Sciweavers

15379 search results - page 250 / 3076
» Protecting users from
Sort
View
WWW
2008
ACM
14 years 9 months ago
Determining user's interest in real time
Most of the search engine optimization techniques attempt to predict users interest by learning from the past information collected from different sources. But, a user's curr...
Sanasam Ranbir Singh, Hema A. Murthy, Timothy A. G...
DEXA
2004
Springer
140views Database» more  DEXA 2004»
14 years 1 months ago
Extracting User Behavior by Web Communities Technology on Global Web Logs
A lot of work has been done on extracting the model of web user behavior. Most of them target server-side logs that cannot track user behavior outside of the server. Recently, a no...
Shingo Otsuka, Masashi Toyoda, Jun Hirai, Masaru K...
UM
2010
Springer
13 years 6 months ago
User Modeling for Telecommunication Applications: Experiences and Practical Implications
Abstract. Telecommunication applications based on user modeling focus on extracting customer behavior and preferences from the information implicitly included in Call Detail Record...
Heath Hohwald, Enrique Frías-Martíne...
SIGMOD
2012
ACM
223views Database» more  SIGMOD 2012»
11 years 10 months ago
MaskIt: privately releasing user context streams for personalized mobile applications
The rise of smartphones equipped with various sensors has enabled personalization of various applications based on user contexts extracted from sensor readings. At the same time i...
Michaela Götz, Suman Nath, Johannes Gehrke
EUROSYS
2010
ACM
14 years 1 months ago
Defeating return-oriented rootkits with "Return-Less" kernels
Targeting the operating system (OS) kernels, kernel rootkits pose a formidable threat to computer systems and their users. Recent efforts have made significant progress in blocki...
Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace...