{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T18:48:44Z","timestamp":1773082124343,"version":"3.50.1"},"reference-count":118,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2006,5,1]],"date-time":"2006-05-01T00:00:00Z","timestamp":1146441600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/2.0"},{"start":{"date-parts":[[2006,7,11]],"date-time":"2006-07-11T00:00:00Z","timestamp":1152576000000},"content-version":"vor","delay-in-days":71,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["User Model User-Adap Inter"],"published-print":{"date-parts":[[2006,5]]},"DOI":"10.1007\/s11257-006-9006-5","type":"journal-article","created":{"date-parts":[[2006,7,10]],"date-time":"2006-07-10T18:06:21Z","timestamp":1152554781000},"page":"129-169","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["An LDAP-based User Modeling Server and its Evaluation"],"prefix":"10.1007","volume":"16","author":[{"given":"Alfred","family":"Kobsa","sequence":"first","affiliation":[]},{"given":"Josef","family":"Fink","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,7,11]]},"reference":[{"key":"9006_CR1","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/0020-7373(92)90018-G","volume":"36","author":"D.W. Aha","year":"1992","unstructured":"Aha D.W. (1992) Tolerating noisy, irrelevant and novel attributes in instance-based learning algorithms. Int. J. Man-Machine Studies 36, 267\u2013287. DOI: 10.1016\/0020\u20137373(92)90018-G","journal-title":"Int. J. Man-Machine Studies"},{"key":"9006_CR2","doi-asserted-by":"crossref","unstructured":"Almeida, V., Bestavros, A., Crovella, M., Oliveira, A.: Characterizing reference locality in the WWW. Fourth International Conference on Parallel and Distributed Information Systems, IEEE Computer Society, 92\u2013103 (1996) DOI: 10.1109\/PDIS.1996.568672","DOI":"10.1109\/PDIS.1996.568672"},{"issue":"1","key":"9006_CR3","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/103162.103164","volume":"23","author":"G. Andrews","year":"1991","unstructured":"Andrews G. (1991) Paradigms for process interaction in distributed programs. ACM Comput. Surveys 23(1): 49\u201390. DOI: 10.1145\/103162.103164","journal-title":"ACM Comput. Surveys"},{"key":"9006_CR4","unstructured":"Bigfoot: Bigfoot (2006) http:\/\/search.bigfoot.com\/."},{"key":"9006_CR5","unstructured":"Borland: Borland VisiBroker (2006) http:\/\/www.borland.com\/us\/products\/visibroker\/"},{"key":"9006_CR6","volume-title":"ASCON.Memo, SFB 314: AI\u2014Knowledge-Based Systems","author":"G. Bosch","year":"1988","unstructured":"Bosch G. (1988) ASCON. Memo, SFB 314: AI\u2014Knowledge-Based Systems. Department of Computer, Science Saarland University, Saarbr\u00fccken, Germany"},{"key":"9006_CR7","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1006\/ijhc.1994.1003","volume":"40","author":"G. Brajnik","year":"1994","unstructured":"Brajnik G., Tasso C. (1994) A shell for developing non-monotonic user modeling systems. Int. J. Human-Computer Studies 40: 31\u201362. DOI: 10.1006\/ijhc.1994.1003","journal-title":"Int. J. Human-Computer Studies"},{"key":"9006_CR8","unstructured":"Breese, J., Heckerman, D., Kadie, C.: Empirical analysis of predictive algorithms for collaborative filtering. Proceedings of the Fourteenth Annual Conference on Uncertainty in Artificial Intelligence (UAI-98), San Francisco, Morgan Kaufmann, pp 43\u201352 (1998) ftp:\/\/ftp.research. microsoft.com\/pub\/tr\/tr-98\u201312.pdf"},{"key":"9006_CR9","doi-asserted-by":"crossref","unstructured":"Breslau, L., Cao, P., Fan, L., Phillips, G., Shenker, S.: Web caching and Zipf-like distributions: evidence and implications. INFOCOM\u201999. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, (126\u2013134) (1999) DOI: 10.1109\/INFCOM.1999.749260","DOI":"10.1109\/INFCOM.1999.749260"},{"key":"9006_CR10","unstructured":"Bright, A., Kay, J., Ler, D., Ngo, K., Niu, W., Nuguid, A.: Adaptively recommending museum tours. UBICOMP-05 Workshop on Smart Environments and their Applications to Cultural Heritage, Tokyo, Japan (2005) http:\/\/smart.arces.unibo.it\/pdf\/04-Adaptively-Recommending_Bright.pdf."},{"key":"9006_CR11","unstructured":"Brusilovsky, P., Ritter, S., Schwarz, E.: Distributed intelligent tutoring on the Web. AI-ED\u203297, 8th World Conference on Artificial Intelligence in Education, Kobe, Japan, pp. 482\u2013489. (1997) http:\/\/www2.sis.pitt.edu\/~peterb\/papers\/AIED97.html"},{"issue":"3\u20134","key":"9006_CR12","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s11257-005-0001-z","volume":"15","author":"D.J. Carmichael","year":"2005","unstructured":"Carmichael D.J., Kay J., Kummerfeld B. (2005) Consistent modelling of users, devices and sensors in a ubiquitous computing environment. User Model. User-Adapted Interact. J. Personal. Res. 15(3\u20134): 197\u2013234. DOI: 10.1007\/s11257\u2013005\u20130001-z","journal-title":"User Model. User-Adapted Interact. J. Personal. Res."},{"key":"9006_CR13","volume-title":"Understanding X.500: The Directory","author":"D. Chadwick","year":"1996","unstructured":"Chadwick D. (1996) Understanding X.500: The Directory. London, Thomson"},{"key":"9006_CR14","unstructured":"Critical Path.: Critical Path (2006) http:\/\/www.cp.net"},{"key":"9006_CR15","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/s007780100037","volume":"10","author":"A. Datta","year":"2001","unstructured":"Datta A., Dutta K., VanderMeer D., Ramamritham K., Navathe S.B. (2001) An architecture to support scalable online personalization on the web. VLDB J. 10, 104\u2013117. DOI: 10.1007\/s007780100037","journal-title":"VLDB J."},{"key":"9006_CR16","unstructured":"Deep Map.: Deep Map: intelligent, mobile, multi-media and full of knowledge (Project Homepage) (2001) http:\/\/www.eml.org\/english\/research\/deepmap\/deepmap.html"},{"key":"9006_CR17","unstructured":"Duska, B.M., Marwood, D., Feeley, M. J.: The measured access characteristics of world-wide-web client proxy caches. USENIX Symposium on Internet Technologies and Systems, Monterey, CA (1997) http:\/\/www.usenix.org\/publications\/library\/proceedings\/usits97\/duska.html"},{"key":"9006_CR18","unstructured":"enQuire: enQuire Identity Server. (2006). http:\/\/www.persistentsys.com\/products\/enquire\/enquire.htm."},{"key":"9006_CR19","unstructured":"Excite: Excite Network Online Media Kit.(2006) http:\/\/www.excitenetwork.com\/advertising\/index\/id\/Directmarket|ListRental|3|1.html."},{"key":"9006_CR20","unstructured":"Fenstermacher, K.D., Ginsburg, M.: Mining client-side activity for personalization. Fourth Workshop on advanced issues in electronic commerce and web information systems (WECWIS), Newport Beach, CA, (2002), pp. 44\u201351. http:\/\/linux.ece.uci.edu\/TFEC\/wecwis.html"},{"key":"9006_CR21","first-page":"415","volume-title":"User Models in Dialog Systems.","author":"T.W. Finin","year":"1989","unstructured":"Finin T.W. (1989) GUMS: A general user modeling shell. In: Kobsa A., Wahlster W., (eds) User Models in Dialog Systems. Berlin, Heidelberg, Springer-Verlag, pp. 415\u2013430"},{"key":"9006_CR22","first-page":"24","volume-title":"GUMS1: A general user modeling system Sixth Canadian Conference on Artificial Intelligence","author":"T.W. Finin","year":"1986","unstructured":"Finin T.W., Drager D. (1986) GUMS1: A general user modeling system Sixth Canadian Conference on Artificial Intelligence. Montreal, Canada, pp. 24\u201329"},{"key":"9006_CR23","doi-asserted-by":"crossref","unstructured":"Fink, J.: Transactional consistency in user modeling systems. In: Kay, J., (ed.) UM99 User Modeling: Proceedings of the Seventh International Conference, pp. 191\u2013200, Wien New York, Springer-Verlag (1999) http:\/\/bistrica.usask.ca\/UM\/UM99\/Proc\/fink.pdf.","DOI":"10.1007\/978-3-7091-2490-1_19"},{"key":"9006_CR24","unstructured":"Fink, J.: User modeling servers\u2014Requirements, design, and evaluation. IOS Press, Amsterdam, Netherlands, (2004) http:\/\/books.google.com\/books?q=isbn:1586034057."},{"issue":"2\u20133","key":"9006_CR25","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1023\/A:1026597308943","volume":"10","author":"J. Fink","year":"2000","unstructured":"Fink J., Kobsa A. (2000) A review and analysis of commercial user modeling servers for personalization on the world wide web. User Model. User-Adapted Interact. J. Personal. Res. 10(2\u20133): 209\u2013249. DOI: 10.1023\/A:1026597308943","journal-title":"User Model. User-Adapted Interact. J. Personal. Res."},{"issue":"1","key":"9006_CR26","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1023\/A:1016383418977","volume":"18","author":"J. Fink","year":"2002","unstructured":"Fink J., Kobsa A. (2002) User modeling in personalized city tours. Artificial Intelligence Rev. 18(1): 33\u201374. DOI: 10.1023\/A:1016383418977","journal-title":"Artificial Intelligence Rev."},{"issue":"5","key":"9006_CR27","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/506218.506242","volume":"45","author":"J. Fink","year":"2002","unstructured":"Fink J., Koenemann J., Noller S., Schwab I. (2002) Putting personalization into practice. CACM 45(5): 41\u201342. DOI: 10.1145\/506218.506242","journal-title":"CACM"},{"issue":"2","key":"9006_CR28","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/0169-7552(94)90130-9","volume":"27","author":"S. Glassman","year":"1994","unstructured":"Glassman S. (1994) A caching relay for the world wide web. Computer Networks ISDN Sys. 27(2): 165\u2013172. DOI: 10.1016\/0169\u20137552(94)90130\u20139","journal-title":"Computer Networks ISDN Sys."},{"key":"9006_CR29","unstructured":"Goldman, A.: Top U.S. ISPs by subscriber: how we count. ISP-Planet, (2005) http:\/\/www.isp-planet.com\/research\/rankings\/2005\/usa_insight_q32005.html"},{"key":"9006_CR30","unstructured":"Goldrei, S., Kay, J., Kummerfeld, B.: Exploiting user models to automate the harvesting of metadata for learning objects. AIED-05 Workshop on Adaptive Systems for Web-Based Education: Tools and Reusability, Amsterdam, Netherlands (2005) http:\/\/www.lcc.uma.es\/~eva\/waswbe05\/papers\/ .pdf."},{"key":"9006_CR31","unstructured":"Goodman, B., Linton, F., Schoening, J.: Workshop on standards for learner modeling (1997) http:\/\/www.cs.usask.ca\/UM99\/w2.shtml"},{"key":"9006_CR32","unstructured":"Gribble, S.D., Brewer, E.A.: System design issues for internet middleware services: deductions from a large client trace. USENIX Symposium on Internet Technologies and Systems, Monterey, CA, (1997) http:\/\/www.usenix.org\/publications\/library\/proceedings\/usits97\/gribble.html"},{"key":"9006_CR33","doi-asserted-by":"crossref","unstructured":"Heckmann, D., Schwartz, T., Brandherm, B., Schmitz, M., von Wilamowitz-Moellendorff M.: GUMO: The general user model ontology. In: Ardissono, L., Brna P., Mitrovic A., (eds). User Modeling 2005: 10th International Conference, UM 2005, Edinburgh, Scotland, pp. 428\u2013432 (2005) DOI: 10.1007\/11527886_58","DOI":"10.1007\/11527886_58"},{"key":"9006_CR34","doi-asserted-by":"crossref","unstructured":"Herlocker, J., Konstan, J., Borchers, A., Riedl, J.: An algorithmic framework for performing collaborative filtering. Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval., New York, pp. 230\u2013237. (1999). DOI: 10.1145\/312624.312682","DOI":"10.1145\/312624.312682"},{"key":"9006_CR35","volume-title":"The G\u00f6del programming language","author":"P. Hill","year":"1993","unstructured":"Hill P., Lloyd J. (1993) The G\u00f6del programming language. MIT Press, Cambridge, MA"},{"key":"9006_CR36","unstructured":"Howes T., Smith M., Good G. Understanding and deploying LDAP directory services. IN, Macmillan Indianapolis, (1999)"},{"key":"9006_CR37","volume-title":"LDAP: programming directory-enabled applications with lightweight directory access protocol","author":"T.A. Howes","year":"1997","unstructured":"Howes T.A., Smith M. (1997) LDAP: programming directory-enabled applications with lightweight directory access protocol. Macmillan, Indianapolis, IN"},{"key":"9006_CR38","unstructured":"IBM: IBM Lotus Notes (2006a) http:\/\/www.ibm.com\/notes"},{"key":"9006_CR39","unstructured":"IBM: IBM Tivoli Directory Server (2006b) http:\/\/www-306.ibm.com\/software\/tivoli\/products\/ directory-server\/"},{"key":"9006_CR40","unstructured":"Informix: Informix Product Family. (2006) http:\/\/www.ibm.com\/software\/data\/informix\/"},{"key":"9006_CR41","unstructured":"ISO: Information technology\u2014Database languages\u2014SQL. ISO\/IEC 9075:1989, International Standardization Organization, Geneva, Switzerland (1989) http:\/\/www.iso.org."},{"key":"9006_CR42","unstructured":"ISO: Information technology\u2014Database languages\u2014SQL. ISO\/IEC 9075:2003, International Standardization Organization, Geneva, Switzerland (2003) http:\/\/www.iso.org."},{"key":"9006_CR43","unstructured":"ITU-T: Information technology\u2014open systems interconnection\u2014the directory: overview of concepts, models and services. Recommendation X.500 (02\/01), International Telecommunication Union (2001) http:\/\/www.itu.int\/ITU-T\/publications\/recs.html"},{"key":"9006_CR44","unstructured":"IVW: IVW online usage data march 2006, (2006) (in German) http:\/\/www.ivwonline.de\/ ausweisung2\/suchen.php."},{"key":"9006_CR45","volume-title":"um: a toolkit for user modelling","author":"J. Kay","year":"1990","unstructured":"Kay J. (1990) um: a toolkit for user modelling. Second International Workshop on User Modeling, Honolulu, HI"},{"issue":"3","key":"9006_CR46","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BF01100243","volume":"4","author":"J. Kay","year":"1995","unstructured":"Kay J. (1995) The um toolkit for reusable, long term user models. User Model. User-Adapted Interact. J. Personal. Res. 4(3): 149\u2013196. DOI: 10.1007\/BF01100243","journal-title":"User Model. User-Adapted Interact. J. Personal. Res."},{"key":"9006_CR47","doi-asserted-by":"crossref","unstructured":"Kay, J., Kummerfeld, B., Lauder, P.: Personis: a server for user models. In: De Bra, P., Brusilovsky, P., Conejo, R., (eds.) Adaptive Hypermedia and Adaptive Web-Based Systems: Second International Conference, AH 2002. Berlin Heidelberg, Springer-Verlag, pp. 203\u2013212 (2002) http:\/\/ springerlink.metapress.com\/link.asp?id=2l54yrgc0p8n2d5g","DOI":"10.1007\/3-540-47952-X_22"},{"key":"9006_CR48","unstructured":"Keung, S., Abbott, S.: LDAP server performance report. (1998) http:\/\/www.bnelson.com\/sizing\/docl\/ldapsPerformance.html"},{"key":"9006_CR49","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1111\/j.1467-8640.1990.tb00295.x","volume":"6","author":"A. Kobsa","year":"1990","unstructured":"Kobsa A. (1990) Modeling the user\u2019s conceptual knowledge in BGP-MS, a user modeling shell system. Comput. Intelligence 6, 193\u2013208","journal-title":"Comput. Intelligence"},{"key":"9006_CR50","doi-asserted-by":"crossref","unstructured":"Kobsa, A.: Utilizing knowledge: the components of the SB-ONE knowledge representation workbench. In: Sowa, J. (ed.) Principles of Semantic Networks: Exploration in the Representation of Knowledge. Morgan Kaufmann, San Mateo, CA, pp. 457\u2013486 (1991)","DOI":"10.1016\/B978-1-4832-0771-1.50023-0"},{"issue":"1\u20132","key":"9006_CR51","first-page":"49","volume":"11","author":"A. Kobsa","year":"2001","unstructured":"Kobsa A. (2001) Generic user modeling systems. User Model. User-Adapted Interact. J. Personal. Res. 11(1\u20132): 49\u201363. DOI: 10.1023\/A:1011187500863","journal-title":"J. Personal. Res."},{"issue":"2","key":"9006_CR52","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1017\/S0269888901000108","volume":"16","author":"A. Kobsa","year":"2001","unstructured":"Kobsa A., Koenemann J., Pohl W. (2001) Personalized hypermedia presentation techniques for improving customer relationships. Knowledge Eng. Rev. 16(2): 111\u2013155. DOI: 10.1017\/S0269888901000108.","journal-title":"Knowledge Eng. Rev."},{"key":"9006_CR53","doi-asserted-by":"crossref","unstructured":"Kobsa A. Generic User Modeling Systems In: Brusilovsky, P., Kobsa, A., and Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. Heidelberg, Germany: Springer Verlag (2006, forthcoming).","DOI":"10.1007\/978-3-540-72079-9_4"},{"key":"9006_CR54","unstructured":"Kobsa, A., M\u00fcller, D., Nill, A.: KN-AHS: an adaptive hypertext client of the user modeling system BGP-MS. Proceedings of the Fourth International Conference on User Modeling, Hyannis, MA pp. 99\u2013105. Reprinted in Maybury, M., Wahlster, W., (eds.) (1998). Readings in Intelligent User Interfaces. Morgan. Kaufman, San Mateo, CA pp. 372\u2013378 (1994) http:\/\/www.ics.uci.edu\/~kobsa\/papers\/1994-UM94-kobsa.pdf"},{"issue":"2","key":"9006_CR55","first-page":"59","volume":"4","author":"A. Kobsa","year":"1995","unstructured":"Kobsa A., Pohl W. (1995) The BGP-MS user modeling system. User Model. User-Adapted Interact. J. Personal. Res. 4(2): 59\u2013106. DOI: 10.1007\/BF01099428","journal-title":"J. Personal. Res."},{"key":"9006_CR56","unstructured":"Kobsa, A., Pohl, W., Fink, J.: A standard for the performatives in the communication between applications and user modeling systems (Draft) (1996) http:\/\/www.ics.uci.edu\/~kobsa\/papers\/ 1996-kobsa-pohl-fink-rfc.pdf."},{"issue":"2","key":"9006_CR57","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/767193.767196","volume":"3","author":"A. Kobsa","year":"2003","unstructured":"Kobsa A., Schreck J. (2003) Privacy through pseudonymity in user-adaptive systems. ACM Trans. Internet Technol. 3(2): 149\u2013183. DOI: 10.1145\/767193.767196","journal-title":"ACM Trans. Internet Technol."},{"key":"9006_CR58","unstructured":"Kummerfeld, R., Kay, J.: Remote access protocols for user modelling. Proceedings and Kit for Workshop User Models in the Real World, Chia Laguna, Sardinia, pp. 12\u201315 (1997) http:\/\/www.cs.usyd.edu.au\/~judy\/Homec\/Pubs\/1997_umnet.html"},{"key":"9006_CR59","unstructured":"Liberty: Liberty Alliance Project: Digital Identity Defined (2006) http:\/\/www.projectliberty.org\/"},{"key":"9006_CR60","volume-title":"Big Book of Lightweight Directory Access Protocol (LDAP) RFCs","author":"P. Loshin","year":"2000","unstructured":"Loshin P. (2000) Big Book of Lightweight Directory Access Protocol (LDAP) RFCs. Morgan Kaufmann San Diego, CA"},{"key":"9006_CR61","unstructured":"LTSC: Learning Technology Standards Committee (2006) http:\/\/ieeeltsc.org\/"},{"key":"9006_CR62","doi-asserted-by":"crossref","unstructured":"Malaka R., Zipf A.: DEEP MAP\u2014Challenging IT research in the framework of a tourist information system. In: Fesenmaier, D., Klein, S., Buhalis, D., (eds.) Information and Communication Technologies in Tourism 2000: Proceedings of ENTER 2000. Wien, New York, Springer, pp. 15\u201327, (2000)","DOI":"10.1007\/978-3-7091-6291-0_2"},{"key":"9006_CR63","doi-asserted-by":"crossref","unstructured":"McCune W.W.: OTTER 3.0 reference manual and guide. In: Argonne National Laboratory, Mathematics and Computer Science Division. Argonne, IL (1994) http:\/\/ www-unix.mcs.anl.gov\/AR\/otter\/","DOI":"10.2172\/10129052"},{"key":"9006_CR64","unstructured":"Microsoft: Microsoft Exchange Server (2006a) http:\/\/www.microsoft.com\/exchange\/"},{"key":"9006_CR65","unstructured":"Microsoft: Windows Server 2003 Active Directory (2006b) http:\/\/www.microsoft.com\/windows server2003\/technologies\/directory\/activedirectory\/default.mspx"},{"issue":"3","key":"9006_CR66","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1145\/1010614.1010618","volume":"22","author":"B.N. Miller","year":"2004","unstructured":"Miller B.N., Konstan J.A., J. Riedl (2004) PocketLens: toward a personal recommender system. ACM Trans. Information Syst. 22(3): 437\u2013476. DOI: 10.1145\/1010614.1010618","journal-title":"ACM Trans. Information Syst."},{"key":"9006_CR67","unstructured":"MindCraft: DirectoryMark: the ladp server benchmarking tool (2006). http:\/\/www.mindcraft.com\/ directorymark\/"},{"key":"9006_CR68","volume-title":"Machine learning","author":"T. Mitchell","year":"1997","unstructured":"Mitchell T. (1997) Machine learning. McGraw-Hill, New York, NY"},{"key":"9006_CR69","unstructured":"Nelson B.: Sizing Guide for Netscape Directory Server (2002). http:\/\/www.bnelson.com\/ sizing\/doc2\/Directory4_0-SizingGuide.html"},{"key":"9006_CR70","volume-title":"Usability engineering","author":"J. Nielsen","year":"1993","unstructured":"Nielsen J. (1993) Usability engineering. Academic Press, San Diego, CA"},{"key":"9006_CR71","unstructured":"Nielsen J.: Zipf Curves and Website Popularity (1997) http:\/\/www.useit.com\/alertbox\/zipf.html"},{"key":"9006_CR72","volume-title":"Designing Web Usability","author":"J. Nielsen","year":"2000","unstructured":"Nielsen J. (2000) Designing Web Usability. New Riders, Indianapolis, IN"},{"key":"9006_CR73","unstructured":"Novell: Novell eDirectory (2006) http:\/\/www.novell.com\/products\/edirectory\/"},{"key":"9006_CR74","unstructured":"Nvision: 35 Percent of Surfing Time is Spent on 50 Sites (1999) http:\/\/www.nua.com\/ surveys\/index.cgi?f=VS&art_id=905355323&rel=true"},{"key":"9006_CR75","unstructured":"O\u2019Connor, M., Herlocker, J.: Clustering items for collaborative filtering. Proceedings of the ACM SIGIR Workshop on Recommender Systems, Berkeley, CA (1999) http:\/\/web.engr. oregonstate.edu\/~herlock\/papers\/sigir99_workshop_clustering.pdf"},{"key":"9006_CR76","unstructured":"OMG: Object Management Group (OMG) (2001) http:\/\/www.omg.org"},{"key":"9006_CR77","volume-title":"Essential Client\/Server Survival Guide","author":"R. Orfali","year":"1994","unstructured":"Orfali R., Harkey D., Edwards J. (1994) Essential Client\/Server Survival Guide. Wiley and Sons, New York"},{"key":"9006_CR78","unstructured":"Orwant J. (1993). Doppelg\u00e4nger goes to school: machine learning for user modeling. Master Thesis, MIT, Cambridge, MA"},{"key":"9006_CR79","unstructured":"Orwant, J.: Privacy and user models: threats, caveats, and safeguards (1994) http:\/\/ citeseer.ist.psu.edu\/orwant94privacy.html"},{"issue":"2","key":"9006_CR80","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF01099429","volume":"4","author":"J. Orwant","year":"1995","unstructured":"Orwant J. (1995) Heterogenous learning in the Doppelg\u00e4nger user modeling system. User Model. Interact. J. Personal. Res. 4(2): 107\u2013130. DOI: 10.1007\/BF01099429","journal-title":"User Model. Interact. J. Personal. Res."},{"key":"9006_CR81","doi-asserted-by":"crossref","unstructured":"Padmanabhan V., Qiu L. The content and access dynamics of a busy web site: findings and implications. ACM SIGCOMM, ACM pp. 111\u2013123 (2000) DOI: 10.1145\/347059.347413","DOI":"10.1145\/347057.347413"},{"key":"9006_CR82","unstructured":"Paiva A., Self J. (1994) TAGUS: a user and learner modeling system. In: Proceedings of the Fourth International Conference on User Modeling. Hyannis, MA, pp. 43\u201349"},{"issue":"3","key":"9006_CR83","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/BF01100244","volume":"4","author":"A. Paiva","year":"1995","unstructured":"Paiva A., Self J. (1995) TAGUS\u2014A user and learner modeling workbench. User Model. User-Adapted Interact. J. Personal. Res. 4(3): 197\u2013226. DOI: 10.1007\/BF01100244","journal-title":"User Model. User-Adapted Interact. J. Personal. Res."},{"key":"9006_CR84","unstructured":"PAPI: PAPI Learner, Draft 8 Specification (2001) http:\/\/edutool.com\/papi"},{"key":"9006_CR85","unstructured":"Passport: Microsoft Passport Network (2006) http:\/\/www.passport.net"},{"key":"9006_CR86","unstructured":"Patrick, A.S., Black, A.: Implications of access methods and frequency of use for the National Capital Freenet (1996) http:\/\/debra.dgbt.doc.ca\/services-research\/survey\/connections\/"},{"key":"9006_CR87","unstructured":"Pereira, F., (Ed.): C-Prolog User\u2019s Manual Version 1.5. (1996). http:\/\/www.cs.duke.edu\/~raw\/ cps106\/cprolog.ps."},{"key":"9006_CR88","unstructured":"Persistent: Persistent (2006) http:\/\/www.persistentsys.com"},{"key":"9006_CR89","volume-title":"Logic-Based Representation and Reasoning for User Modeling Shell Systems","author":"W. Pohl","year":"1998","unstructured":"Pohl W. (1998) Logic-Based Representation and Reasoning for User Modeling Shell Systems. Sankt Augustin, Germany, infix"},{"key":"9006_CR90","unstructured":"Pohl W., Schwab I., Koychev I. (1999) Learning about the user: a general approach and its application. IJCAI\u203299 Workshop Learning About Users. Stockholm, Sweden"},{"key":"9006_CR91","volume-title":"The CORBA Reference Guide: Understanding the Common Object Request Broker Architecture","author":"A. Pope","year":"1997","unstructured":"Pope A. (1997) The CORBA Reference Guide: Understanding the Common Object Request Broker Architecture. Addison-Wesley, Sydney, Australia"},{"key":"9006_CR92","doi-asserted-by":"crossref","unstructured":"Razmerita, L., Angehrn, A., Maedche, A.: Ontology-based user modeling for knowledge management systems. In: Brusilovsky, P., Corbett, A., De Rosis, F. (eds.): User Modeling 2003: 9th International Conference, UM 2003. Heidelberg, Germany, Springer Verlag, pp 213\u2013217 (2003) http:\/\/ springerlink.metapress.com\/link.asp?id=thw9rmvmvklx9hac","DOI":"10.1007\/3-540-44963-9_29"},{"key":"9006_CR93","unstructured":"Rozanski, H., Bollman, G., Lipman, M.: Seize the occasion: usage-based segmentation for internet marketers (2001) http:\/\/www.strategy-business.com\/media\/pdf\/03\u201320\u201301_eInsight.pdf"},{"key":"9006_CR94","doi-asserted-by":"crossref","unstructured":"Schreck, J.: Security and Privacy in User Modeling. Kluwer Academic Publishers, Dordrecht, Netherlands, (2003) http:\/\/www.security-and-privacy-in-user-modeling.info","DOI":"10.1007\/978-94-017-0377-2"},{"key":"9006_CR95","unstructured":"Schwab I., Pohl W. (1999) Learning Information Interest from Positive Examples. UM99 Workshop on Machine Learning for User Modeling, Banff, Canada"},{"key":"9006_CR96","doi-asserted-by":"crossref","unstructured":"Shukla, S., Deshpande, A.: Tutorial: LDAP Directory Services\u2014Just Another Database Application? 2000 ACM SIGMOD International Conference on Management of Data, New York, NY (2000) http:\/\/www.pspl.co.in\/presentation\/sigmod2000_directory_database_tutorial.pdf","DOI":"10.1145\/342009.335482"},{"key":"9006_CR97","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1108\/eb026526","volume":"28","author":"K. Sparck Jones","year":"1972","unstructured":"Sparck Jones K. (1972) A Statistical Interpretation of term specificity and its application to retrieval. J. Documentation 28: 11\u201321. DOI: 10.1108\/00220410410560573","journal-title":"J. Documentation"},{"key":"9006_CR98","unstructured":"Sun: Sun Java System Directory Server Enterprise Edition (2006) http:\/\/www.sun.com\/software\/ products\/directory_srvr_ee\/"},{"key":"9006_CR99","unstructured":"Switchboard: Switchboard (2006) http:\/\/www.switchboard.com\/"},{"key":"9006_CR100","unstructured":"Tornago: Net Perceptions (2006) http:\/\/www.tornago.com"},{"key":"9006_CR101","doi-asserted-by":"crossref","unstructured":"VanderMeer, D., Dutta, K., Datta, A.: Enabling Scalable Online Personalization on the Web. 2nd ACM Conference on Electronic Commerce, Minneapolis, MN, ACM, pp. 185\u2013196 (2000) DOI: 10.1145\/352871.352892","DOI":"10.1145\/352871.352892"},{"issue":"1+2","key":"9006_CR102","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1023\/A:1024072706526","volume":"13","author":"J. Vassileva","year":"2003","unstructured":"Vassileva J., McCalla G., Greer J. (2003) Multi-agent multi-user modeling in I-Help. User Model. Interact. J. Personal. Res. 13(1+2): 179\u2013210. DOI: 10.1023\/A:1024072706526","journal-title":"User Model. Interact. J. Personal. Res."},{"key":"9006_CR103","volume-title":"PROTUM: a prolog based tool for user modeling WIS-Report 10, WG Information Systems","author":"H. Vergara","year":"1994","unstructured":"Vergara H. (1994) PROTUM: a prolog based tool for user modeling WIS-Report 10, WG Information Systems. Department of Information Science University of Konstanz, Germany"},{"key":"9006_CR104","unstructured":"Wahl, M., Howes, T., Kille, S.: Lightweight Directory Access Protocol (v3). RFC 2251, Internet Engineering Task Force (1977) http:\/\/www.ietf.org\/rfc\/rfc2251.txt"},{"key":"9006_CR105","doi-asserted-by":"crossref","unstructured":"Wang, X., Schulzrinne, H., Kandlur, D., Verma, D.: Measurement and analysis of LDAP performance. ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems, ACM, pp. 156\u2013165 (2000) http:\/\/www.cs.columbia.edu\/~xinwang\/public\/paper\/ldap_sigmetrics.pdf","DOI":"10.1145\/345063.339412"},{"key":"9006_CR106","unstructured":"WebTrends: WebTrends Customers Switch to First-Party Cookies and See Accuracy Skyrocket by More Than 300 Percent (2005). http:\/\/www.webtrends.com\/AboutWebTrends\/NewsRoom\/ NewsRoomArchive\/2005\/WebTrendsCustomersSwitchtoFirst-PartyCookiesandSeeAccuracy SkyrocketbyMoreThan300Percent.aspx"},{"key":"9006_CR107","unstructured":"Weltman, R., Tomlinson, C., and Sonntag, S.: The Java LDAP Application Program Interface (2005) http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-ldapext-ldap-java-api-19.txt"},{"key":"9006_CR108","doi-asserted-by":"crossref","unstructured":"Wettschereck, D.: A hybrid nearest-neighbor and nearest-hyperrectangle algorithm. Proceedings of the 7th European Conference on Machine Learning, Catania, Italy, Springer-Verlag, pp. 323\u2013335 (1994)","DOI":"10.1007\/3-540-57868-4_67"},{"issue":"1","key":"9006_CR109","first-page":"5","volume":"19","author":"D. Wettschereck","year":"1995","unstructured":"Wettschereck D., Dietterich T.G. (1995) An experimental comparison of nearest-neighbor and nearest- hyperrectangle algorithms. Machine Learning 19(1): 5\u201328. DOI: 10.1007\/BF00994658","journal-title":"Machine Learning"},{"key":"9006_CR110","unstructured":"Whitaker, R., Kay, J.: Location and activity modelling in intelligent environments. UM05 Workshop on Decentralized, Agent Based and Social Approaches to User Modelling, Edinburgh, Scotland (2005) http:\/\/www.l3s.de\/~dolog\/dasum\/Whitaker_Kay_um05.pdf"},{"key":"9006_CR111","unstructured":"WhitePages.com:WhitePages.com (2006) http:\/\/www.whitepages.com."},{"key":"9006_CR112","unstructured":"Wilson, D.R., Martinez, T.R.: Instance Pruning Techniques. In: Fisher, D., (ed.) Machine Learning: Proceedings of the Fourteenth International Conference (ICML\u203297). San Francisco, CA, Morgan Publishers, pp. 403\u2013411 (1997) http:\/\/synapse.cs.byu.edu\/papers\/ wilson.icml97.prune.pdf"},{"key":"9006_CR113","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1023\/A:1007626913721","volume":"38","author":"D.R. Wilson","year":"2000","unstructured":"Wilson D.R., Martinez T.R. (2000) Reduction techniques for instance-based learning algorithms. Machine Learning 38, 257\u2013286. DOI: 10.1023\/A:1007626913721","journal-title":"Machine Learning"},{"key":"9006_CR114","doi-asserted-by":"crossref","unstructured":"Yaacovi, Y., Wahl, M., Genovese, T.: Lightweight Directory Access Protocol (v3): Extensions for Dynamic Directory Services. RFC 2589, Internet Engineering Task Force (1999) http:\/\/www.ietf.org\/rfc\/rfc2589.txt","DOI":"10.17487\/rfc2589"},{"key":"9006_CR115","unstructured":"Yimam, D., Kobsa, A.: Expert finding systems for organizations: problem and domain analysis and the demoir approach. In: Ackerman, M., Cohen, A., Pipek, V., Wulf, V., (eds.) Beyond Knowledge Management: Sharing Expertise. MIT Press, Cambridge, MA, (2003) http:\/\/www.ics.uci.edu\/~kobsa\/papers\/2003-JOCEC-kobsa.pdf"},{"key":"9006_CR116","unstructured":"Yodlee: Yodlee (2006). http:\/\/www.yodlee.com"},{"key":"9006_CR117","doi-asserted-by":"crossref","unstructured":"Young, A.: Connection-Less Lightweight X.500 Directory Access Protocol. RFC 1798, Internet Engineering Task Force (1995) http:\/\/www.ietf.org\/rfc\/rfc1798.txt","DOI":"10.17487\/rfc1798"},{"key":"9006_CR118","volume-title":"Human Behavior and the Principle of Least Effort","author":"G.K. Zipf","year":"1949","unstructured":"Zipf G.K. (1949) Human Behavior and the Principle of Least Effort. Addison-Wesley Reading, MA"}],"container-title":["User Modeling and User-Adapted Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11257-006-9006-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11257-006-9006-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11257-006-9006-5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11257-006-9006-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T13:49:57Z","timestamp":1630504197000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11257-006-9006-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,5]]},"references-count":118,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2006,5]]}},"alternative-id":["9006"],"URL":"https:\/\/doi.org\/10.1007\/s11257-006-9006-5","relation":{},"ISSN":["0924-1868","1573-1391"],"issn-type":[{"value":"0924-1868","type":"print"},{"value":"1573-1391","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,5]]},"assertion":[{"value":"13 June 2005","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2006","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2006","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}