Skip to main content

Showing 1–5 of 5 results for author: Soldo, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.12327  [pdf, other

    cs.IR cs.LG

    Beyond Item Dissimilarities: Diversifying by Intent in Recommender Systems

    Authors: Yuyan Wang, Cheenar Banerjee, Samer Chucri, Fabio Soldo, Sriraj Badam, Ed H. Chi, Minmin Chen

    Abstract: Recommender systems that overly focus on short-term engagement prevents users from exploring diverse interests. To tackle this challenge, numerous diversification algorithms have been proposed. These algorithms typically rely on measures of item similarity, aiming to maximize the dissimilarity across items in the final set of recommendations. In this work, we demonstrate the benefits of going beyo… ▽ More

    Submitted 9 August, 2024; v1 submitted 20 May, 2024; originally announced May 2024.

  2. arXiv:2305.15498  [pdf, other

    cs.CL cs.AI cs.IR

    Large Language Models for User Interest Journeys

    Authors: Konstantina Christakopoulou, Alberto Lalama, Cj Adams, Iris Qu, Yifat Amir, Samer Chucri, Pierce Vollucci, Fabio Soldo, Dina Bseiso, Sarah Scodel, Lucas Dixon, Ed H. Chi, Minmin Chen

    Abstract: Large language models (LLMs) have shown impressive capabilities in natural language understanding and generation. Their potential for deeper user understanding and improved personalized user experience on recommendation platforms is, however, largely untapped. This paper aims to address this gap. Recommender systems today capture users' interests through encoding their historical activities on the… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

  3. arXiv:1006.1165  [pdf, ps, other

    cs.NI

    Optimal Source-Based Filtering of Malicious Traffic

    Authors: Fabio Soldo, Katerina Argyraki, Athina Markopoulou

    Abstract: In this paper, we consider the problem of blocking malicious traffic on the Internet, via source-based filtering. In particular, we consider filtering via access control lists (ACLs): these are already available at the routers today but are a scarce resource because they are stored in the expensive ternary content addressable memory (TCAM). Aggregation (by filtering source prefixes instead of indi… ▽ More

    Submitted 6 June, 2010; originally announced June 2010.

    Comments: Conference version appeared in Infocom 2009. Journal version submitted to ToN

  4. arXiv:0908.2007  [pdf, other

    cs.NI

    Predictive Blacklisting as an Implicit Recommendation System

    Authors: Fabio Soldo, Anh Le, Athina Markopoulou

    Abstract: A widely used defense practice against malicious traffic on the Internet is through blacklists: lists of prolific attack sources are compiled and shared. The goal of blacklists is to predict and block future attack sources. Existing blacklisting techniques have focused on the most prolific attack sources and, more recently, on collaborative blacklisting. In this paper, we formulate the problem o… ▽ More

    Submitted 13 August, 2009; originally announced August 2009.

    Comments: Comments: 11 pages; Submitted to INFOCOM 2010

  5. arXiv:0811.3828  [pdf, other

    cs.NI

    Optimal Filtering of Malicious IP Sources

    Authors: Fabio Soldo, Athina Markopoulou, Katerina Argyraki

    Abstract: How can we protect the network infrastructure from malicious traffic, such as scanning, malicious code propagation, and distributed denial-of-service (DDoS) attacks? One mechanism for blocking malicious traffic is filtering: access control lists (ACLs) can selectively block traffic based on fields of the IP header. Filters (ACLs) are already available in the routers today but are a scarce resour… ▽ More

    Submitted 24 November, 2008; originally announced November 2008.

    Comments: submitted to Infocom 09