نتایج جستجو برای: modeling users behavior

تعداد نتایج: 1155635  

Money-Laundering causes a higher prevalence of crime and reduces the desire tending to invest in productive activities. Also, it leads to weaken the integrity of financial markets and decrease government control over economic policy. Banks are able to prevent theft, fraud, money laundering conducted by customers through identification of their clients’ behavioral characteristics. This leads to ...

Journal: :CoRR 2018
Cheng Wang Bo Yang

In this work, we aim at building a bridge from poor behavioral data to an effective, quick-response, and robust behavior model for online identity theft detection. We concentrate on this issue in online social networks (OSNs) where users usually have composite behavioral records, consisting of multi-dimensional low-quality data, e.g., offline check-ins and online user generated content (UGC). A...

Journal: :Informatics (Basel) 2021

Participatory medicine and e-health help to promote health literacy among non-medical professionals. Users of systems actively participate in a patient social network system (PSNS) share information experiences with other users similar conditions. Users’ activities provide valuable healthcare resources develop effective participatory between patients, caregivers, medical This study aims investi...

2014
Myriam Abramson

As more people use the Web to gather information, communicate, work, and otherwise have fun, learning user pro les of Web browsing behavior can help personalize search results and identify persons of interest. Learning individual user pro les from Web browsing behavior also has applications in cybersecurity as a continuous soft biometric technique to verify a user's claim of identity, in online...

Journal: :JoWUA 2010
Malek Ben Salem Salvatore J. Stolfo

A masquerade attack is a consequence of identity theft. In such attacks, the impostor impersonates a legitimate insider while performing illegitimate activities. These attacks are very hard to detect and can cause considerable damage to an organization. Prior work has focused on user command modeling to identify abnormal behavior indicative of impersonation. In this paper, we investigate the pe...

2018
Shachar Lovett

The GM-MDS conjecture of Dau et al. (ISIT 2014) speculates that the MDS condition, which guarantees the existence of MDS matrices with a prescribed set of zeros over large fields, is in fact sufficient for existence of such matrices over small fields. We prove this conjecture.

Journal: :international journal of high risk behaviors and addiction 0
mehrnaz rezvanfard neurocognitive laboratory of iranian national center for addiction studies (incas), tehran university for medical sciences, tehran, ir iran; rah-e-roshan addiction treatment center, karaj, ir iran alireza noroozi neurocognitive laboratory of iranian national center for addiction studies (incas), tehran university for medical sciences, tehran, ir iran mehrshad golesorkhi translational neuroscience program, institute for cognitive science studies, tehran, ir iran; neuroimaging and analysis group, research center for molecular and cellular imaging, tehran university for medical sciences, tehran, ir iran ensieh ghassemian translational neuroscience program, institute for cognitive science studies, tehran, ir iran aiden nasiri eghbali rah-e-roshan addiction treatment center, karaj, ir iran azarakhsh mokri neurocognitive laboratory of iranian national center for addiction studies (incas), tehran university for medical sciences, tehran, ir iran

background increasing evidence indicates that opiate users and methadone maintenance patients (mmps) are impaired in executive control tasks and response inhibition behavior compared to healthy individuals; however, the cognitive functional difference between opiate addicts and mmps has not been clarified. objectives this study employed go/no-go tasks to evaluate the response inhibition behavio...

2012
George Kesidis Youngmi Jin

We consider a slotted-ALOHA LAN with loss-averse, noncooperative greedy users. To avoid non-Pareto equilibria, particularly deadlock, we assume probabilistic loss-averse behavior. This behavior is modeled as a modulated white noise term, in addition to the greedy term, creating a diffusion process modeling the game. We observe that when player’s modulate with their throughput, a more efficient ...

2006
Jung Hwa Choi Hong Suh Young Tack Park

Ubiquitous robots need user modeling for providing personalized services. With a user model, ubiquitous robots can build more accurate context model, therefore, we provide appropriate services to users based on the context model. In this paper, we propose a context model with ontology based on conceptual dependency. This model is supposed to be used for modeling observed user behaviors. In orde...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید