Search results
Jump to navigation
Jump to search
- ...A 2017 : IEEE International Conference on Identity, Security and Behavior Analysis |Field=biometrics, security, pattern recognition, behavior analysis447 bytes (54 words) - 11:03, 8 March 2021
- | Title = AAAI Spring 2009 Symposium on Human Behavior Modeling The '''AAAI 2009 Spring Symposium on Human Behavior Modeling''' will explore2 KB (204 words) - 12:00, 28 January 2021
- • Intrusion and cybersecurity threat detection and analysis<br> • Crime analysis and prevention<br>4 KB (430 words) - 11:03, 8 March 2021
- *Intrusion and cybersecurity threat detection and analysis<br> *Crime analysis and prevention<br>5 KB (576 words) - 11:03, 8 March 2021
- ...ithm design and analysis, economic implications, and in-depth experimental analysis of accuracy and performance. * Query analysis and query processing4 KB (509 words) - 11:27, 8 March 2021
- * Security analysis * Malware analysis3 KB (344 words) - 11:24, 8 March 2021
- ...ibutions addressing the challenges of large-scale search and user behavior analysis are especially welcome.''786 bytes (98 words) - 10:54, 8 March 2021
- ...ithm design and analysis, economic implications, and in-depth experimental analysis of accuracy and performance. * Query analysis and query processing4 KB (535 words) - 11:27, 8 March 2021
- behavior incorporating data mining and/or expert knowledge from behavioral sciences. Data analysis results extracted from clean data of laboratory3 KB (439 words) - 10:41, 8 March 2021
- ⑵ Strategic Management Tools and Application Analysis 2.Marketing⑴ Marketing Models and Case Analysis2 KB (192 words) - 20:25, 17 February 2021
- ...017 : IET Intelligent Transport Systems, Special Issue on Big Traffic Data Analysis and Mining SPECIAL ISSUE ON: Big Traffic Data Analysis and Mining3 KB (375 words) - 11:00, 8 March 2021
- ...and defense methods ▪ Big data and large scale methods ▪ Biomedical image analysis ▪ Biometrics, face, gesture, body pose ▪ Computational photography, pho952 bytes (114 words) - 10:25, 8 March 2021
- ...ties. Social computing facilitates behavioral modeling in model building, analysis, pattern mining, and prediction. Numerous interdisciplinary and interdepend * Social network analysis and mining4 KB (511 words) - 20:13, 17 February 2021
- ...ommunities; Microblogs; Influence for celebrities on microblogs; Sentiment analysis in the blogosphere; Data-mining twitter; Detection of persistent topics; At ...Detecting malicious clients; Trust patterns in ego networks; Cyberbullying behavior; Online anti-opinion spam; Detecting deception; Tracking in Twitter; Models9 KB (1,069 words) - 10:48, 8 March 2021
- * Intrusion detection, detection of malicious behavior * Anonymity, prevention of traffic analysis2 KB (291 words) - 20:24, 17 February 2021
- grams, services and, even, network behavior. This connection be- tween content and the user is made via (1) Semantic Analysis,4 KB (570 words) - 12:41, 28 January 2021
- understanding and analysis of existing workloads. Whether they are PDAs, * Characterization of OS, Virtual Machine, middleware and library behavior4 KB (589 words) - 19:50, 17 February 2021
- * Analysis of neurophysiological and neuroanatomical data * Models of conditioning, reward and behavior5 KB (575 words) - 11:01, 8 March 2021
- Large Network Analysis - methods, algorithms, processes, analytic tools • Social Network Analysis of Terrorist Networks4 KB (443 words) - 11:08, 8 March 2021
- Computer Vision and Image Analysis Motion Analysis4 KB (438 words) - 12:15, 28 January 2021