نتایج جستجو برای: user behavior
تعداد نتایج: 842010 فیلتر نتایج به سال:
<span lang="EN-US">Mental health disorders affect many aspects of patient’s lives, including emotions, cognition, and especially behaviors. E-health technology helps to collect information wealth in a non-invasive manner, which represents promising opportunity construct behavior markers. Combining such user data can provide more comprehensive contextual view than questionnaire data. Due b...
The COVID-19 has brought us unprecedented difficulties and thousands of companies have closed down. general public responded to call the government stay at home. Offline retail stores been severely affected. Therefore, in order transform a traditional offline sales model B2C improve shopping experience, this study aims utilize historical data for exploring, building prediction recommendation mo...
We focus on developing an account of user behavior under error conditions, working with annotated data from real human-machine mixed initiative dialogs. In particular, we examine categories of error perception, user behavior under error, effect of user strategies on error recovery, and the role of user initiative in error situations. A conditional probability model smoothed by weighted ASR erro...
Identifying users frequent behaviors is considered as a key step to achieve real intelligent environments that support people in their daily lives. These patterns can be used in many different applications. An algorithm that compares current behaviors of the users with previously discovered frequent behaviors and detects shifts has been developed. In addition, it identifies the differences betw...
As anticipated in True Names by Vernor Vinge, identity has been recognized as our most valued possession in cyberspace. Attribution is a key concept in enabling trusted identities and deterring malicious activities. As more people use the Web to communicate, work, and otherwise have fun, is it possible to uniquely identify someone based on their Web browsing behavior or to differentiate between...
We study user behavior during the stage of the book selection process in which people study the content of a book to decide whether it will be useful for their intended purpose. 24 undergraduates participated in a balanced study in which they were given a topic-book pair and asked to decide whether the book was useful for the topic; we report on the accuracy of the participants’ decisions, the ...
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a general approach for user verification based on user trajectory inputs. The approach is labor-free for users and is likely to avoid the possible copy or simulation from other non-authorized users or even automatic progra...
Masquerade attacks are a common security problem that is a consequence of identity theft. Masquerade detection may serve as a means of building more secure and dependable systems that authenticate legitimate users by their behavior. Prior work has focused on user command modeling to identify abnormal behavior indicative of impersonation. This paper extends prior work by modeling user search beh...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید