Sciweavers

2940 search results - page 65 / 588
» Behavioral Constraints for Services
Sort
View
HCI
2007
13 years 11 months ago
A Three-Level Approach for Analyzing User Behavior in Ongoing Relationships
This paper describes a hybrid methodology to study users in ongoing relationships based on three levels of user data analysis. Most user-centered design methods are ideal for the a...
Enric Mor, Muriel Garreta Domingo, Julià Mi...
JUCS
2007
112views more  JUCS 2007»
13 years 10 months ago
Internet Path Behavior Prediction via Data Mining: Conceptual Framework and Case Study
: In this paper we propose an application of data mining methods in the prediction of the availability and performance of Internet paths. We deploy a general decision-making method...
Leszek Borzemski
AAAI
2007
14 years 18 days ago
Analyzing Reading Behavior by Blog Mining
This paper presents a study of the various aspects of blog reading behavior. The analyzed data are obtained from a Japanese weblog hosting service, Doblog. Four kinds of social ne...
Tadanobu Furukawa, Mitsuru Ishizuka, Yutaka Matsuo...
NETWORK
2008
94views more  NETWORK 2008»
13 years 10 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo
AICCSA
2006
IEEE
117views Hardware» more  AICCSA 2006»
14 years 2 months ago
An Architecture for a Context-aware Service Broker in Ubiquitous Computing Environments
Abstract-- In ubiquitous computing environments, many devices and agents interoperate with each other and use services provided by others. But the problem is that there may be requ...
Yasser Ganjisaffar, Hassan Abolhassani, Rasool Jal...