Skip to content
GCC AI Research

Search

Results for "user tracking"

Evaluating Web Search Engines Results for Personalization and User Tracking

arXiv ·

This paper presents six experiments evaluating personalization and user tracking in web search engine results. The experiments involve comparing search results based on VPN location (including UAE vs others), logged-in status, network type, search engine, browser, and trained Google accounts. The study measures total hits, first hit, and correlation between hits to identify patterns of personalization. Why it matters: The findings shed light on the extent of filter bubble effects and potential biases in search results for users in the UAE and globally.

Enabling Practical and Rich User Digitization

MBZUAI ·

A computer science vision involves computing devices becoming proactive assistants, enhancing various aspects of life through user digitization. Current devices provide coarse digital representations of users, but there's significant potential for improvement. Karan, a Ph.D. candidate at CMU, develops technologies for consumer devices to capture richer user representations without sacrificing practicality. Why it matters: Advancements in user digitization can lead to improved extended reality experiences, health tracking, and more productive work environments, enhancing the utility of consumer devices.

Understanding & Predicting User Lifetime with Machine Learning in an Anonymous Location-Based Social Network

arXiv ·

Researchers studied user lifetime prediction in the location-based social network Jodel within Saudi Arabia, leveraging its disjoint communities. Machine learning models, particularly Random Forest, were trained to predict user lifetime as a regression and classification problem. A single countrywide model generalizes well and performs similarly to community-specific models.

On Optimizing Mobile Memory, Storage, and Beyond

MBZUAI ·

Prof. Chun Jason Xue from the City University of Hong Kong presented research on optimizing mobile memory and storage by analyzing mobile application characteristics, noting their differences from server applications. The research explores system software designs inherited from the Linux kernel and identifies optimization opportunities in mobile memory and storage management. Xue's work aims to enhance user experience on mobile devices through mobile application characterization, focusing on non-volatile and flash memories. Why it matters: Optimizing mobile systems based on the unique characteristics of mobile applications can significantly improve device performance and user experience in the region.

Designing Technology with User Values in Mind: Insights from Privacy and Robotic Telepresence Research

MBZUAI ·

This article discusses a talk by Houda Elmimouni on designing technology with user values in mind, using privacy and robotic telepresence research as examples. The first study examines privacy practices, while the second focuses on values in robotic telepresence in classrooms. Elmimouni highlights the importance of aligning technology design with social values like privacy. Why it matters: The emphasis on user-centered design and social values provides insights applicable to AI development in the Middle East, where cultural context and ethical considerations are paramount.

Managing and Analyzing Big Traffic Data — An Uncertain Time Series Approach

MBZUAI ·

This article discusses the application of uncertain time series (UTS) approach to manage and analyze big traffic data for high-resolution vehicular transportation services. The study addresses challenges such as data sparseness, decision-making among multiple UTSs, and future forecasting with spatio-temporal correlations. Jilin Hui, previously a Research Associate at the Inception Institute of Artificial Intelligence (UAE), is applying this approach to solve problems related to increased congestion, greenhouse gas emissions, and reduced air quality in urban environments. Why it matters: The application of AI techniques to traffic management could significantly improve urban mobility and environmental sustainability in the GCC region and beyond.

Mutually-Regularized Dual Collaborative Variational Auto-encoder for Recommendation Systems

arXiv ·

This paper introduces a mutually-regularized dual collaborative variational auto-encoder (MD-CVAE) for recommendation systems, addressing the limitations of user-oriented auto-encoders (UAEs) in handling sparse ratings and new items. MD-CVAE integrates item content and user ratings within a variational framework, regularizing UAE weights with item content to avoid non-optimal convergence. A symmetric inference strategy eliminates the need for retraining when introducing new items, enhancing efficiency in dynamic recommendation scenarios. Why it matters: The MD-CVAE approach offers a practical solution for improving recommendation accuracy and efficiency, especially in scenarios with data sparsity and frequent item updates, relevant to e-commerce and content platforms in the Middle East.

Hackers and the Internet of Things

KAUST ·

Cybersecurity specialist James Lyne spoke at KAUST's 2018 Winter Enrichment Program (WEP) about cybersecurity threats and techniques. Lyne demonstrated hacking and phishing attacks, emphasizing how hackers can exploit personal information by bypassing basic security measures. He highlighted the increasing sophistication of cybercriminals and the existence of illicit marketplaces on the dark web where hacking applications are sold. Why it matters: Raising awareness of cybersecurity threats is crucial for protecting individuals and organizations in Saudi Arabia and the broader region as digital infrastructure expands.