Sciweavers

380 search results - page 31 / 76
» Trajectory Based Behavior Analysis for User Verification
Sort
View
SIGMETRICS
2010
ACM
227views Hardware» more  SIGMETRICS 2010»
15 years 8 months ago
Characterizing and modeling user activity on smartphones: summary
In this paper, we present a comprehensive analysis of real smartphone usage during a 6-month study of real user activity on the Android G1 smartphone. Our goal is to study the hig...
Alex Shye, Benjamin Scholbrock, Gokhan Memik, Pete...
NDSS
2009
IEEE
15 years 10 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee
140
Voted
KDD
2005
ACM
180views Data Mining» more  KDD 2005»
15 years 9 months ago
Information retrieval based on collaborative filtering with latent interest semantic map
In this paper, we propose an information retrieval model called Latent Interest Semantic Map (LISM), which features retrieval composed of both Collaborative Filtering(CF) and Prob...
Noriaki Kawamae, Katsumi Takahashi
IJCV
2007
208views more  IJCV 2007»
15 years 3 months ago
Binet-Cauchy Kernels on Dynamical Systems and its Application to the Analysis of Dynamic Scenes
We derive a family of kernels on dynamical systems by applying the Binet-Cauchy theorem to trajectories of states. Our derivation provides a unifying framework for all kernels on d...
S. V. N. Vishwanathan, Alexander J. Smola, Ren&eac...
PERCOM
2009
ACM
15 years 10 months ago
An Empirical Analysis of Wi-Fi Activity in Three Urban Scenarios
—A better understanding of people’s daily behaviors with respect to the underlying wireless network is a crucial step toward Wi-Fi based pervasive networking. Existing analyses...
Thomas Claveirole, Mathias Boc, Marcelo Dias de Am...