Modeling User Behaviors to Enable Context-Aware Proactive Decision Support
暂无分享,去创建一个
Joseph T. Coyne | Ira S. Moskowitz | Mark A. Livingston | Ranjeev Mittu | Ciara Sibley | Stephen Russell | I. S. Moskowitz | Jonathan W. Decker | Myriam Abramson | Antonio Gilliam | Benjamin Newsom | Eric Leadbetter | Ciara M. Sibley | M. Abramson | R. Mittu | M. Livingston | S. Russell | Eric Leadbetter | Benjamin Newsom | A. Gilliam
[1] Mark James Neal,et al. Meta-stable Memory in an Artificial Immune Network , 2003, ICARIS.
[2] Kevin W Williams,et al. A Summary of Unmanned Aircraft Accident/Incident Data: Human Factors Implications , 2004 .
[3] H. Aarts,et al. Habits as knowledge structures: Automaticity in goal-directed behavior , 2000 .
[4] Yoshua Bengio,et al. Random Search for Hyper-Parameter Optimization , 2012, J. Mach. Learn. Res..
[5] Le Gruenwald,et al. A survey of data mining and knowledge discovery software tools , 1999, SKDD.
[6] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[7] S. M. Bellovin,et al. Security problems in the TCP/IP protocol suite , 1989, CCRV.
[8] Srinivasan Seshan,et al. 802.11 user fingerprinting , 2007, MobiCom '07.
[9] Raja Parasuraman,et al. Humans and Automation: Use, Misuse, Disuse, Abuse , 1997, Hum. Factors.
[10] Andreas S. Rath,et al. UICO: an ontology-based user interaction context model for automatic task detection on the computer desktop , 2009, CIAO '09.
[11] Ramesh Jain,et al. Toward a Common Event Model for Multimedia Applications , 2007, IEEE MultiMedia.
[12] Ariel Stolerman,et al. Keyboard-Behavior-Based Authentication , 2013, IT Professional.
[13] Chris North,et al. Semantic Interaction for Sensemaking: Inferring Analytical Reasoning for Model Steering , 2012, IEEE Transactions on Visualization and Computer Graphics.
[14] Yin Pan,et al. Towards a web tracking profiling algorithm , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).
[15] Yo-Sub Han,et al. A movie recommendation algorithm based on genre correlations , 2012, Expert Syst. Appl..
[16] Licia Capra,et al. Continuous hyperparameter optimization for large-scale recommender systems , 2013, 2013 IEEE International Conference on Big Data.
[17] Nick S. Ryan,et al. Immune Inspired Context Memory , 2005 .
[18] Filip Radlinski,et al. Inferring query intent from reformulations and clicks , 2010, WWW '10.
[19] Oren Etzioni,et al. Open Information Extraction from the Web , 2007, CACM.
[20] Francesco Ricci,et al. Improving recommender systems with adaptive conversational strategies , 2009, HT '09.
[21] Jonathan L. Herlocker,et al. Evaluating collaborative filtering recommender systems , 2004, TOIS.
[22] Herbert A. Simon,et al. The new science of management decision , 1960 .
[23] A. K. Blangsted,et al. The effect of mental stress on heart rate variability and blood pressure during computer work , 2004, European Journal of Applied Physiology.
[24] Ramesh C. Jain,et al. EventWeb: Developing a Human-Centered Computing System , 2008, Computer.
[25] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[26] Nick S. Ryan,et al. Capturing Regular Human Activity through a Learning Context Memory , 2006 .
[27] A. Tversky,et al. On the psychology of prediction , 1973 .
[28] James A. Hendler,et al. Web 3.0 Emerging , 2009, Computer.
[29] Joseph T. Coyne,et al. Pupil Dilation as an Index of Learning , 2011 .
[30] Mark A. Livingston,et al. Evaluation of Multivariate Visualization on a Multivariate Task , 2012, IEEE Transactions on Visualization and Computer Graphics.
[31] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[32] Georgios Paliouras,et al. Using Machine Learning to Maintain Rule-based Named-Entity Recognition and Classification Systems , 2001, ACL.
[33] I. S. Moskowitz,et al. Covert channels-here to stay? , 1994, Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance.
[34] Raj M. Ratwani,et al. Single operator, multiple robots: an eye movement based theoretic model of operator situation awareness , 2010, HRI 2010.
[35] Oren Etzioni,et al. Identifying Relations for Open Information Extraction , 2011, EMNLP.
[36] Park Jinkyun,et al. A Study on the Revision of the TACOM Measure , 2007, IEEE Transactions on Nuclear Science.
[37] Markus Jakobsson,et al. Implicit Authentication through Learning User Behavior , 2010, ISC.
[38] S. Plano,et al. Proactive decision fusion for site security , 2005, 2005 7th International Conference on Information Fusion.
[39] David W. Aha,et al. User Authentication from Web Browsing Behavior , 2013, FLAIRS.
[40] Andrew McCallum,et al. Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data , 2001, ICML.
[41] Myriam Abramson. Learning Temporal User Profiles of Web Browsing Behavior , 2014 .
[42] Dietmar Jannach,et al. Preface to the special issue on context-aware recommender systems , 2013, User Modeling and User-Adapted Interaction.
[43] Raj M. Ratwani,et al. Predicting postcompletion errors using eye movements , 2008, CHI.
[44] Ira S. Moskowitz,et al. A new paradigm hidden in steganography , 2001, NSPW '00.
[45] Lokendra Shastri,et al. Activity Context Aware Digital Workspaces and Consumer Playspaces: Manifesto and Architecture , 2012, AAAI 2012.