Sciweavers

415 search results - page 11 / 83
» Identifying web spam with user behavior analysis
Sort
View
ICASSP
2011
IEEE
13 years 9 days ago
Bayesian topic models for describing computer network behaviors
We consider the use of Bayesian topic models in the analysis of computer network traffic. Our approach utilizes latent Dirichlet allocation and time-varying dynamic latent Dirich...
Christopher Cramer, Lawrence Carin
ICALT
2009
IEEE
13 years 6 months ago
Eye-Tracking Users' Behavior in Relation to Cognitive Style within an E-learning Environment
Eye-tracking measurements may be used as a method of identifying users' actual behavior in a hypermedia setting. In this research, an eye-tracking experiment was conducted in...
Nikos Tsianos, Panagiotis Germanakos, Zacharias Le...
IPM
2000
69views more  IPM 2000»
13 years 8 months ago
Real life, real users, and real needs: a study and analysis of user queries on the web
We analyzed transaction logs containing 51,473 queries posed by 18,113 users of Excite, a major Internet search service. We provide data on: (i) sessions - changes in queries durin...
Bernard J. Jansen, Amanda Spink, Tefko Saracevic
SEC
2007
13 years 10 months ago
Trust Evaluation for Web Applications based on Behavioral Analysis
This paper deals with a joint use of a trust evaluation approach and access control mechanisms for improving security in Web-usage. Trust evaluation is achieved by means of both be...
Luiz Fernando Rust C. Carmo, Breno G. de Oliveira,...
CHI
2003
ACM
14 years 9 months ago
Repairing usability problems identified by the cognitive walkthrough for the web
Methods for identifying usability problems in web page designs should ideally also provide practical methods for repairing the problems found. Blackmon et al. [2] proved the usefu...
Marilyn Hughes Blackmon, Muneo Kitajima, Peter G. ...