Search results
Jump to navigation
Jump to search
- ...A 2017 : IEEE International Conference on Identity, Security and Behavior Analysis |Field=biometrics, security, pattern recognition, behavior analysis441 bytes (53 words) - 13:28, 17 February 2021
- | Title = AAAI Spring 2009 Symposium on Human Behavior Modeling The '''AAAI 2009 Spring Symposium on Human Behavior Modeling''' will explore2 KB (204 words) - 11:52, 17 February 2021
- • Intrusion and cybersecurity threat detection and analysis<br> • Crime analysis and prevention<br>4 KB (429 words) - 13:49, 17 February 2021
- *Intrusion and cybersecurity threat detection and analysis<br> *Crime analysis and prevention<br>5 KB (575 words) - 13:50, 17 February 2021
- ...ithm design and analysis, economic implications, and in-depth experimental analysis of accuracy and performance. * Query analysis and query processing4 KB (508 words) - 14:03, 17 February 2021
- * Security analysis * Malware analysis3 KB (343 words) - 14:02, 17 February 2021
- ...ibutions addressing the challenges of large-scale search and user behavior analysis are especially welcome.''780 bytes (97 words) - 13:55, 17 February 2021
- ...ithm design and analysis, economic implications, and in-depth experimental analysis of accuracy and performance. * Query analysis and query processing4 KB (534 words) - 14:03, 17 February 2021
- behavior incorporating data mining and/or expert knowledge from behavioral sciences. Data analysis results extracted from clean data of laboratory3 KB (438 words) - 13:41, 17 February 2021
- ...and defense methods ▪ Big data and large scale methods ▪ Biomedical image analysis ▪ Biometrics, face, gesture, body pose ▪ Computational photography, pho946 bytes (113 words) - 14:14, 17 February 2021
- ⑵ Strategic Management Tools and Application Analysis 2.Marketing⑴ Marketing Models and Case Analysis2 KB (192 words) - 13:08, 17 February 2021
- ...017 : IET Intelligent Transport Systems, Special Issue on Big Traffic Data Analysis and Mining SPECIAL ISSUE ON: Big Traffic Data Analysis and Mining3 KB (374 words) - 13:41, 17 February 2021
- ...ties. Social computing facilitates behavioral modeling in model building, analysis, pattern mining, and prediction. Numerous interdisciplinary and interdepend * Social network analysis and mining4 KB (511 words) - 12:34, 17 February 2021
- ...ommunities; Microblogs; Influence for celebrities on microblogs; Sentiment analysis in the blogosphere; Data-mining twitter; Detection of persistent topics; At ...Detecting malicious clients; Trust patterns in ego networks; Cyberbullying behavior; Online anti-opinion spam; Detecting deception; Tracking in Twitter; Models9 KB (1,068 words) - 14:07, 17 February 2021
- * Intrusion detection, detection of malicious behavior * Anonymity, prevention of traffic analysis2 KB (291 words) - 12:39, 17 February 2021
- grams, services and, even, network behavior. This connection be- tween content and the user is made via (1) Semantic Analysis,4 KB (570 words) - 13:23, 17 February 2021
- understanding and analysis of existing workloads. Whether they are PDAs, * Characterization of OS, Virtual Machine, middleware and library behavior4 KB (589 words) - 13:03, 17 February 2021
- * Analysis of neurophysiological and neuroanatomical data * Models of conditioning, reward and behavior5 KB (574 words) - 13:54, 17 February 2021
- Co-sponsorship with International Network of Social Network Analysis (INSNA) ...cience, economics, business, human-coupled complex systems, human factors, behavior modeling, neural science, linguistics, security, criminal intelligence, hea6 KB (728 words) - 13:16, 17 February 2021
- Large Network Analysis - methods, algorithms, processes, analytic tools • Social Network Analysis of Terrorist Networks4 KB (442 words) - 13:41, 17 February 2021