Sciweavers

120 search results - page 8 / 24
» Implicit Authentication through Learning User Behavior
Sort
View
119
Voted
IICAI
2007
15 years 2 months ago
Modeling Temporal Behavior via Structured Hidden Markov Models: an Application to Keystroking Dynamics
Structured Hidden Markov Models (S-HMM) are a variant of Hierarchical Hidden Markov Models; it provides an abstraction mechanism allowing a high level symbolic description of the k...
Ugo Galassi, Attilio Giordana, Charbel Julien, Lor...
102
Voted
DMIN
2007
183views Data Mining» more  DMIN 2007»
15 years 2 months ago
Crawling Attacks Against Web-based Recommender Systems
—User profiles derived from Web navigation data are used in important e-commerce applications such as Web personalization, recommender systems, and Web analytics. In the open en...
Runa Bhaumik, Robin D. Burke, Bamshad Mobasher
122
Voted
HCI
2009
14 years 11 months ago
User Centered Design of a Learning Object Repository
This work outlines the design process of a user centered learning object repository. A repository should foster the development and acquisition of both generic and specific informa...
Núria Ferran, Ana-Elena Guerrero-Rold&aacut...
179
Voted
CAISE
2011
Springer
14 years 4 months ago
Supporting Dynamic, People-Driven Processes through Self-learning of Message Flows
Abstract. Flexibility and automatic learning are key aspects to support users in dynamic business environments such as value chains across SMEs or when organizing a large event. Pr...
Christoph Dorn, Schahram Dustdar
80
Voted
KBS
2007
103views more  KBS 2007»
15 years 1 months ago
Eye-tracking for user modeling in exploratory learning environments: An empirical evaluation
In this paper, we describe research on using eye-tracking data for on-line assessment of user meta-cognitive behavior during interaction with an environment for exploration-based ...
Cristina Conati, Christina Merten