Search results

Jump to: navigation, search
  • analysis/design methodologies, process and process models for - norms and normative behavior
    10 KB (1,371 words) - 16:14, 12 November 2020
  • All the complex systems depend on software that controls the behavior of individual components and * 9. Network Control and Performance Analysis
    13 KB (1,706 words) - 16:34, 27 December 2015
  • ...ress in different advanced mechanisms and theoretical foundations. The gap analysis aims at mechanisms and features concerning the Internet itself, as well as Optimization in P2P/CDN networks: peer placement for streaming P2P, analysis of P2P networks
    11 KB (1,385 words) - 17:48, 14 October 2008
  • | Title = AAAI Spring 2009 Symposium on Human Behavior Modeling The '''AAAI 2009 Spring Symposium on Human Behavior Modeling''' will explore
    2 KB (204 words) - 12:45, 27 December 2015
  • * Neural foundations of intelligent behavior; * Brain data collection, pre-processing, management, and analysis methodologies;
    6 KB (692 words) - 23:59, 30 May 2016
  • ...length papers, which are selected by the program committee after in-depth analysis and discussion. A complementary set of short paper presentations and demos Modeling and prediction of user behavior
    8 KB (1,111 words) - 19:27, 11 February 2009
  • * Semantic Analysis of Multimedia ** Knowledge assisted multimedia analysis
    4 KB (490 words) - 16:48, 15 October 2008
  • grams, services and, even, network behavior. This connection be- tween content and the user is made via (1) Semantic Analysis,
    4 KB (570 words) - 11:08, 26 July 2016
  • ...irst phases of the product life cycle: design, engineering, simulation and analysis. Virtual Prototypes enable early stage planning and validation resulting in ...ring exists in a great variety in terms of different models (shape models, behavior models, ...), data (simulation data, product data, ...) and their dependenc
    4 KB (512 words) - 16:46, 16 December 2020
  • flexible problem solving and social behavior. By participating in the - Social Network Analysis on the social web
    7 KB (950 words) - 23:14, 14 October 2008
  • focusing on Internet measurement and analysis, building on the success give insight into Internet structure and behavior. Examples of relevant
    3 KB (313 words) - 23:15, 14 October 2008
  • Computer Vision and Image Analysis Motion Analysis
    4 KB (438 words) - 23:17, 14 October 2008
  • o capturing user behavior * Performance measurement and analysis
    4 KB (449 words) - 23:18, 14 October 2008
  • • Advances in Modeling, Analysis, and Simulation of Manufacturing Processes • Materials Behavior
    4 KB (424 words) - 10:39, 24 June 2011
  • exciting application area are the analysis of this new data, then the * network analysis of social resources sharing systems
    5 KB (646 words) - 23:19, 14 October 2008
  • exciting and future-oriented topics of plagiarism analysis, authorship Plagiarism analysis:
    5 KB (587 words) - 23:19, 14 October 2008
  • * Intrusion detection, detection of malicious behavior * Anonymity, prevention of traffic analysis
    2 KB (291 words) - 23:19, 14 October 2008
  • ...y-related systems; however, these claims are often made without a rigorous analysis of the human factors involved. Accurate identification and implementation o Formal methods to specify systems' behavior
    11 KB (1,492 words) - 23:26, 14 October 2008
  • o Behavior and modeling of complex adaptive systems o Information mining, statistical analysis of data from complex systems
    3 KB (378 words) - 23:26, 14 October 2008
  • ...g, geometric modeling, and geometric algorithms and computation in design, analysis and manufacturing, as well as in biomedical, geophysical, digital entertain ...to): biomedical and imaging applications, physical simulation and design, analysis, and manufacturing.
    5 KB (715 words) - 23:27, 14 October 2008
  • ...g, geometric modeling, and geometric algorithms and computation in design, analysis and manufacturing, as well as in biomedical, geophysical, digital entertain ...to): biomedical and imaging applications, physical simulation and design, analysis, and manufacturing.
    5 KB (733 words) - 23:27, 14 October 2008
  • embedded applications, and the behavior of many of these applications - Compiler analysis and implementation techniques
    6 KB (847 words) - 23:30, 14 October 2008
  • behavior based on the component behavior. To capture the intricacy of framework for the specification and analysis of rich interfaces is
    4 KB (537 words) - 23:30, 14 October 2008
  • ...ties. Social computing facilitates behavioral modeling in model building, analysis, pattern mining, and prediction. Numerous interdisciplinary and interdepend * Social network analysis and mining
    4 KB (511 words) - 23:31, 14 October 2008
  • * Empirical studies on collaboration and information behavior in development teams. * Scientific analysis of the relation between methods/processes, tools and collaborative developm
    3 KB (341 words) - 01:15, 31 May 2012
  • characterising the behavior and determining the properties of systems. They and the methodologies and tools for the analysis and verification of system
    6 KB (823 words) - 14:28, 14 December 2008
  • including identification, analysis, extraction, mining, transformation and NE Analysis
    10 KB (1,242 words) - 12:58, 18 January 2009
  • Behavior-building, cognitive modeling, data collection and encoding ...ing, animation/camera control, tactical/strategic decision making, terrain analysis
    8 KB (1,134 words) - 17:06, 27 February 2009
  • · Malicious Behavior Detection and Analysis · Security Protocols Analysis, Design, and Proof
    4 KB (485 words) - 17:07, 27 February 2009
  • + Detection and analysis + Automated behavior model generation
    8 KB (1,020 words) - 17:07, 27 February 2009
  • - privacy audits and risk analysis - analysis of network and security protocols
    12 KB (1,690 words) - 17:08, 27 February 2009
  • understanding and analysis of existing workloads. Whether they are PDAs, * Characterization of OS, Virtual Machine, middleware and library behavior
    4 KB (589 words) - 17:08, 27 February 2009
  • ...analyze Internet measurements, or give insight into Internet structure and behavior. Examples of relevant topics are: * Internet traffic analysis
    6 KB (774 words) - 17:08, 27 February 2009
  • ...ibutions addressing the challenges of large-scale search and user behavior analysis are especially welcome.''
    780 bytes (97 words) - 17:42, 7 March 2020
  • * Multimodal content analysis and retrieval * Studies of information-seeking behavior among image/video users
    3 KB (439 words) - 06:47, 17 April 2020
  • ⑵ Strategic Management Tools and Application Analysis 2.Marketing⑴ Marketing Models and Case Analysis
    2 KB (192 words) - 11:36, 2 August 2009
  • • Intrusion and cybersecurity threat detection and analysis<br> • Crime analysis and prevention<br>
    4 KB (429 words) - 08:55, 1 August 2019
  • ...forum for scientists, engineers and practitioners interested in the study, analysis, design, modeling and implementation of evolvable systems, both theoretical › Co-evolution and collective behavior
    2 KB (260 words) - 19:16, 16 February 2010
  • * Security analysis * Malware analysis
    3 KB (343 words) - 16:31, 6 May 2020
  • * Analysis of neurophysiological and neuroanatomical data * Models of conditioning, reward and behavior
    5 KB (574 words) - 15:58, 6 March 2020
  • ...een them. They can be used to perceive the network conditions, or the user behavior, in order to dynamically plan, adapt, decide, take the appropriate actions, ...rchers are encouraged to submit papers focused on the design, development, analysis or optimization of smart communication protocols or algorithms at any commu
    6 KB (833 words) - 15:16, 24 September 2020
  • * Texture Models, Analysis, and Synthesis * Social Behavior
    6 KB (725 words) - 11:44, 1 July 2011
  • ...ure, society and technology– can be utilized in the design, modeling and analysis of current and future computing systems. Being a particularly promising dom * Applications of percolation theory to the analysis of robustness in (interdependent) communication networks
    6 KB (766 words) - 11:19, 26 October 2011
  • Design, implementation and analysis of security hardware, i.e., hardware with cryptographic and security functi Effects of trustworthy systems upon user, corporate, and governmental behavior
    4 KB (451 words) - 12:27, 30 November 2011
  • ...ns. Here, a challenge is often to predict and control the resulting global behavior. • Self-* Behavior in Communication Networks
    7 KB (969 words) - 04:02, 17 January 2012
  • * Enterprise Architecture Design, Modeling, Analysis, Development * Business Collaboration Architecture Design, Modeling, Analysis, Development
    10 KB (1,232 words) - 18:10, 5 March 2012
  • * Document (Text) Analysis * Citation Analysis and Scientometrics
    6 KB (825 words) - 10:31, 24 March 2020
  • ...ithm design and analysis, economic implications, and in-depth experimental analysis of accuracy and performance. * Query analysis and query processing
    4 KB (508 words) - 15:49, 14 May 2020
  • ...theories and foundations, algorithms and applications, and evaluation and analysis. The conference and program chairs invite those working in areas related to * Queries and Query Analysis (e.g., query intent, query understanding, query suggestion and prediction,
    8 KB (1,024 words) - 09:57, 13 May 2020
  • Texture Models, Analysis, and Synthesis Social Behavior
    6 KB (726 words) - 16:22, 19 June 2012
  • *Intrusion and cybersecurity threat detection and analysis<br> *Crime analysis and prevention<br>
    5 KB (575 words) - 10:16, 1 August 2019
  • Co-sponsorship with International Network of Social Network Analysis (INSNA) ...cience, economics, business, human-coupled complex systems, human factors, behavior modeling, neural science, linguistics, security, criminal intelligence, hea
    6 KB (728 words) - 01:01, 25 August 2012
  • - Life-cycle analysis of IT equipment - Reliability, thermal behavior and control
    4 KB (491 words) - 22:39, 28 August 2012
  • ● Design, implementation and analysis of security hardware • Effects of trustworthy systems upon user, corporate, and governmental behavior
    5 KB (677 words) - 15:19, 19 December 2012
  • ...forum for scientists, engineers and practitioners interested in the study, analysis, design, modeling and implementation of evolvable systems, both theoretical Co-evolution and collective behavior
    3 KB (330 words) - 18:28, 4 March 2013
  • ...forum for scientists, engineers and practitioners interested in the study, analysis, design, modeling and implementation of neural computing systems, both theo
    3 KB (363 words) - 18:32, 4 March 2013
  • Semantics based Analysis - Image and video analysis
    5 KB (609 words) - 11:08, 26 July 2016
  • * Modeling and prediction of user behavior * Social media analysis
    8 KB (1,041 words) - 12:52, 9 August 2019
  • ...A 2017 : IEEE International Conference on Identity, Security and Behavior Analysis |Field=biometrics, security, pattern recognition, behavior analysis
    441 bytes (53 words) - 13:49, 25 September 2016
  • - Transportation behavior analysis and prediction - City utility consumption and economic analysis
    4 KB (565 words) - 09:46, 7 February 2017
  • * Databases, Data Mining, Intelligent Data Analysis, Knowledge-based Systems and * Image Coding, Processing, and Analysis
    14 KB (1,941 words) - 11:55, 8 August 2017
  • The focus of this conference is to develop and employ automatic traffic analysis systems that can detect, track and in general understand the behavior of
    6 KB (824 words) - 09:04, 3 September 2017
  • Mechanical behavior and fracture Function test and evaluation technology for material analysis
    3 KB (375 words) - 13:30, 28 July 2017
  • Large Network Analysis - methods, algorithms, processes, analytic tools • Social Network Analysis of Terrorist Networks
    4 KB (442 words) - 10:00, 21 August 2017
  • towards understanding player behavior and informing games user research. Topics analysis, understanding player communities and social structures, churn
    6 KB (825 words) - 13:34, 28 July 2017
  • behavior incorporating data mining and/or expert knowledge from behavioral sciences. Data analysis results extracted from clean data of laboratory
    3 KB (438 words) - 11:43, 8 August 2017
  • |Title=BER 2017 : Behavior, Emotion and Representation: Building Blocks of Interaction Workshop ***“Behavior, Emotion and Representation: Building Blocks of
    7 KB (979 words) - 11:49, 8 August 2017
  • modeling, requirements analysis, specification, automatic generation of behavior and to derive their properties rigorously, and then to solve
    4 KB (593 words) - 13:24, 28 July 2017
  • ...ithm design and analysis, economic implications, and in-depth experimental analysis of accuracy and performance. * Query analysis and query processing
    8 KB (1,069 words) - 08:17, 6 February 2020
  • Modeling, Analysis and Simulation of Manufacturing Processes Mechanical Behavior & Fracture
    3 KB (411 words) - 13:40, 23 April 2020
  • ...017 : IET Intelligent Transport Systems, Special Issue on Big Traffic Data Analysis and Mining SPECIAL ISSUE ON: Big Traffic Data Analysis and Mining
    3 KB (374 words) - 10:00, 21 August 2017
  • - Modeling and prediction of user behavior - Social media analysis
    9 KB (1,256 words) - 02:06, 25 February 2020
  • * Analysis (e.g., OLAP, data mining, machine learning and AI, scalable analysis algorithms, event detection and tracking, deep neural networks, deep learni ...ser behavior analysis, user interface design, personalization, interactive analysis, mobile computing, spoken interfaces)
    4 KB (546 words) - 14:37, 3 August 2023
  • ...the implementation. We evaluate LIMES with synthetic data to elucidate its behavior on small and large data sets with different configurations and show that ou |Evaluation=Performance Analysis
    4 KB (664 words) - 09:29, 2 March 2019
  • ...pproaches to answer important and challenging questions about human social behavior through social media while advancing computational tools for vast and unstr * Sociology and social network analysis
    7 KB (837 words) - 07:07, 14 May 2020
  • ...pproaches to answer important and challenging questions about human social behavior through social media while advancing computational tools for vast and unstr * Sociology and social network analysis
    6 KB (866 words) - 14:52, 13 May 2020
  • * Multimodal content analysis and retrieval * Studies of information-seeking behavior among image/video users
    2 KB (251 words) - 14:17, 26 August 2020
  • * Analysis and synthesis, structure and behavior of nets
    2 KB (251 words) - 18:19, 13 May 2020
  • ...gy analytics; Active power management; Pervasive energy services; Consumer behavior models; Energy saving; Appliance monitoring; User’s cognitive load; Energ ...Energy and performance profiling; Energy consumption and energy efficiency analysis; Energy demand prediction for appliances in industrial and home environment
    10 KB (1,331 words) - 14:52, 19 April 2020
  • ...Decentralized autonomic behavior; Market-adaptive trust; Semantics of self-behavior; Self-organizing patterns; Stability propagation in self-organizing systems ...tion; Error resilient transmission of multimedia data; 3D video coding and analysis; Depth map applications; Machine learning programming models and abstractio
    16 KB (1,897 words) - 12:31, 18 May 2020
  • ...a; Content analysis; Pervasive Web and Mobility; Social Networks and Graph Analysis; Web search systems and applications; Web Infrastructure: Datacenters, Cont ...ked data and deep web; Development of interoperable web applications; Data analysis of semantic web; Mashing up data and processes; Big data and semantic repre
    11 KB (1,390 words) - 12:35, 18 May 2020
  • ...ithm design and analysis, economic implications, and in-depth experimental analysis of accuracy and performance. * Query analysis and query processing
    4 KB (534 words) - 13:54, 13 May 2020
  • * Cultural heritage access and analysis * Scholarly data analysis
    8 KB (1,096 words) - 11:36, 3 August 2020
  • * Auction Algorithms and Analysis * Learning under Strategic Behavior
    2 KB (329 words) - 13:48, 23 June 2020
  • ...stic spectrum access; High spectral efficiency communications; Interactive analysis on Big Data; Streaming/Real-Time/Active Streaming; Internet-scale real-time ...applications, Declarative 3D; WebGL Scene Creation; Web-Based Source Code Analysis; Web visualization of underground caves; Streaming compressed 3D data on th
    14 KB (1,804 words) - 13:49, 5 June 2020
  • ...ation on social media; Blockchain and healthcare systems; Risk-based human behavior profiling; Forensic recovery of cloud evidence; Hacking pacemakers; Predict ...urity on hardware and smart cards; Identity management; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anonymity; Security compliance; P
    17 KB (2,088 words) - 12:49, 14 June 2020
  • * Auction Algorithms and Analysis * Learning under Strategic Behavior
    2 KB (291 words) - 14:12, 23 June 2020
  • ...ommunities; Microblogs; Influence for celebrities on microblogs; Sentiment analysis in the blogosphere; Data-mining twitter; Detection of persistent topics; At ...Detecting malicious clients; Trust patterns in ego networks; Cyberbullying behavior; Online anti-opinion spam; Detecting deception; Tracking in Twitter; Models
    9 KB (1,068 words) - 19:47, 9 July 2020
  • ...tive management; Sustainable community participation; Collaborative visual analysis; Social-interaction based model; Deep recommendations; Online health commun ...pects of distributed collaboration; Methodologies and tools for design and analysis of collaborative user applications; Frameworks for human-centric based grou
    8 KB (897 words) - 17:15, 22 March 2021
  • ...ntifying applications from traffic behavior; Traffic analysis: methods for analysis and visualization of multidimensional measurements, characterizing protocol ...operative games, and games on graphs; Stochastic network calculus; Fractal behavior and stability mechanisms; Kolmogorov complexity for performance evaluation;
    13 KB (1,550 words) - 02:20, 10 July 2020
  • ...tocols for air interfaces and networks; Wireless MAC protocols: Design and analysis; Transport layer issues in mobile and wireless networks; Middleware for han Traffic Modeling and Analysis; 3G/4G Bandwidth on Demand; QoS and mobility; End-to-end QoS; QoS profiling
    11 KB (1,335 words) - 02:28, 10 July 2020
  • ...ral networks; Symbolic and algebraic computation; Modeling, simulation and analysis of business processes and systems Information technology and organizational behavior; Agents, data mining and ontologies; Information retrieval systems; Informa
    18 KB (2,036 words) - 02:36, 10 July 2020
  • ...tems; Search-based software; Green-oriented software engineering; Symbolic analysis; Software for automated energy optimization; Mobile applications-oriented s ...testing tools; Software implementation; Software project management (risk analysis, dependencies, etc.); Component-based software development; Service-oriente
    13 KB (1,573 words) - 12:00, 10 July 2020
  • Monte Carlo simulation; Statistical analysis of simulation output; Analytical simulation modeling; Discrete event simula Sensitivity analysis; Rare-event simulation methodology; Agent-based modeling and simulation; Re
    12 KB (1,421 words) - 12:02, 10 July 2020
  • ...l behavior therapy; Cognitive behavioral therapy; Trauma-focused cognitive behavior therapy; Acceptance-oriented interventions; Awareness. ...arning, simulation, and image analysis; Image registration and correlation analysis; Sensing and detecting devices; 3d MRI and optical mapping; Semantic repres
    8 KB (970 words) - 16:50, 14 July 2020
  • ...ss news spatio-temporal data; Geo-social co-location mining; Spatial drift analysis; Processing cascading information; Web 2.0 Geo-search ...-spatial Web Services and processing; Geo-spatial Web Servcies and spatial analysis; Geo-spatial Web Services and society; Geo-spatial Web Services and informa
    11 KB (1,423 words) - 14:47, 27 August 2020
  • ...igms; Evaluation methods and tools; Evaluation frameworks; Scenarios; Task analysis; Conceptual design; Physical design; Information architecture; Information ...hnologies; Children social interaction experiences; Children online gaming behavior; Children and wearable devices; Children-oriented design interaction shortc
    16 KB (1,964 words) - 13:34, 7 January 2021
  • ...2017 : Call for Papers --- IEEE Communications Magazine Feature Topic on Behavior Recognition based on Wi-Fi CSI]] ||44 ...ORKSHOP/TUTORIAL PROPOSALS --- IEEE International Symposium on Performance Analysis of Systems and Software]] ||38
    24 KB (2,633 words) - 18:53, 15 October 2020
  • systems’ behavior; Online and offline systems; Open and closed systems; analysis of embedded systems; Mission-critical features for embedded
    10 KB (1,210 words) - 20:17, 22 November 2020
  • inheritable roles; Driving behavior prediction apps using multi-sensory Agile analysis and design; Scalable agile frameworks; Performance
    12 KB (1,505 words) - 20:38, 22 November 2020

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)