Sciweavers

88 search results - page 17 / 18
» On Mining Group Patterns of Mobile Users
Sort
View
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
14 years 1 days ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communities...
Karine Barzilai-Nahon
SDM
2012
SIAM
281views Data Mining» more  SDM 2012»
11 years 8 months ago
Contextual Collaborative Filtering via Hierarchical Matrix Factorization
Matrix factorization (MF) has been demonstrated to be one of the most competitive techniques for collaborative filtering. However, state-of-the-art MFs do not consider contextual...
ErHeng Zhong, Wei Fan, Qiang Yang
MOBISYS
2011
ACM
12 years 8 months ago
AccuLoc: practical localization of performance measurements in 3G networks
Operators of 3G data networks need to distinguish the performance of each geographic area in their 3G networks to detect and resolve local network problems. This is because the qu...
Qiang Xu, Alexandre Gerber, Zhuoqing Morley Mao, J...
IUI
2010
ACM
14 years 2 months ago
Evaluating the design of inclusive interfaces by simulation
We have developed a simulator to help with the design and evaluation of assistive interfaces. The simulator can predict possible interaction patterns when undertaking a task using...
Pradipta Biswas, Peter Robinson
ISMIS
2005
Springer
13 years 11 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni