نتایج جستجو برای: user behavior

تعداد نتایج: 842010  

2001
Ricardo A. Baeza-Yates Carlos Castillo

2009
Gaurav Tandon Philip K. Chan

Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal anomaly detection using smoothing technique for sparse data. Our technique builds up on the Markov chain, and clustering is presented for reduced storage requirements. Wireless networks suffer from oscillations between lo...

2017
Jieqing Ai Jinpeng Chen Chengdong Liang Liang Chen

In order to protect vital data in today’s internet environment and prevent misuse, especially insider abuse by valid users, we propose a novel two-step detecting approach to distinguish potential misuse behaviour (namely anomalous user behaviour) from normal behaviour. First, we capture the access patterns of users by using association rules. Then, based on the patterns and users’ sequential be...

2009
Vibhanshu Abhishek Peter S. Fader Kartik Hosanagar

There has been significant recent interest in studying consumer behavior in sponsored search environments. Sponsored search is the fastest growing form of advertising on the Internet. A number of factors have contributed to this growth. The ads tend to be highly targeted and offer a higher return on investment for advertisers compared to other marketing methods. In addition the large audience i...

Journal: :CoRR 2014
Justin Cheng Cristian Danescu-Niculescu-Mizil Jure Leskovec

Social media systems rely on user feedback and rating mechanisms for personalization, ranking, and content filtering. However, when users evaluate content contributed by fellow users (e.g., by liking a post or voting on a comment), these evaluations create complex social feedback effects. This paper investigates how ratings on a piece of content affect its author’s future behavior. By studying ...

2007
Yoshitaka Takahashi

Traffic generation in mobile networks is heavily dependent on user behavior because the users move around with their terminals. For example, at a special event such as a fireworks display or football game, the people will congregate in a specific place and may try to make calls, generating unpredictable excessive traffic, leading to network congestion. When the users cannot get through due to c...

2006
Paul-Alexandru Chirita Wolfgang Nejdl

Existing desktop search applications, trying to keep up with the rapidly increasing storage capacities of our hard disks, are an important step towards more efficient personal information management, yet they offer an incomplete solution. While their indexing functionalities in terms of different file types they are able to cope with are impressive, their ranking capabilities are basic, and rel...

2000
Helmut Hlavacs Gabriele Kotsis

* This work was performed in the BISANTE (Broadband Integrated Satellite Network Traffic Evaluations) Esprit project supported by the EC under research grant EP28425. See http://www.bisante.org ABSTRACT In this paper, a user-behavior oriented workload generator for OPNET is presented. In this novel approach, both packet generation and user interaction with applications and services that cause t...

2015
Senaka Buthpitiya Senaka W. Buthpitiya Anind K. Dey Ying Zhang

As ubiquitous computing (ubicomp) technologies reach maturity, smart phones and context-based services are gaining mainstream popularity. A smart phone accompanies its user throughout (nearly) all aspects of his life, becoming an indispensable assistant the busy user relies on to help navigate his life, using map applications to navigate the physical world, email and instant messaging applicati...

2011
Konstantin Pussep Sebastian Kaune

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید