Sciweavers

380 search results - page 62 / 76
» Trajectory Based Behavior Analysis for User Verification
Sort
View
ACSAC
2010
IEEE
14 years 9 months ago
Detecting spammers on social networks
Social networking has become a popular way for users to meet and interact online. Users spend a significant amount of time on popular social network platforms (such as Facebook, M...
Gianluca Stringhini, Christopher Kruegel, Giovanni...
IRI
2008
IEEE
15 years 6 months ago
FACT: A fusion architecture with contract templates for semantic and syntactic integration
Linking components with end-user requests for processing is problematic when there are fundamental language differences between component specifications and how individual users s...
Rose F. Gamble, Robert Baird, Leigh Flagg, Melody ...
IJCAI
1997
15 years 1 months ago
Machine Learning Techniques to Make Computers Easier to Use
Identifying user-dependent information that can be automatically collected helps build a user model by which 1) to predict what the user wants to do next and 2) to do relevant pre...
Hiroshi Motoda, Kenichi Yoshida
CATA
2003
15 years 1 months ago
A Restaurant Finder using Belief-Desire-Intention Agent Model and Java Technology
It is becoming more important to design systems capable of performing high-level management and control tasks in interactive dynamic environments. At the same time, it is difficul...
Dongqing Lin, Thomas P. Wiggen, Chang-Hyun Jo
SIGCOMM
2006
ACM
15 years 5 months ago
Planet scale software updates
Fast and effective distribution of software updates (a.k.a. patches) to millions of Internet users has evolved into a critical task over the last years. In this paper, we characte...
Christos Gkantsidis, Thomas Karagiannis, Milan Voj...