Search results for "User profile"

showing 10 items of 26 documents

The Current and Future Role of Carsharing in Palermo: Analysis of Collected Data and Results of a Customer Satisfaction Survey

2018

In recent years many cities, both in Italy and abroad, have adopted Sustainable Urban Mobility Plans, in which one of the key action is the developing of the sharing mobility. The aim of the paper is to define the role that carsharing plays in Palermo today and it will play in the future, thanks to the adoption of new strategies, such as the introduction of the free-floating system, and transport demand orientation policies, such as the increase in the parking fees for private cars or the expansion of the ZTL. The average user profile of carsharing in Palermo has been identified through a customer satisfaction survey and the potential demand of carsharing in Palermo has been studied using G…

050210 logistics & transportationcustomer satisfaction surveyUser profile05 social sciences0211 other engineering and technologiesCarsharing02 engineering and technologyMetropolitan areacatchment areaRail transportationcarsharing demand021105 building & construction0502 economics and businessCustomer satisfactionBusinessCatchment areaMarketing2018 IEEE International Conference on Environment and Electrical Engineering and 2018 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe)
researchProduct

Using continuous user authentication to detect masqueraders

2003

Nowadays computer and network intrusions have become more common and more complicated, challenging the intrusion detection systems. Also, network traffic has been constantly increasing. As a consequence, the amount of data to be processed by an intrusion detection system has been growing, making it difficult to efficiently detect intrusions online. Proposes an approach for continuous user authentication based on the user’s behaviour, aiming at development of an efficient and portable anomaly intrusion detection system. A prototype of a host‐based intrusion detection system was built. It detects masqueraders by comparing the current user behaviour with his/her stored behavioural model. The m…

AuthenticationUser profileComputer scienceAnomaly-based intrusion detection systemReal-time computingIntrusion detection systemLibrary and Information SciencesManagement Science and Operations ResearchComputer securitycomputer.software_genreManagement Information SystemsInformation protection policyHost-based intrusion detection systemSystems architectureBusiness and International ManagementHost (network)computerInformation Management & Computer Security
researchProduct

A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection

2001

Network security, and intrusion detection in particular, represents an area of increased in security community over last several years. However, the majority of work in this area has been concentrated upon implementation of misuse detection systems for intrusion patterns monitoring among network traffic. In anomaly detection the classification was mainly based on statistical or sequential analysis of data often neglect ion temporal events' information as well as existing relations between them. In this paper we consider an anomaly detection problem as one of classification of user behavior in terms of incoming multiple discrete sequences. We present and approach that allows creating and mai…

Class (computer programming)User profileNetwork securitybusiness.industryAnomaly-based intrusion detection systemComputer scienceIntrusion detection systemcomputer.software_genreMisuse detectionData analysisAnomaly detectionData miningbusinesscomputer
researchProduct

Automatic ontology-based user profile learning from heterogeneous web resources in a big data context

2013

The Web has developed to the biggest source of information and entertainment in the world. By its size, its adaptability and flexibility, it challenged our current paradigms on information sharing in several areas. By offering everybody the opportunity to release own contents in a fast and cheap way, the Web already led to a revolution of the traditional publishing world and just now, it commences to change the perspective on advertisements. With the possibility to adapt the contents displayed on a page dynamically based on the viewer's context, campaigns launched to target rough customer groups will become an element of the past. However, this new ecosystem, that relates advertisements wit…

Flexibility (engineering)User profileDigital marketingComputer sciencebusiness.industryInformation sharingBig dataGeneral EngineeringContext (language use)Ontology (information science)computer.software_genreOntology engineeringWorld Wide WebOntologyWeb resourcebusinesscomputerProceedings of the VLDB Endowment
researchProduct

Privacy in Social Network Sites

2011

Are we running out of privacy? Nowadays, for example, we are concerned about whether the maintenance of a private sphere in online environments has become a luxury commodity (Papacharissi 2009). Questions of this kind are justified as online communication plays an increasingly important role in people’s everyday life (cf., e.g., Lundby 2009). While it seems exaggerated to stigmatize today’s youth as “communication junkies” (Patalong 2010), online conversations are increasingly becoming a functional equivalent to face to face communication (Beer 2008). However, some significant differences between online and “offline” communication remain. Face to face communication may remain largely intima…

Information privacyUser profileSocial networkbusiness.industryInternet privacySocial WelfarePrivate spherebusinessEveryday lifeSocial webFace-to-face interaction
researchProduct

Navigating high-choice European political information environments : a comparative analysis of news user profiles and political knowledge

2021

The transition from low- to high-choice media environments has had far-reaching implications for citizens’ media use and its relationship with political knowledge. However, there is still a lack of comparative research on how citizens combine the usage of different media and how that is related to political knowledge. To fill this void, we use a unique cross-national survey about the online and offline media use habits of more than 28,000 individuals in 17 European countries. Our aim is to (i) profile different types of news consumers and (ii) understand how each user profile is linked to political knowledge acquisition. Our results show that five user profiles – news minimalists, social m…

Online and offlinecrossSociology and Political Sciencenews repertoires050801 communication & media studiescross-nationalnews media usePoliticsSeekers0508 media and communications10240 Department of Communication and Media Research3312 Sociology and Political ScienceComparative researchMedia usePolitical science050602 political science & public administrationcomparative researchSocial media070 News media journalism & publishingpolitical knowledgeUser profileCommunication05 social sciencesPoliticsnationalAdvertisingKnowledge acquisition[SHS.SCIPO]Humanities and Social Sciences/Political science0506 political scienceddc:Mass communications3315 CommunicationThe international journal of press/politics
researchProduct

Découverte des relations dans les réseaux sociaux

2011

In recent years, social network sites exploded in popularity and become an important part of the online activities on the web. This success is related to the various services/functionalities provided by each site (ranging from media sharing, tagging, blogging, and mainly to online social networking) pushing users to subscribe to several sites and consequently to create several social networks for different purposes and contexts (professional, private, etc.). Nevertheless, current tools and sites provide limited functionalities to organize and identify relationship types within and across social networks which is required in several scenarios such as enforcing users’ privacy, and enhancing t…

Rule-based relationship identificationCoreferent usersMetadataPhotos[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]Pas de mot clé en françaisClassificationLink miningSocial networks[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]Relationship discoveryLink type predictionEntity resolution[ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]CrowdsourcingUser profiles
researchProduct

A global service level guarantee in NGN networks

2010

In this paper, we propose an end-to-end service level negotiation protocol which enables a global service offer covering quality of service (QoS) and security while taking into account user's mobility in this offer. This protocol provides all the domains involved in the transport of a various offered services with a negotiation capability to achieve an agreement on a service level. This paper shows also results of measurements evaluating the performances of the considered negotiation protocol and security impact on QoS.

Service (business)User profileService delivery frameworkbusiness.industryComputer scienceQuality of serviceService level objectiveService level requirementMobile QoScomputer.software_genreSecurity serviceService levelNext-generation networkWeb servicebusinesscomputerComputer networkThe Second International Conference on Communications and Networking
researchProduct

Research Directions of OLAP Personalizaton

2011

In this paper we have highlighted five existing approaches for introducing personalization in OLAP: preference constructors, dynamic personalization, visual OLAP, recommendations with user session analysis and recommendations with user profile analysis and have analyzed research papers within these directions. We have provided an evaluation in order to point out (i) personalization options, described in these approaches, and its applicability to OLAP schema elements, aggregate functions, OLAP operations, (ii) the type of constraints (hard, soft or other), used in each approach, (iii) the methods for obtaining user preferences and collecting user information. The goal of our paper is to syst…

User informationWorld Wide WebInformation retrievalUser profileComputer scienceSchema (psychology)Online analytical processingInformationSystems_DATABASEMANAGEMENTData warehousePersonalization
researchProduct

2021

In COVID-19 related infodemic, social media becomes a medium for wrongdoers to spread rumors, fake news, hoaxes, conspiracies, astroturf memes, clickbait, satire, smear campaigns, and other forms of deception. It puts a tremendous strain on society by damaging reputation, public trust, freedom of expression, journalism, justice, truth, and democracy. Therefore, it is of paramount importance to detect and contain unreliable information. Multiple techniques have been proposed to detect fake news propagation in tweets based on tweets content, propagation on the network of users, and the profile of the news generators. Generating human-like content allows deceiving content-based methods. Networ…

User profileBoosting (machine learning)Information retrievalGeneral Computer ScienceComputer sciencebusiness.industryDeep learningmedia_common.quotation_subjectNode (networking)Feature extractionGeneral EngineeringComplex networkBinary classificationGeneral Materials ScienceArtificial intelligenceElectrical and Electronic EngineeringbusinessReputationmedia_commonIEEE Access
researchProduct