Sciweavers

1712 search results - page 64 / 343
» Discovering user profiles
Sort
View
114
Voted
ICWSM
2010
15 years 6 months ago
Devils, Angels, and Robots: Tempting Destructive Users in Social Media
Social media sites derive their value by providing a popular and dependable community for participants to engage, share, and interact. This community value and related services li...
Kyumin Lee, Brian David Eoff, James Caverlee
HCI
2009
15 years 2 months ago
User Interface Adaptation of Web-Based Services on the Semantic Web
Abstract. The Web is constantly evolving into an unprecedented and continuously growing source of knowledge, information and services, potentially accessed at by anyone anytime, an...
Nikolaos Partarakis, Constantina Doulgeraki, Aster...
VL
2003
IEEE
139views Visual Languages» more  VL 2003»
15 years 10 months ago
Visualizing design patterns with a UML profile
In this paper, we present a UML profile which defines new stereotypes, tagged values and constraints for visualizing design patterns in UML diagrams. These new stereotypes and tag...
Jing Dong, Sheng Yang
161
Voted
ACSAC
2004
IEEE
15 years 8 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
ACSAC
2008
IEEE
15 years 6 months ago
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors
Anomaly Detection (AD) sensors compute behavior profiles to recognize malicious or anomalous activities. The behavior of a host is checked continuously by the AD sensor and an ale...
Vanessa Frías-Martínez, Salvatore J....