Sciweavers

380 search results - page 71 / 76
» Trajectory Based Behavior Analysis for User Verification
Sort
View
INFOCOM
2012
IEEE
12 years 12 months ago
Scaling social media applications into geo-distributed clouds
—Federation of geo-distributed cloud services is a trend in cloud computing which, by spanning multiple data centers at different geographical locations, can provide a cloud plat...
Yu Wu, Chuan Wu, Bo Li 0001, Linquan Zhang, Zongpe...
AI
2005
Springer
14 years 11 months ago
Integrating Web Content Clustering into Web Log Association Rule Mining
Abstract. One of the effects of the general Internet growth is an immense number of user accesses to WWW resources. These accesses are recorded in the web server log files, which...
Jiayun Guo, Vlado Keselj, Qigang Gao
SIGMOD
2009
ACM
476views Database» more  SIGMOD 2009»
15 years 4 months ago
MobileMiner: a real world case study of data mining in mobile communication
Mobile communication data analysis has been often used as a background application to motivate many data mining problems. However, very few data mining researchers have a chance t...
Tengjiao Wang, Bishan Yang, Jun Gao, Dongqing Yang...
92
Voted
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
15 years 10 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
86
Voted
UIST
2009
ACM
15 years 4 months ago
Using fNIRS brain sensing in realistic HCI settings: experiments and guidelines
Because functional near-infrared spectroscopy (fNIRS) eases many of the restrictions of other brain sensors, it has potential to open up new possibilities for HCI research. From o...
Erin Treacy Solovey, Audrey Girouard, Krysta Chaun...