Sciweavers

15379 search results - page 125 / 3076
» Protecting users from
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
UM
2009
Springer
14 years 2 months ago
Modeling User Affect from Causes and Effects
We present a model of user affect to recognize multiple user emotions during interaction with an educational computer game. Our model deals with the high level of uncertainty invol...
Cristina Conati, Heather Maclaren
WISE
2010
Springer
13 years 5 months ago
From Keywords to Queries: Discovering the User's Intended Meaning
Abstract. Regarding web searches, users have become used to keywordbased search interfaces due to their ease of use. However, this implies a semantic gap between the user's in...
Carlos Bobed, Raquel Trillo, Eduardo Mena, Sergio ...
CNSR
2006
IEEE
107views Communications» more  CNSR 2006»
14 years 1 months ago
Modeling User Behaviors from FTP Server Logs
In this paper, a modeling toolkit is proposed for modeling user behavior from FTP server log files. This toolkit can develop analytical models from the data at hand with minimum a...
Yeming Hu, A. Nur Zincir-Heywood
CHI
2003
ACM
14 years 8 months ago
Predicting user satisfaction from subject satisfaction
In this paper, we describe work-in-progress in comparing user satisfaction ratings after user tests with ratings obtained following actual use of a digital music library software....
Margaret B. Swan, Mark Notess