper presents an implementation of a federated resource allocation system (Puhuri), which offers a full set of functions from the application phase for computing infrastructure resources to consumption reporting. The implementation is based on the Puhuri project of Nordic e-Infrastructure Collaboration (NeIC) [1]. Shared research infrastructures, particularly high-performance computers, necessitate a robust mechanism for allocating resources in accordance with predefined policies. An allocation serves as authorisation to utilise a system in an agreed-upon manner. The impact of Puhuri on shared research infrastructures is to enable multiple resource allocation teams to allocate resources across different domains and organisations. Puhuri has integrated the LUMI EuroHPC supercomputer [2] and the biodiversity digital twin workflow management framework Lexis. Additionally, Puhuri has also been collecting requirements and doing technical integrations in a wider scope. Users accessing the system must be unequivocally identified. This process, known as authentication, ensures that the right individuals utilise the allocated resources to which they are authorised by the resource allocation team. GÉANT has established the MyAccessID service [3] for federated authentication, which Puhuri also utilises. One of the challenges is related to the user identity vetting for the users whose identity provider is not signalling that they are verifying users’ identities in the required manner, which requires them to use commercial third-party services for automatic identity vetting based on user’s identity cards.
APA, Harvard, Vancouver, ISO, and other styles
6

Kecskemeti, Gabor, Attila Kertesz, Attila Marosi, and Peter Kacsuk. "Interoperable Resource Management for Establishing Federated Clouds." In Achieving Federated and Self-Manageable Cloud Infrastructures. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-1631-8.ch002.

Full text
Abstract:
Cloud Computing builds on the latest achievements of diverse research areas, such as Grid Computing, Service-oriented computing, business process modeling and virtualization. As this new computing paradigm was mostly lead by companies, several proprietary systems arose. Recently, alongside these commercial systems, several smaller-scale privately owned systems are maintained and developed. This chapter focuses on issues faced by users with interests in Multi-Cloud use and by Cloud providers with highly dynamic workloads. The authors propose a Federated Cloud Management architecture that provides unified access to a federated Cloud that aggregates multiple heterogeneous IaaS Cloud providers in a transparent manner. The architecture incorporates the concepts of meta-brokering, Cloud brokering, and on-demand service deployment. The meta-brokering component provides transparent service execution for the users by allowing the interconnection of various Cloud brokering solutions. Cloud-Brokers manage the number and the location of the Virtual Machines performing the user requests. In order to decrease Virtual Machine instantiation time and increase dynamism in the system, the service deployment component optimizes service delivery by encapsulating services as virtual appliances allowing their decomposition and replication among IaaS Cloud infrastructures. The architecture achieves service provider level transparency through automatic virtual appliance replication and Virtual Machine management of Cloud-Brokers.
APA, Harvard, Vancouver, ISO, and other styles
7

Valarmathi, V., and S. Dhanalakshmi. "Smart Library Surveillance With Object Detection, Blockchain, and Federated Learning." In Advances in Knowledge Acquisition, Transfer, and Management. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-9616-2.ch014.

Full text
Abstract:
The integration of object detection and classification technologies with surveillance cameras in a library setting aims to enhance security, resource management, and user experience. To address concerns related to data security and privacy, we incorporate blockchain technology, which provides a decentralized and immutable ledger for recording surveillance data. This network leverages federated learning to enable collaborative model training while preserving data privacy, enhancing the accuracy and robustness of the object detection and classification system across different environments. Our approach demonstrates the potential of combining computer vision, blockchain, and collaborative networks to create a secure, efficient, and privacy-preserving surveillance system for libraries.
APA, Harvard, Vancouver, ISO, and other styles
8

Augusto, Alexandre B., and Manuel E. Correia. "A Mobile-Based Attribute Aggregation Architecture for User-Centric Identity Management." In Architectures and Protocols for Secure Information Technology Infrastructures. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4514-1.ch010.

Full text
Abstract:
The massive growth of the Internet and its services is currently being sustained by the mercantilization of users’ identities and private data. Traditional services on the Web require the user to disclose many unnecessary sensitive identity attributes like bankcards, geographic position, or even personal health records in order to provide a service. In essence, the services are presented as free and constitute a means by which the user is mercantilized, often without realizing the real value of its data to the market. In this chapter the auhors describe OFELIA (Open Federated Environment for Leveraging of Identity and Authorization), a digital identity architecture designed from the ground up to be user centric. OFELIA is an identity/authorization versatile infrastructure that does not depend upon the massive aggregation of users’ identity attributes to offer a highly versatile set of identity services but relies instead on having those attributes distributed among and protected by several otherwise unrelated Attribute Authorities. Only the end user, with his smartphone, knows how to aggregate these scattered Attribute Authorities’ identity attributes back into some useful identifiable and authenticated entity identity that can then be used by Internet services in a secure and interoperable way.
APA, Harvard, Vancouver, ISO, and other styles
9

Mohammed, Derek, and Helen MacLennan. "Secure Authentication and Identity Management With AI." In Advances in Computational Intelligence and Robotics. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-3296-3.ch009.

Full text
Abstract:
Secure authentication and identity management are critical components of modern cybersecurity, ensuring that only authorized users gain access to sensitive systems and data. Traditional authentication methods, such as passwords and multi-factor authentication, face increasing challenges due to sophisticated cyber threats, credential theft, and user experience limitations. Recent advancements in artificial intelligence (AI), particularly deep learning and large language models (LLMs), have revolutionized authentication mechanisms by enhancing security, accuracy, and adaptability. AI-driven authentication systems leverage biometric recognition, behavioral analysis, and anomaly detection to improve identity verification and fraud prevention. Additionally, federated learning and decentralized identity frameworks provide robust solutions for privacy-preserving authentication. This chapter explores the integration of AI in secure authentication and identity management, discussing its benefits, challenges, and future research directions.
APA, Harvard, Vancouver, ISO, and other styles
10

Bhimavarapu, Usharani. "Privacy-Preserving AI for Medical Applications." In Strategic Management, Regulatory Challenges, and Global Governance of MedTech. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-1205-7.ch006.

Full text
Abstract:
The sudden infusion of artificial intelligence (AI) into the medical sector requires strong frameworks that address regulatory requirements, ethical issues, privacy issues, and concerns related to interoperability. The current research conceptualizes a dynamic system of AI governance that changes dynamically along with advancements in AI, avoiding the constraints of fixed models of governance. In contrast to conventional methods, the model incorporates adaptive compliance processes, explainable AI models, and user-managed data-sharing systems to enable transparency and trustworthiness. It also uses federated learning methods to enable secure and scalable AI adoption in healthcare and avoid data heterogeneity challenges. The model includes enhanced privacy protection with less homomorphic encryption and optimally utilized blockchain, reducing computation overhead and allowing practical application.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Federated user ID management"

1

Caruso, Andrea, Giovanni Schembra, Christian Grasso, et al. "Adaptive 360° Video Streaming over a Federated 6G Network: Experimenting In-Network Computing for Enhanced User Experience." In 2024 20th International Conference on Network and Service Management (CNSM). IEEE, 2024. https://doi.org/10.23919/cnsm62983.2024.10814393.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Madsen, Paul, Yuzo Koga, and Kenji Takahashi. "Federated identity management for protecting users from ID theft." In the 2005 workshop. ACM Press, 2005. http://dx.doi.org/10.1145/1102486.1102500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ahn, Gail-Joon, and Moonam Ko. "User-centric privacy management for federated identity management." In 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007). IEEE, 2007. http://dx.doi.org/10.1109/colcom.2007.4553829.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shah, Harsh, Rutwik Patel, and Prachi Tawde. "Federated Learning to Preserve the Privacy of User Data." In 2023 Somaiya International Conference on Technology and Information Management (SICTIM). IEEE, 2023. http://dx.doi.org/10.1109/sictim56495.2023.10104860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khan, Latif U., Umer Majeed, and Choong Seon Hong. "Federated Learning for Cellular Networks: Joint User Association and Resource Allocation." In 2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, 2020. http://dx.doi.org/10.23919/apnoms50412.2020.9237045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Luo, Sichun, Yuanzhang Xiao, and Linqi Song. "Personalized Federated Recommendation via Joint Representation Learning, User Clustering, and Model Adaptation." In CIKM '22: The 31st ACM International Conference on Information and Knowledge Management. ACM, 2022. http://dx.doi.org/10.1145/3511808.3557668.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Quinte Torres, Helen, Leslie Siany Condor Lazaro, Estefany Angeli Magro de la Cruz, and Diana Paola Chipana Gago. "Comprehensive Technological Model for Monitoring Personnel Performance in Coffee Plantations through Harvest Container Tracking and User ID." In ICICM 2024: 2024 The 14th International Conference on Information Communication and Management. ACM, 2024. https://doi.org/10.1145/3711609.3711616.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ninomiya, Hiroaki, Eisuke Ito, Brendan Flanagan, and Sachio Hirokawa. "Bridging SNS ID and user using NFC and SNS: Design of NFC and SNS based event attendance management system." In 2012 International Conference on Anti-Counterfeiting, Security and Identification (2012 ASID). IEEE, 2012. http://dx.doi.org/10.1109/icasid.2012.6325346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

PONNUSAMY, R., and T. V. GOPAL. "A STUDY OF THE “MULTI-AGENT BASED USER ACCESS AND CORRELATED PATTERN IN OPTIMAL CONTENT ALLOCATION METHOD FOR FEDERATED VIDEO DIGITAL LIBRARIES”." In Proceedings of the First iKMS International Conference on Knowledge Management. WORLD SCIENTIFIC, 2004. http://dx.doi.org/10.1142/9789812702081_0032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Zhuohua, Maoli Liu, and John C. S. Lui. "FedConPE: Efficient Federated Conversational Bandits with Heterogeneous Clients." In Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/501.

Full text
Abstract:
Conversational recommender systems have emerged as a potent solution for efficiently eliciting user preferences. These systems interactively present queries associated with "key terms" to users and leverage user feedback to estimate user preferences more efficiently. Nonetheless, most existing algorithms adopt a centralized approach. In this paper, we introduce FedConPE, a phase elimination-based federated conversational bandit algorithm, where M agents collaboratively solve a global contextual linear bandit problem with the help of a central server while ensuring secure data management. To effectively coordinate all the clients and aggregate their collected data, FedConPE uses an adaptive approach to construct key terms that minimize uncertainty across all dimensions in the feature space. Furthermore, compared with existing federated linear bandit algorithms, FedConPE offers improved computational and communication efficiency as well as enhanced privacy protections. Our theoretical analysis shows that FedConPE is minimax near-optimal in terms of cumulative regret. We also establish upper bounds for communication costs and conversation frequency. Comprehensive evaluations demonstrate that FedConPE outperforms existing conversational bandit algorithms while using fewer conversations.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!