Sciweavers

120 search results - page 8 / 24
» Implicit Authentication through Learning User Behavior
Sort
View
92
Voted
IICAI
2007
14 years 11 months ago
Modeling Temporal Behavior via Structured Hidden Markov Models: an Application to Keystroking Dynamics
Structured Hidden Markov Models (S-HMM) are a variant of Hierarchical Hidden Markov Models; it provides an abstraction mechanism allowing a high level symbolic description of the k...
Ugo Galassi, Attilio Giordana, Charbel Julien, Lor...
DMIN
2007
183views Data Mining» more  DMIN 2007»
14 years 11 months ago
Crawling Attacks Against Web-based Recommender Systems
—User profiles derived from Web navigation data are used in important e-commerce applications such as Web personalization, recommender systems, and Web analytics. In the open en...
Runa Bhaumik, Robin D. Burke, Bamshad Mobasher
HCI
2009
14 years 7 months ago
User Centered Design of a Learning Object Repository
This work outlines the design process of a user centered learning object repository. A repository should foster the development and acquisition of both generic and specific informa...
Núria Ferran, Ana-Elena Guerrero-Rold&aacut...
141
Voted
CAISE
2011
Springer
14 years 1 months ago
Supporting Dynamic, People-Driven Processes through Self-learning of Message Flows
Abstract. Flexibility and automatic learning are key aspects to support users in dynamic business environments such as value chains across SMEs or when organizing a large event. Pr...
Christoph Dorn, Schahram Dustdar
KBS
2007
103views more  KBS 2007»
14 years 9 months ago
Eye-tracking for user modeling in exploratory learning environments: An empirical evaluation
In this paper, we describe research on using eye-tracking data for on-line assessment of user meta-cognitive behavior during interaction with an environment for exploration-based ...
Cristina Conati, Christina Merten