Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








844,017 Hits in 6.5 sec

Identifying Users From Their Rating Patterns [article]

José Bento, Nadia Fawaz, Andrea Montanari, Stratis Ioannidis
2012 arXiv   pre-print
The test dataset comprises 5,450 ratings for which the user label is missing, but the household label is provided. The challenge required to identify the user labels for the ratings in the test set.  ...  Using a model that leverages on this fact, we are able to identify users within a known household with an accuracy of approximately 96  ...  Section 3, makes a crucial use of temporal patterns in the users rating behavior.  ... 
arXiv:1207.6379v1 fatcat:dkpqujh72jhinhjefrsrdh7lnm

Identifying users from their rating patterns

José Bento, Nadia Fawaz, Andrea Montanari, Stratis Ioannidis
2011 Proceedings of the 2nd Challenge on Context-Aware Movie Recommendation - CAMRa '11  
The test dataset comprises 5 450 ratings for which the user label is missing, but the household label is provided. The challenge required to identify the user labels for the ratings in the test set.  ...  Using a model that leverages on this fact, we are able to identify users within a known household with an accuracy of approximately 96 % (i.e. misclassification rate around 4 %).  ...  Section 3, makes a crucial use of temporal patterns in the users rating behavior.  ... 
doi:10.1145/2096112.2096120 fatcat:vl7jcctbwfb5zdw3preocvz34y

Identifying the perceptive users for online social systems

Jian-Guo Liu, Xiao-Lu Liu, Qiang Guo, Jing-Ti Han, Wen-Bo Du
2017 PLoS ONE  
Moreover, we investigate the behavior patterns of the perceptive users from three dimensions: User activity, correlation characteristics of user rating series and user reputation.  ...  By tracking the ratings given to the rewarded objects, we present a method to identify the user perceptibility, which is defined as the capability that a user can identify these objects at their early  ...  Afterwards, the high perceptibility users will be identified based on the user collective behavior patterns analysed from the new ratings in the rating systems (Process P4) by the generalization of random  ... 
doi:10.1371/journal.pone.0178118 pmid:28704382 pmcid:PMC5509131 fatcat:dlpidtibtfg3hjhnlqzjoixryi

Longitudinal Analysis of Heart Rate and Physical Activity Collected from Smartwatches [article]

Fatemeh Karimi, Zohre Amoozgar, Reza Reiazi, Mehdi Hosseinzadeh, Reza Rawassizadeh
2022 arXiv   pre-print
In our work, we gathered longitudinal data points, e.g., heart rate and physical activity, from various brands of SWs worn by 1,014 users.  ...  Our analysis shows three common heart rate patterns during sleep but two common patterns during the day.  ...  Our study aims to identify users' new behavioral patterns and behavioral dynamics of physical activity along with heart rate changes.  ... 
arXiv:2211.08628v1 fatcat:khea7tm5nrfjba5trgumttzyqa

Identifying Smartphone Users based on their Activity Patterns via Mobile Sensing

M. Ehatisham-ul-Haq, Muhammad Awais Azam, Usman Naeem, Shafiq ur Rѐhman, Asra Khalid
2017 Procedia Computer Science  
Due to ease of use and access, many users are using smartphones to store their private data, such as personal identifiers and bank account details.  ...  Due to ease of use and access, many users are using smartphones to store their private data, such as personal identifiers and bank account details.  ...  Vector Machine (SVM) for identifying different users based on their activity patterns.  ... 
doi:10.1016/j.procs.2017.08.349 fatcat:v3uoviunlbdltlteaoyp7gqjhu

MapRat

Saravanan Thirumuruganathan, Mahashweta Das, Shrikant Desai, Sihem Amer-Yahia, Gautam Das, Cong Yu
2012 Proceedings of the VLDB Endowment  
MapRat allows a user to systematically explore, visualize and understand user rating patterns of input item(s) so as to make an informed decision quickly.  ...  Collaborative rating sites such as IMDB and Yelp have become rich resources that users consult to form judgments about and choose from among competing items.  ...  SM is most useful in identifying reviewer preferences. Additionally, a user can choose the reviewer group she most identifies with and choose their aggregate rating.  ... 
doi:10.14778/2367502.2367554 fatcat:in3r77a2anblxkppfwnuaelugy

Research Aligned Analysis on Web Access Behavioral Pattern Mining for User Identificationa

2019 International Journal of Engineering and Advanced Technology  
Mining user activity from web logs can helps in finding hidden information about the user access pattern which reveals the web access behaviour of the users.  ...  Clustering and Classification techniques are used for web user identification. Clustering is the task of grouping similar patterns for web user identification.  ...  the user behaviour patterns from the weblog and so on.  ... 
doi:10.35940/ijeat.f9552.088619 fatcat:wxgynqsh5zbmxisl4jrqcvhgku

Enhancing recommender systems under volatile userinterest drifts

Huanhuan Cao, Enhong Chen, Jie Yang, Hui Xiong
2009 Proceeding of the 18th ACM conference on Information and knowledge management - CIKM '09  
The type of a given user's interest pattern is identified through the density of the corresponding rating graph and the continuity of the corresponding rating chain.  ...  To this end, we first define four types of interest patterns to understand users' rating behaviors and analyze the properties of these patterns.  ...  Then we identify different user interest patterns from all users' rating series. If a user's rating series is identified as a CNP, it will be removed.  ... 
doi:10.1145/1645953.1646112 dblp:conf/cikm/CaoCYX09 fatcat:cuhfgqhlu5ac5p5sm3toqh7iue

Using Recommendations to Help Novices to Reuse Design Knowledge [chapter]

Paloma Díaz, Alessio Malizia, Ignacio Navarro, Ignacio Aedo
2011 Lecture Notes in Computer Science  
The use of pattern languages is not so straightforward since its users have to identify the patterns they need, browsing the language and understanding both the benefits and trade-offs of each pattern  ...  Novice designers might benefit from tools that assist them in this learning task.  ...  -Novice users might find the recommendation tool useful not only to improve their designs but to learn about patterns and their relation.  ... 
doi:10.1007/978-3-642-21530-8_35 fatcat:kph6ngqss5b43hj73ivnb3e3c4

Your Privilege Gives Your Privacy Away: An Analysis of a Home Security Camera Service

Jinyang Li, Zhenyu Li, Gareth Tyson, Gaogang Xie
2020 IEEE INFOCOM 2020 - IEEE Conference on Computer Communications  
Furthermore, we identify three privacy risks and explore them in detail. We find that paid users are more likely to be exposed to attacks due to their heavier usage patterns.  ...  Our study takes two perspectives: (i) we explore the per-user behaviour, identifying core clusters of users; and (ii) we build on this analysis to extract and predict privacy-compromising insight.  ...  Rate change risk Finally, we explore the potential to identify activity changes on a camera feed via bit rate monitoring, e.g. identifying a person shifting from sitting to walking.  ... 
doi:10.1109/infocom41043.2020.9155516 dblp:conf/infocom/Li0TX20 fatcat:55kq62riprbfpedalpyteulihq

User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems

Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, Jie Yang
2015 IEEE Transactions on Mobile Computing  
patterns from run-time accelerometer measurements to perform robust user verification under various walking speeds.  ...  In this paper, we propose a user verification system leveraging unique gait patterns derived from acceleration readings to detect possible user spoofing in mobile healthcare systems.  ...  The presence of user spoofing causes the newly identified gait patterns to be dramatically different from a user's normal gait patterns and hence such attacks can be detected.  ... 
doi:10.1109/tmc.2014.2365185 fatcat:knhbtrzugrhwzjimhw7yrdfelm

Sovereignty of the Apps: There's more to Relevance than Downloads [article]

Stephan Sigg, Eemil Lagerspetz, Ella Peltonen, Petteri Nurmi, Sasu Tarkoma
2016 arXiv   pre-print
We study their impact on a large-scale database of app-usage data from a community of 339,842 users and more than 213,667 apps.  ...  We identify typical trends in app popularity and classify applications into archetypes. From these, we can distinguish, for instance, trendsetters from copycat apps.  ...  Unfortunately identifying these users from the Carat data is not possible.  ... 
arXiv:1611.10161v1 fatcat:uj6b6ezvzff53cclv6ocmvslcu

RecencyMiner: mining recency-based personalized behavior from contextual smartphone data

Iqbal H. Sarker, Alan Colman, Jun Han
2019 Journal of Big Data  
The volatility of usage behavior will also vary from user-to-user.  ...  Behavioral patterns of smartphone users may vary greatly between individuals in different contexts-for example, temporal, spatial, or social contexts.  ...  Acknowledgements The authors would like to thank the administrative staff of Swinburne University of Technology, Melbourne, Australia, for their support while doing this work and experiment in their post-graduate  ... 
doi:10.1186/s40537-019-0211-6 fatcat:dqbhlaesjbbdxaub5k5vwm7c6m

Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing

Muhammad Ehatisham-ul-Haq, Muhammad Awais Azam, Usman Naeem, Yasar Amin, Jonathan Loo
2018 Journal of Network and Computer Applications  
To address these 19 challenges, a novel continuous authentication scheme is presented in this study, which recognizes smartphone 20 users on the basis of their physical activity patterns using accelerometer  ...  Nowadays, loads of people 13 tend to store different types of private and sensitive data in their smartphones including bank account details, 14 personal identifiers, accounts credentials, and credit card  ...  users based on their activity patterns as shown in 91 Fig. 1 1.  ... 
doi:10.1016/j.jnca.2018.02.020 fatcat:4tu22aitbzaqxjbmpnsbkakhde

An Effective Hybrid Recommender Using Metadata-based Conceptualization and Temporal Semantics

M. Venu Gopalachari, Porika Sammulal
2016 International Journal of Recent Contributions from Engineering, Science & IT  
This framework also includes an online process that identifies the conceptual drift of the usage dynamically.  ...  In this paper a hybrid recommender framework is developed that considers Meta data based conceptual semantics and the temporal patterns on top of the history of the usage.  ...  The output of the algorithm gives k neighbors and their matched access patterns. From this pattern the ratings are aggregated and the recommendations will be populated. H.  ... 
doi:10.3991/ijes.v4i3.5943 fatcat:jaq5o3ir7neb3pizy5yxl3nube
« Previous Showing results 1 — 15 out of 844,017 results