-
1
-
-
0035251446
-
Using data mining methods to build customer profiles
-
Adomavicius G., and Tuzhilin A. Using data mining methods to build customer profiles. IEEE Computer 34 2 (2001) 74-82
-
(2001)
IEEE Computer
, vol.34
, Issue.2
, pp. 74-82
-
-
Adomavicius, G.1
Tuzhilin, A.2
-
3
-
-
0031233424
-
Speaker recognition: a tutorial
-
Campbell Jr. J.P. Speaker recognition: a tutorial. Proceedings of the IEEE 85 9 (1997) 1437-1462
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.9
, pp. 1437-1462
-
-
Campbell Jr., J.P.1
-
4
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
Cavusoglu H., Mishra B., and Raghunathan S. The value of intrusion detection systems in information technology security architecture. Information Systems Research 16 1 (2005) 28-46
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
6
-
-
84929066297
-
Relevance of voice identification research to criteria for evaluating reliability of an identification
-
Deffenbacher K.A., Cross J.F., Handkins R.E., Chance J.E., Goldstein A.G., Hammersley R.H., and Read J.D. Relevance of voice identification research to criteria for evaluating reliability of an identification. Journal of Psychology 123 2 (1989) 109-119
-
(1989)
Journal of Psychology
, vol.123
, Issue.2
, pp. 109-119
-
-
Deffenbacher, K.A.1
Cross, J.F.2
Handkins, R.E.3
Chance, J.E.4
Goldstein, A.G.5
Hammersley, R.H.6
Read, J.D.7
-
8
-
-
80052127853
-
Modeling duration patterns for speaker recognition
-
Ferrer L., Bratt H., Gadde V., Kajarekar S., Shriberg E., Sonmez K., Stolcke A., and Venkataraman A. Modeling duration patterns for speaker recognition. Proc. EUROSPEECH 2017-2003 (2003)
-
(2003)
Proc. EUROSPEECH 2017-2003
-
-
Ferrer, L.1
Bratt, H.2
Gadde, V.3
Kajarekar, S.4
Shriberg, E.5
Sonmez, K.6
Stolcke, A.7
Venkataraman, A.8
-
10
-
-
44849122540
-
Understanding individual human mobility patterns
-
González M.C., Hidalgo C.A., and Barabási A. Understanding individual human mobility patterns. Nature 453 (2008) 779-782
-
(2008)
Nature
, vol.453
, pp. 779-782
-
-
González, M.C.1
Hidalgo, C.A.2
Barabási, A.3
-
11
-
-
32544451794
-
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
-
Gupta M., Rees J., Chaturvedi A., and Chi J. Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach. Decision Support Systems 41 3 (2006) 592-603
-
(2006)
Decision Support Systems
, vol.41
, Issue.3
, pp. 592-603
-
-
Gupta, M.1
Rees, J.2
Chaturvedi, A.3
Chi, J.4
-
13
-
-
11244328196
-
Biometric identification using driving behavioral signals
-
Igarashi K., Miyajima C., Itou C.K., Takeda K., Itakura F., and Abut H. Biometric identification using driving behavioral signals. Proc. Int'l Conf. Multimedia and Expo (2004) 65-68
-
(2004)
Proc. Int'l Conf. Multimedia and Expo
, pp. 65-68
-
-
Igarashi, K.1
Miyajima, C.2
Itou, C.K.3
Takeda, K.4
Itakura, F.5
Abut, H.6
-
14
-
-
7744236435
-
Earwitnesses: effects of speech duration, retention interval and acoustic environment
-
Kerstholt J., Jansen N., Van Amelsvoort A., and Broeders A. Earwitnesses: effects of speech duration, retention interval and acoustic environment. Applied Cognitive Psychology 18 3 (2004) 327-336
-
(2004)
Applied Cognitive Psychology
, vol.18
, Issue.3
, pp. 327-336
-
-
Kerstholt, J.1
Jansen, N.2
Van Amelsvoort, A.3
Broeders, A.4
-
15
-
-
36249020892
-
A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents
-
Kim D.J., Ferrin D.L., and Rao H.R. A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decision Support Systems 44 2 (2008) 544-564
-
(2008)
Decision Support Systems
, vol.44
, Issue.2
, pp. 544-564
-
-
Kim, D.J.1
Ferrin, D.L.2
Rao, H.R.3
-
16
-
-
28744443618
-
Monitoring and reporting of fingerprint image quality and match accuracy for a large user application
-
Ko T., and Krishnan R. Monitoring and reporting of fingerprint image quality and match accuracy for a large user application. Proc. 33rd Applied Imagery Pattern Recognition Workshop (2004) 159-164
-
(2004)
Proc. 33rd Applied Imagery Pattern Recognition Workshop
, pp. 159-164
-
-
Ko, T.1
Krishnan, R.2
-
17
-
-
0001781295
-
Web mining research: a survey
-
Kosala R., and Blockeel H. Web mining research: a survey. SIGKDD Explorations 2 1 (2000) 1-15
-
(2000)
SIGKDD Explorations
, vol.2
, Issue.1
, pp. 1-15
-
-
Kosala, R.1
Blockeel, H.2
-
18
-
-
0039446085
-
Learning unfamiliar voices
-
Legge G.E., Grosmann C., and Pieper C.M. Learning unfamiliar voices. Journal of Experimental Psychology. Learning, Memory, and Cognition 10 2 (1984) 298-303
-
(1984)
Journal of Experimental Psychology. Learning, Memory, and Cognition
, vol.10
, Issue.2
, pp. 298-303
-
-
Legge, G.E.1
Grosmann, C.2
Pieper, C.M.3
-
20
-
-
61849114303
-
Author identification on the large scale
-
Madigan D., Genkin A., Lewis D.D., Argamon S., Fradkin D., and Ye L. Author identification on the large scale. Proc. Interface and the Classification Society of North America (2005)
-
(2005)
Proc. Interface and the Classification Society of North America
-
-
Madigan, D.1
Genkin, A.2
Lewis, D.D.3
Argamon, S.4
Fradkin, D.5
Ye, L.6
-
21
-
-
33646811518
-
Identifying users of portable devices from gait pattern with accelerometers
-
Mäntyjärvi J., Lindholm M., Vildjiounaite E., Mäkelä S., and Ailisto H. Identifying users of portable devices from gait pattern with accelerometers. Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (2005)
-
(2005)
Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing
-
-
Mäntyjärvi, J.1
Lindholm, M.2
Vildjiounaite, E.3
Mäkelä, S.4
Ailisto, H.5
-
22
-
-
84936893490
-
Vital signs of identity
-
Miller B. Vital signs of identity. IEEE Spectrum 31 2 (1994) 22-30
-
(1994)
IEEE Spectrum
, vol.31
, Issue.2
, pp. 22-30
-
-
Miller, B.1
-
23
-
-
0036117227
-
Discovery and evaluation of aggregate usage profiles for web personalization
-
Mobasher B., Dai H., Luo T., and Nakagawa M. Discovery and evaluation of aggregate usage profiles for web personalization. Data Mining and Knowledge Discovery 6 1 (2002) 61-82
-
(2002)
Data Mining and Knowledge Discovery
, vol.6
, Issue.1
, pp. 61-82
-
-
Mobasher, B.1
Dai, H.2
Luo, T.3
Nakagawa, M.4
-
27
-
-
0002000090
-
Web usage mining: discovery and applications of usage patterns from web data
-
Srivastava J., Cooley R., Deshpande M., and Tan P.-T. Web usage mining: discovery and applications of usage patterns from web data. SIGKDD Explorations 1 2 (2000) 12-23
-
(2000)
SIGKDD Explorations
, vol.1
, Issue.2
, pp. 12-23
-
-
Srivastava, J.1
Cooley, R.2
Deshpande, M.3
Tan, P.-T.4
-
28
-
-
0000280419
-
Effective is security: an empirical study
-
Straub D. Effective is security: an empirical study. Information Systems Research 1 3 (1990) 255-276
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.1
-
30
-
-
0000459353
-
The lack of a priori distinctions between learning algorithms
-
Wolpert D.H. The lack of a priori distinctions between learning algorithms. Neural Computation 8 7 (1996) 1341-1390
-
(1996)
Neural Computation
, vol.8
, Issue.7
, pp. 1341-1390
-
-
Wolpert, D.H.1
-
32
-
-
33847018674
-
GHIC: a hierarchical pattern based clustering algorithm for grouping web transactions
-
Yang Y., and Padmanabhan B. GHIC: a hierarchical pattern based clustering algorithm for grouping web transactions. IEEE Transactions on Knowledge and Data Engineering 17 9 (2005) 1300-1304
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.9
, pp. 1300-1304
-
-
Yang, Y.1
Padmanabhan, B.2
-
33
-
-
0040038177
-
Voice identification over the telephone
-
Yarmey A.D. Voice identification over the telephone. Journal of Applied Social Psychology 21 22 (1991) 1868-1876
-
(1991)
Journal of Applied Social Psychology
, vol.21
, Issue.22
, pp. 1868-1876
-
-
Yarmey, A.D.1
-
35
-
-
53349109106
-
An economic mechanism for better internet security
-
Zhao X., Fang F., and Whinston A.B. An economic mechanism for better internet security. Decision Support Systems 45 4 (2008) 811-821
-
(2008)
Decision Support Systems
, vol.45
, Issue.4
, pp. 811-821
-
-
Zhao, X.1
Fang, F.2
Whinston, A.B.3
|