Sciweavers

13224 search results - page 35 / 2645
» Self-monitoring for Computer Users
Sort
View
WWW
2009
ACM
14 years 10 months ago
Computers and iphones and mobile phones, oh my!: a logs-based comparison of search users on different devices
We present a logs-based comparison of search patterns across three platforms: computers, iPhones and conventional mobile phones. Our goal is to understand how mobile search users ...
Maryam Kamvar, Melanie Kellar, Rajan Patel, Ya Xu
COMSWARE
2007
IEEE
14 years 4 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
KES
2005
Springer
14 years 3 months ago
User Preference Learning for Multimedia Personalization in Pervasive Computing Environment
Pervasive computing environment and users’ demand for multimedia personalization precipitate a need for personalization tools to help people access desired multimedia content at ...
Zhiwen Yu, Daqing Zhang, Xingshe Zhou, Changde Li
CASES
2003
ACM
14 years 2 months ago
Graphical user interface energy characterization for handheld computers
A significant fraction of the software and resource usage of a modern handheld computer is devoted to its graphical user interface (GUI). Moreover, GUIs are direct users of the d...
Lin Zhong, Niraj K. Jha
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
14 years 1 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley