HOWL 发表于 2025-4-1 04:32:25

A Behavioral Modeling Approach to Prevent Unauthorized Large-Scale Documents Copying from Digital Lion application of Markov chains. We also present the results of experiments conducted within development of a prototype digital library protection system. Finally, examples of a normal profile and an automatically detected anomalous session derived from the real data logs of a digital library illustrate the suggested approach to the problem.

全等 发表于 2025-4-1 09:17:55

Scoring and Predicting Risk Preferenceswith 656 respondents. We find that the demographic (indirect) questions can be almost as successful as risk-related (direct) questions in predicting risk preference classes of respondents. Using a decision-tree based classification model, we discuss how one can generate actionable business rules based on the findings.
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Behavior Computing; Modeling, Analysis, Longbing Cao,Philip S. Yu Book 2012 Springer-Verlag London 2012 Behavior Impact Analysis.Behavior