Search results

Jump to navigation Jump to search
Results 1 – 21 of 111
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  • ...A 2017 : IEEE International Conference on Identity, Security and Behavior Analysis |Field=biometrics, security, pattern recognition, behavior analysis
    447 bytes (54 words) - 11:03, 8 March 2021
  • | Title = AAAI Spring 2009 Symposium on Human Behavior Modeling The '''AAAI 2009 Spring Symposium on Human Behavior Modeling''' will explore
    2 KB (204 words) - 12:00, 28 January 2021
  • • Intrusion and cybersecurity threat detection and analysis<br> • Crime analysis and prevention<br>
    4 KB (430 words) - 11:03, 8 March 2021
  • *Intrusion and cybersecurity threat detection and analysis<br> *Crime analysis and prevention<br>
    5 KB (576 words) - 11:03, 8 March 2021
  • ...ithm design and analysis, economic implications, and in-depth experimental analysis of accuracy and performance. * Query analysis and query processing
    4 KB (509 words) - 11:27, 8 March 2021
  • * Security analysis * Malware analysis
    3 KB (344 words) - 11:24, 8 March 2021
  • ...ibutions addressing the challenges of large-scale search and user behavior analysis are especially welcome.''
    786 bytes (98 words) - 10:54, 8 March 2021
  • ...ithm design and analysis, economic implications, and in-depth experimental analysis of accuracy and performance. * Query analysis and query processing
    4 KB (535 words) - 11:27, 8 March 2021
  • behavior incorporating data mining and/or expert knowledge from behavioral sciences. Data analysis results extracted from clean data of laboratory
    3 KB (439 words) - 10:41, 8 March 2021
  • ⑵ Strategic Management Tools and Application Analysis 2.Marketing⑴ Marketing Models and Case Analysis
    2 KB (192 words) - 20:25, 17 February 2021
  • ...017 : IET Intelligent Transport Systems, Special Issue on Big Traffic Data Analysis and Mining SPECIAL ISSUE ON: Big Traffic Data Analysis and Mining
    3 KB (375 words) - 11:00, 8 March 2021
  • ...and defense methods ▪ Big data and large scale methods ▪ Biomedical image analysis ▪ Biometrics, face, gesture, body pose ▪ Computational photography, pho
    952 bytes (114 words) - 10:25, 8 March 2021
  • ...ties. Social computing facilitates behavioral modeling in model building, analysis, pattern mining, and prediction. Numerous interdisciplinary and interdepend * Social network analysis and mining
    4 KB (511 words) - 20:13, 17 February 2021
  • ...ommunities; Microblogs; Influence for celebrities on microblogs; Sentiment analysis in the blogosphere; Data-mining twitter; Detection of persistent topics; At ...Detecting malicious clients; Trust patterns in ego networks; Cyberbullying behavior; Online anti-opinion spam; Detecting deception; Tracking in Twitter; Models
    9 KB (1,069 words) - 10:48, 8 March 2021
  • * Intrusion detection, detection of malicious behavior * Anonymity, prevention of traffic analysis
    2 KB (291 words) - 20:24, 17 February 2021
  • grams, services and, even, network behavior. This connection be- tween content and the user is made via (1) Semantic Analysis,
    4 KB (570 words) - 12:41, 28 January 2021
  • understanding and analysis of existing workloads. Whether they are PDAs, * Characterization of OS, Virtual Machine, middleware and library behavior
    4 KB (589 words) - 19:50, 17 February 2021
  • * Analysis of neurophysiological and neuroanatomical data * Models of conditioning, reward and behavior
    5 KB (575 words) - 11:01, 8 March 2021
  • Large Network Analysis - methods, algorithms, processes, analytic tools • Social Network Analysis of Terrorist Networks
    4 KB (443 words) - 11:08, 8 March 2021
  • Computer Vision and Image Analysis Motion Analysis
    4 KB (438 words) - 12:15, 28 January 2021

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)