메뉴 건너뛰기




Volumn 180, Issue 17, 2010, Pages 3067-3085

In-depth behavior understanding and use: The behavior informatics approach

Author keywords

Behavior analysis; Behavior computing; Behavior informatics; Decision making; Informatics

Indexed keywords

BEHAVIOR ANALYSIS; BEHAVIOR INFORMATICS; BEHAVIOR MODELING; BEHAVIOR PATTERNS; BEHAVIOR PRESENTATION; BEHAVIOR REPRESENTATION; BEHAVIOR SIMULATION; BEHAVIOR UNDERSTANDING; BEHAVIOR-ORIENTED; BEHAVIORAL DATA; BEHAVIORAL MODEL; BEHAVIORAL SCIENCE; BUSINESS ISSUES; COMPLEX PROBLEMS; COMPUTING BEHAVIOR; COUNTER TERRORISM; DRIVING FORCES; HIGH IMPACT; HUMAN BEHAVIORS; IMPACT ANALYSIS; IN-DEPTH ANALYSIS; INFORMATICS; INFORMATIVE PATTERNS; KEY COMPONENT; MARKET MICROSTRUCTURES; MARKET SURVEILLANCE; MODELING AND ANALYSIS; NEW DIRECTIONS; QUALITATIVE METHOD; REAL-WORLD; SOCIAL SECURITY; SOURCE DATA; SYSTEMATIC MODELING; TRANSACTIONAL DATA; USAGE DATA; VIRTUAL ORGANIZATION; WEB COMMUNITY;

EID: 77953651084     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2010.03.025     Document Type: Article
Times cited : (168)

References (49)
  • 1
    • 0034832620 scopus 로고    scopus 로고
    • Outlier detection for high dimensional data
    • Aggarwal C., and Yu P. Outlier detection for high dimensional data. ACM SIGMOD Record 30 2 (2001) 37-46
    • (2001) ACM SIGMOD Record , vol.30 , Issue.2 , pp. 37-46
    • Aggarwal, C.1    Yu, P.2
  • 2
    • 0345872225 scopus 로고    scopus 로고
    • A novel evolutionary data mining algorithm with applications to churn prediction
    • Au W., Chan K., and Yao X. A novel evolutionary data mining algorithm with applications to churn prediction. IEEE Transactions on Evolutionary Computation 7 6 (2003) : 532-545
    • (2003) IEEE Transactions on Evolutionary Computation , vol.7 , Issue.6
    • Au, W.1    Chan, K.2    Yao, X.3
  • 8
    • 33745664691 scopus 로고    scopus 로고
    • Ontology-based integration of business intelligence
    • Cao L., Zhang C., and Liu J. Ontology-based integration of business intelligence. Web Intelligence and Agent Systems 4 3 (2006) 313-325
    • (2006) Web Intelligence and Agent Systems , vol.4 , Issue.3 , pp. 313-325
    • Cao, L.1    Zhang, C.2    Liu, J.3
  • 9
    • 38549141034 scopus 로고    scopus 로고
    • L. Cao, Y. Zhao, F. Figueiredo, Y. Ou, D. Luo, Mining high impact exceptional behavior patterns, in: Industry Track with 2007 Pacific-Asia Conference on Knowledge Discovery and Data Mining, LNCS4819, 2007, pp. 56-63.
    • L. Cao, Y. Zhao, F. Figueiredo, Y. Ou, D. Luo, Mining high impact exceptional behavior patterns, in: Industry Track with 2007 Pacific-Asia Conference on Knowledge Discovery and Data Mining, LNCS4819, 2007, pp. 56-63.
  • 12
    • 57349170126 scopus 로고    scopus 로고
    • Market microstructure patterns powering trading and surveillance agents
    • Cao L., and Ou Y. Market microstructure patterns powering trading and surveillance agents. Journal of Universal Computer Sciences 14 14 (2008) 2288-2308
    • (2008) Journal of Universal Computer Sciences , vol.14 , Issue.14 , pp. 2288-2308
    • Cao, L.1    Ou, Y.2
  • 13
    • 77953649890 scopus 로고    scopus 로고
    • L. Cao, R. Dai, V. Gorodetski, Proceedings of engineering open complex systems - metasynthesis of computing paradigms (EOCS-MCP 2008) workshop, in: Joint with 2008 IEEE Signature Conference on Computers, Software, and Applications, IEEE Computer Press, 2008.
    • L. Cao, R. Dai, V. Gorodetski, Proceedings of engineering open complex systems - metasynthesis of computing paradigms (EOCS-MCP 2008) workshop, in: Joint with 2008 IEEE Signature Conference on Computers, Software, and Applications, IEEE Computer Press, 2008.
  • 15
    • 33749378279 scopus 로고    scopus 로고
    • L. Cao, Activity mining: challenges and prospects, in: 2006 International Conference on Advanced Data Mining and Applications, LNAI4093, 2006, pp. 582-593.
    • L. Cao, Activity mining: challenges and prospects, in: 2006 International Conference on Advanced Data Mining and Applications, LNAI4093, 2006, pp. 582-593.
  • 17
    • 1942500388 scopus 로고    scopus 로고
    • Crime data mining: a general framework and some examples
    • Chen H., Chung W., Xu J., Wang G., Qin Y., and Chau M. Crime data mining: a general framework and some examples. Computer 37 4 (2004) 50-56
    • (2004) Computer , vol.37 , Issue.4 , pp. 50-56
    • Chen, H.1    Chung, W.2    Xu, J.3    Wang, G.4    Qin, Y.5    Chau, M.6
  • 20
    • 84900830868 scopus 로고    scopus 로고
    • Understanding and using context
    • Dey A. Understanding and using context. Personal and Ubiquitous Computing 5 1 (2001) 47
    • (2001) Personal and Ubiquitous Computing , vol.5 , Issue.1 , pp. 47
    • Dey, A.1
  • 23
    • 14544291427 scopus 로고    scopus 로고
    • Mining interesting knowledge from weblogs: a survey
    • Facca F., and Lanzi P. Mining interesting knowledge from weblogs: a survey. Data and Knowledge Engineering 53 3 (2005) 225-241
    • (2005) Data and Knowledge Engineering , vol.53 , Issue.3 , pp. 225-241
    • Facca, F.1    Lanzi, P.2
  • 26
    • 27844488988 scopus 로고    scopus 로고
    • Mining user preferences, page content and usage to personalize website navigation
    • Flesca S., Greco S., Tagarelli A., and Zumpano E. Mining user preferences, page content and usage to personalize website navigation. World Wide Web 8 3 (2005) 317-345
    • (2005) World Wide Web , vol.8 , Issue.3 , pp. 317-345
    • Flesca, S.1    Greco, S.2    Tagarelli, A.3    Zumpano, E.4
  • 28
    • 7544223741 scopus 로고    scopus 로고
    • A survey of outlier detection methodologies
    • Hodge V., and Austin J. A survey of outlier detection methodologies. Artificial Intelligence Review 22 2 (2004) 85-126
    • (2004) Artificial Intelligence Review , vol.22 , Issue.2 , pp. 85-126
    • Hodge, V.1    Austin, J.2
  • 29
    • 23844547187 scopus 로고    scopus 로고
    • Collaborative web browsing based on semantic extraction of user interests with bookmarks
    • Jung J. Collaborative web browsing based on semantic extraction of user interests with bookmarks. Journal of Universal Computer Science 11 2 (2005) 213-228
    • (2005) Journal of Universal Computer Science , vol.11 , Issue.2 , pp. 213-228
    • Jung, J.1
  • 30
    • 60749095490 scopus 로고    scopus 로고
    • Contextualized recommendation based on reality mining from mobile subscribers
    • Jung J., Lee H., and Choi K. Contextualized recommendation based on reality mining from mobile subscribers. Cybernetics and Systems 40 2 (2009) 160-175
    • (2009) Cybernetics and Systems , vol.40 , Issue.2 , pp. 160-175
    • Jung, J.1    Lee, H.2    Choi, K.3
  • 32
    • 25444436671 scopus 로고    scopus 로고
    • An e-customer behavior model with online analytical mining for internet marketing planning
    • Kwan I., Fong J., and Wong H. An e-customer behavior model with online analytical mining for internet marketing planning. Decision Support Systems 41 1 (2005) 189-204
    • (2005) Decision Support Systems , vol.41 , Issue.1 , pp. 189-204
    • Kwan, I.1    Fong, J.2    Wong, H.3
  • 33
    • 0037400054 scopus 로고    scopus 로고
    • An empirical study of two approaches to sequence learning for anomaly detection
    • Lane T., and Brodley C. An empirical study of two approaches to sequence learning for anomaly detection. Machine Learning 51 1 (2003) 73-107
    • (2003) Machine Learning , vol.51 , Issue.1 , pp. 73-107
    • Lane, T.1    Brodley, C.2
  • 34
    • 0000215887 scopus 로고    scopus 로고
    • Market microstructure: a survey
    • Madhavan A. Market microstructure: a survey. Journal of Financial Markets 3 3 (2000) 205-258
    • (2000) Journal of Financial Markets , vol.3 , Issue.3 , pp. 205-258
    • Madhavan, A.1
  • 35
    • 0034187076 scopus 로고    scopus 로고
    • Predicting subscriber dissatisfaction and improving retention in wireless telecommunications industry
    • Mozer M., Wolniewicz R., Grimes D., Johnson E., and Kaushanky H. Predicting subscriber dissatisfaction and improving retention in wireless telecommunications industry. IEEE Transactions on Neural Networks 11 3 (2000) 690-696
    • (2000) IEEE Transactions on Neural Networks , vol.11 , Issue.3 , pp. 690-696
    • Mozer, M.1    Wolniewicz, R.2    Grimes, D.3    Johnson, E.4    Kaushanky, H.5
  • 42
    • 77954507857 scopus 로고    scopus 로고
    • Designing and implementing a family of intrusion detection systems
    • Vigna G., Valeur F., and Kemmerer R. Designing and implementing a family of intrusion detection systems. ACM SIGSOFT Software Engineering Notes 28 5 (2003) 88-97
    • (2003) ACM SIGSOFT Software Engineering Notes , vol.28 , Issue.5 , pp. 88-97
    • Vigna, G.1    Valeur, F.2    Kemmerer, R.3
  • 43
    • 33947622077 scopus 로고    scopus 로고
    • Social computing: from social informatics to social intelligence
    • Wang F.Y., Carley K.M., Zeng D., and Mao W.J. Social computing: from social informatics to social intelligence. IEEE Intelligent Systems 22 2 (2007) 79-83
    • (2007) IEEE Intelligent Systems , vol.22 , Issue.2 , pp. 79-83
    • Wang, F.Y.1    Carley, K.M.2    Zeng, D.3    Mao, W.J.4
  • 46
    • 0242540409 scopus 로고    scopus 로고
    • K. Yamanishi, J. Takeuchi, A unifying framework for detecting outliers and change points from non-stationary time series data, in: 2002 ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2002, pp. 359-363, 676-681.
    • K. Yamanishi, J. Takeuchi, A unifying framework for detecting outliers and change points from non-stationary time series data, in: 2002 ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2002, pp. 359-363, 676-681.
  • 48
    • 77953651685 scopus 로고    scopus 로고
    • Centrelink, Centrelink Annual Report 2004-2005.
    • Centrelink, Centrelink Annual Report 2004-2005.
  • 49
    • 77953650543 scopus 로고    scopus 로고
    • .


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.