نتایج جستجو برای: user behavior

تعداد نتایج: 842010  

Journal: :International Journal of Security and Its Applications 2014

Journal: :International Journal of Computer Applications 2017

Journal: :International Journal of Power Electronics and Drive Systems 2023

<span lang="EN-US">Mental health disorders affect many aspects of patient’s lives, including emotions, cognition, and especially behaviors. E-health technology helps to collect information wealth in a non-invasive manner, which represents promising opportunity construct behavior markers. Combining such user data can provide more comprehensive contextual view than questionnaire data. Due b...

Journal: :Computers, materials & continua 2022

The COVID-19 has brought us unprecedented difficulties and thousands of companies have closed down. general public responded to call the government stay at home. Offline retail stores been severely affected. Therefore, in order transform a traditional offline sales model B2C improve shopping experience, this study aims utilize historical data for exploring, building prediction recommendation mo...

2002
Jongho Shin Shrikanth Narayanan Laurie Ger

We focus on developing an account of user behavior under error conditions, working with annotated data from real human-machine mixed initiative dialogs. In particular, we examine categories of error perception, user behavior under error, effect of user strategies on error recovery, and the role of user initiative in error situations. A conditional probability model smoothed by weighted ASR erro...

2012
Asier Aztiria Golnaz Farhadi Hamid K. Aghajan

Identifying users frequent behaviors is considered as a key step to achieve real intelligent environments that support people in their daily lives. These patterns can be used in many different applications. An algorithm that compares current behaviors of the users with previously discovered frequent behaviors and detects shifts has been developed. In addition, it identifies the differences betw...

2013
Myriam Abramson David W. Aha

As anticipated in True Names by Vernor Vinge, identity has been recognized as our most valued possession in cyberspace. Attribution is a key concept in enabling trusted identities and deterring malicious activities. As more people use the Web to communicate, work, and otherwise have fun, is it possible to uniquely identify someone based on their Web browsing behavior or to differentiate between...

2006
Nina Wacholder Lu Liu Ying-Hsang Liu

We study user behavior during the stage of the book selection process in which people study the content of a book to decide whether it will be useful for their intended purpose. 24 undergraduates participated in a balanced study in which they were given a topic-book pair and asked to decide whether the book was useful for the topic; we report on the accuracy of the participants’ decisions, the ...

2010
Hsing-Kuo Kenneth Pao Hong-Yi Lin Kuan-Ta Chen Junaidillah Fadlil

Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a general approach for user verification based on user trajectory inputs. The approach is labor-free for users and is likely to avoid the possible copy or simulation from other non-authorized users or even automatic progra...

2011
Malek Ben Salem Salvatore J. Stolfo

Masquerade attacks are a common security problem that is a consequence of identity theft. Masquerade detection may serve as a means of building more secure and dependable systems that authenticate legitimate users by their behavior. Prior work has focused on user command modeling to identify abnormal behavior indicative of impersonation. This paper extends prior work by modeling user search beh...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید