نتایج جستجو برای: modeling users behavior
تعداد نتایج: 1155635 فیلتر نتایج به سال:
Money-Laundering causes a higher prevalence of crime and reduces the desire tending to invest in productive activities. Also, it leads to weaken the integrity of financial markets and decrease government control over economic policy. Banks are able to prevent theft, fraud, money laundering conducted by customers through identification of their clients’ behavioral characteristics. This leads to ...
In this work, we aim at building a bridge from poor behavioral data to an effective, quick-response, and robust behavior model for online identity theft detection. We concentrate on this issue in online social networks (OSNs) where users usually have composite behavioral records, consisting of multi-dimensional low-quality data, e.g., offline check-ins and online user generated content (UGC). A...
Participatory medicine and e-health help to promote health literacy among non-medical professionals. Users of systems actively participate in a patient social network system (PSNS) share information experiences with other users similar conditions. Users’ activities provide valuable healthcare resources develop effective participatory between patients, caregivers, medical This study aims investi...
As more people use the Web to gather information, communicate, work, and otherwise have fun, learning user pro les of Web browsing behavior can help personalize search results and identify persons of interest. Learning individual user pro les from Web browsing behavior also has applications in cybersecurity as a continuous soft biometric technique to verify a user's claim of identity, in online...
A masquerade attack is a consequence of identity theft. In such attacks, the impostor impersonates a legitimate insider while performing illegitimate activities. These attacks are very hard to detect and can cause considerable damage to an organization. Prior work has focused on user command modeling to identify abnormal behavior indicative of impersonation. In this paper, we investigate the pe...
The GM-MDS conjecture of Dau et al. (ISIT 2014) speculates that the MDS condition, which guarantees the existence of MDS matrices with a prescribed set of zeros over large fields, is in fact sufficient for existence of such matrices over small fields. We prove this conjecture.
background increasing evidence indicates that opiate users and methadone maintenance patients (mmps) are impaired in executive control tasks and response inhibition behavior compared to healthy individuals; however, the cognitive functional difference between opiate addicts and mmps has not been clarified. objectives this study employed go/no-go tasks to evaluate the response inhibition behavio...
We consider a slotted-ALOHA LAN with loss-averse, noncooperative greedy users. To avoid non-Pareto equilibria, particularly deadlock, we assume probabilistic loss-averse behavior. This behavior is modeled as a modulated white noise term, in addition to the greedy term, creating a diffusion process modeling the game. We observe that when player’s modulate with their throughput, a more efficient ...
Ubiquitous robots need user modeling for providing personalized services. With a user model, ubiquitous robots can build more accurate context model, therefore, we provide appropriate services to users based on the context model. In this paper, we propose a context model with ontology based on conceptual dependency. This model is supposed to be used for modeling observed user behaviors. In orde...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید