Sciweavers

100 search results - page 8 / 20
» Mining specifications of malicious behavior
Sort
View
IJCAI
2003
13 years 9 months ago
IKUM: An Integrated Web Personalization Platform Based on Content Structures and User Behavior
Web personalization is the process of customizing a web site to the needs of each specific user or set of users, taking advantage of the knowledge acquired through the analysis of ...
Magdalini Eirinaki, Joannis Vlachakis, Sarabjot S....
KDD
2009
ACM
210views Data Mining» more  KDD 2009»
14 years 8 months ago
Large-scale behavioral targeting
Behavioral targeting (BT) leverages historical user behavior to select the ads most relevant to users to display. The state-of-the-art of BT derives a linear Poisson regression mo...
Ye Chen, Dmitry Pavlov, John F. Canny
HICSS
2011
IEEE
261views Biometrics» more  HICSS 2011»
12 years 11 months ago
Improved Patient Outcomes through Collaborative Monitoring and Management of Subtle Behavioral and Physiological Health Changes
This paper describes a highly mobile collaborative patient-centric, self-monitoring, symptom recognition and self intervention system along with a complementary clinical nursing t...
Paul J. Fortier, Brendon Puntin, Osama Aljaroudi
KDD
2005
ACM
192views Data Mining» more  KDD 2005»
14 years 8 months ago
Modeling and predicting personal information dissemination behavior
In this paper, we propose a new way to automatically model and predict human behavior of receiving and disseminating information by analyzing the contact and content of personal c...
Xiaodan Song, Ching-Yung Lin, Belle L. Tseng, Ming...
SIGKDD
2008
159views more  SIGKDD 2008»
13 years 7 months ago
Data mining with cellular automata
A cellular automaton is a discrete, dynamical system composed of very simple, uniformly interconnected cells. Cellular automata may be seen as an extreme form of simple, localized...
Tom Fawcett