Coverart for item
The Resource Behavior computing : modeling, analysis, mining and decision, Longbing Cao, Philip S. Yu, editors

Behavior computing : modeling, analysis, mining and decision, Longbing Cao, Philip S. Yu, editors

Label
Behavior computing : modeling, analysis, mining and decision
Title
Behavior computing
Title remainder
modeling, analysis, mining and decision
Statement of responsibility
Longbing Cao, Philip S. Yu, editors
Contributor
Subject
Language
eng
Summary
'Behavior' is an increasingly important concept in the scientific, societal, economic, cultural, political, military, living and virtual worlds. Behavior computing, or behavior informatics, consists of methodologies, techniques and practical tools for examining and interpreting behaviours in these various worlds. Behavior computing contributes to the in-depth understanding, discovery, applications and management of behavior intelligence. With contributions from leading researchers in this emerging field Behavior Computing: Modeling, Analysis, Mining and Decision includes chapters on: representation and modeling behaviors behavior ontology behaviour analysis behaviour pattern mining clustering complex behaviors classification of complex behaviors behaviour impact analysis social behaviour analysis organizational behaviour analysis behaviour computing applications Behavior Computing: Modeling, Analysis, Mining and Decision provides a dedicated source of reference for the theory and applications of behavior informatics and behavior computing. Researchers, research students and practitioners in behavior studies, including computer science, behavioral science, and social science communities will find this state of the art volume invaluable
Cataloging source
GW5XE
Dewey number
302.23/1
Index
index present
LC call number
HM742
LC item number
.B44 2012
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1969-
http://library.link/vocab/relatedWorkOrContributorName
  • Cao, Longbing
  • Yu, Philip S
http://library.link/vocab/subjectName
  • Social media
  • Behavioral assessment
  • Human behavior
  • SOCIAL SCIENCE
  • Informatique
  • Behavioral assessment
  • Human behavior
Label
Behavior computing : modeling, analysis, mining and decision, Longbing Cao, Philip S. Yu, editors
Instantiates
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and indexes
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Semi-Markovian Representation of User Behavior in Software Packages
  • Prateeti Mohapatra and Howard Michel
  • Part 1.
  • Behavior Modeling
  • Analyzing Behavior of the Influentials Across Social Media
  • Nitin Agarwal, Shamanth Kumar, Huiji Gao, Reza Zafarani and Huan Liu
  • Modeling and Analysis of Social Activity Process
  • Can Wang and Longbing Cao
  • Behaviour Representation and Management Making Use of the Narrative Knowledge Representation Language
  • Gian Piero Zarri
  • Estimating Conceptual Similarities Using Distributed Representations and Extended Backpropagation
  • Peter Dreisiger, Wei Liu and Cara MacNish
  • Scoring and Predicting Risk Preferences
  • Gürdal Ertek, Murat Kaya, Cemre Kefeli, Özge Onur and Kerem Uzer
  • An Introduction to Prognostic Search
  • Nithin Kumar M and Vasudeva Varma
  • Part 2.
  • Behavior Analysis
  • P-SERS: Personalized Social Event Recommender System
  • Yun-Hui Hung, Jen-Wei Huang and Ming-Syan Chen
  • Simultaneously Modeling Reply Networks and Contents to Generate User's Profiles on Web Forum
  • Zhao Zhang, Weining Qian and Aoying Zhou
  • Information Searching Behavior Mining Based on Reinforcement Learning Models
  • Liren Gan, Yonghua Cen and Chen Bai
  • A Fast Algorithm for Mining High Utility Itemsets
  • Show-Jane Yen, Chia-Ching Chen and Yue-Shi Lee
  • Individual Movement Behaviour in Secure Physical Environments: Modeling and Detection of Suspicious Activity
  • Robert P. Biuk-Aghai, Yain-Whar Si, Simon Fong and Peng-Fan Yan
  • A Behavioral Modeling Approach to Prevent Unauthorized Large-Scale Documents Copying from Digital Libraries
  • Evgeny E. Ivashko and Natalia N. Nikitina
  • Analyzing Twitter User Behaviors and Topic Trends by Exploiting Dynamic Rules
  • Luca Cagliero and Alessandro Fiori
  • Part 3.
  • Behavior
  • Clustering Clues of Trajectories for Discovering Frequent Movement Behaviors
  • Chih-Chieh Hung, Ling-Yin Wei and Wen-Chih Peng
  • Linking Behavioral Patterns to Personal Attributes Through Data Re-Mining
  • Gürdal Ertek, Ayhan Demiriz and Fatih Cakmak
  • Mining Causality from Non-categorical Numerical Data
  • Joaquim Silva, Gabriel Lopes and António Falcão
  • A System with Hidden Markov Models and Gaussian Mixture Models for 3D Handwriting Recognition on Handheld Devices Using Accelerometers
  • Wang-Hsin Hsu, Yi-Yuan Chiang and Jung-Shyr Wu
  • Medical Students' Search Behaviour: An Exploratory Survey
  • Anushia Inthiran, Saadat M. Alhashmi and Pervaiz K. Ahmed
  • An Evaluation Scheme of Software Testing Strategy
  • K. Ajay Babu, K. Madhuri and M. Suman
  • Part 4.
  • Behavior Applications
  • Behavior Analysis of Telecom Data Using Social Networks Analysis
  • Avinash Polepally and Saravanan Mohan
  • Event Detection Based on Call Detail Records
  • Huiqi Zhang and Ram Dantu
  • Smart Phone: Predicting the Next Call
  • Huiqi Zhang and Ram Dantu
Control code
786162860
Dimensions
unknown
Extent
1 online resource (xvi, 374 pages)
File format
unknown
Form of item
online
Isbn
9781447129691
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)786162860
Label
Behavior computing : modeling, analysis, mining and decision, Longbing Cao, Philip S. Yu, editors
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and indexes
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Semi-Markovian Representation of User Behavior in Software Packages
  • Prateeti Mohapatra and Howard Michel
  • Part 1.
  • Behavior Modeling
  • Analyzing Behavior of the Influentials Across Social Media
  • Nitin Agarwal, Shamanth Kumar, Huiji Gao, Reza Zafarani and Huan Liu
  • Modeling and Analysis of Social Activity Process
  • Can Wang and Longbing Cao
  • Behaviour Representation and Management Making Use of the Narrative Knowledge Representation Language
  • Gian Piero Zarri
  • Estimating Conceptual Similarities Using Distributed Representations and Extended Backpropagation
  • Peter Dreisiger, Wei Liu and Cara MacNish
  • Scoring and Predicting Risk Preferences
  • Gürdal Ertek, Murat Kaya, Cemre Kefeli, Özge Onur and Kerem Uzer
  • An Introduction to Prognostic Search
  • Nithin Kumar M and Vasudeva Varma
  • Part 2.
  • Behavior Analysis
  • P-SERS: Personalized Social Event Recommender System
  • Yun-Hui Hung, Jen-Wei Huang and Ming-Syan Chen
  • Simultaneously Modeling Reply Networks and Contents to Generate User's Profiles on Web Forum
  • Zhao Zhang, Weining Qian and Aoying Zhou
  • Information Searching Behavior Mining Based on Reinforcement Learning Models
  • Liren Gan, Yonghua Cen and Chen Bai
  • A Fast Algorithm for Mining High Utility Itemsets
  • Show-Jane Yen, Chia-Ching Chen and Yue-Shi Lee
  • Individual Movement Behaviour in Secure Physical Environments: Modeling and Detection of Suspicious Activity
  • Robert P. Biuk-Aghai, Yain-Whar Si, Simon Fong and Peng-Fan Yan
  • A Behavioral Modeling Approach to Prevent Unauthorized Large-Scale Documents Copying from Digital Libraries
  • Evgeny E. Ivashko and Natalia N. Nikitina
  • Analyzing Twitter User Behaviors and Topic Trends by Exploiting Dynamic Rules
  • Luca Cagliero and Alessandro Fiori
  • Part 3.
  • Behavior
  • Clustering Clues of Trajectories for Discovering Frequent Movement Behaviors
  • Chih-Chieh Hung, Ling-Yin Wei and Wen-Chih Peng
  • Linking Behavioral Patterns to Personal Attributes Through Data Re-Mining
  • Gürdal Ertek, Ayhan Demiriz and Fatih Cakmak
  • Mining Causality from Non-categorical Numerical Data
  • Joaquim Silva, Gabriel Lopes and António Falcão
  • A System with Hidden Markov Models and Gaussian Mixture Models for 3D Handwriting Recognition on Handheld Devices Using Accelerometers
  • Wang-Hsin Hsu, Yi-Yuan Chiang and Jung-Shyr Wu
  • Medical Students' Search Behaviour: An Exploratory Survey
  • Anushia Inthiran, Saadat M. Alhashmi and Pervaiz K. Ahmed
  • An Evaluation Scheme of Software Testing Strategy
  • K. Ajay Babu, K. Madhuri and M. Suman
  • Part 4.
  • Behavior Applications
  • Behavior Analysis of Telecom Data Using Social Networks Analysis
  • Avinash Polepally and Saravanan Mohan
  • Event Detection Based on Call Detail Records
  • Huiqi Zhang and Ram Dantu
  • Smart Phone: Predicting the Next Call
  • Huiqi Zhang and Ram Dantu
Control code
786162860
Dimensions
unknown
Extent
1 online resource (xvi, 374 pages)
File format
unknown
Form of item
online
Isbn
9781447129691
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)786162860

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...