Sciweavers

57 search results - page 11 / 12
» User Behavior Analysis of the Open-Ended Document Classifica...
Sort
View
ISI
2006
Springer
13 years 5 months ago
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics
In the paper we combine a Bayesian Network model for encoding forensic evidence during a given time interval with a Hidden Markov Model (EBN-HMM) for tracking and predicting the de...
Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tib&...
SIGDOC
2003
ACM
13 years 10 months ago
Alternative methods for field usability research
Field usability research involves observing people in their own environments—for example, workplaces, homes, and schools—to learn their normal or natural behavior. Through fie...
Laurie Kantner, Deborah Hinderer Sova, Stephanie R...
PLDI
2009
ACM
14 years 6 months ago
Automatic generation of library bindings using static analysis
High-level languages are growing in popularity. However, decades of C software development have produced large libraries of fast, timetested, meritorious code that are impractical...
Tristan Ravitch, Steve Jackson, Eric Aderhold, Ben...
CCS
2004
ACM
13 years 10 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
KDD
2001
ACM
231views Data Mining» more  KDD 2001»
14 years 5 months ago
A Framework for Efficient and Anonymous Web Usage Mining Based on Client-Side Tracking
Web Usage Mining (WUM), a natural application of data mining techniques to the data collected from user interactions with the web, has greatly concerned both academia and industry ...
Cyrus Shahabi, Farnoush Banaei Kashani