Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/317795.317809acmconferencesArticle/Chapter ViewAbstractPublication PagesmetricsConference Proceedingsconference-collections
Article

On the classification of interactive user behaviour indices

Published: 01 August 1985 Publication History
  • Get Citation Alerts
  • Abstract

    The concepts of user behaviour entropy and user behaviour mobility are proposed as indices for the description of user behaviour. The user behaviour indices are derivable from the mode probability vector and the mode transition matrix which adequately describe the behaviour dynamics of an interactive user. The user behaviour indices reduce the ((n*n)+n) dimensional parameter space to two dimensions only for classification, without loss of information related to the user behaviour dynamics. The classification of the users in an interactive educational environment using the user behaviour indices is presented as a case study.

    Cited By

    View all
    • (1994)Generative networkload models for a single server environmentACM SIGMETRICS Performance Evaluation Review10.1145/183019.18303122:1(118-127)Online publication date: 1-May-1994
    • (1994)Generative networkload models for a single server environmentProceedings of the 1994 ACM SIGMETRICS conference on Measurement and modeling of computer systems10.1145/183018.183031(118-127)Online publication date: 1-May-1994
    • (2001)Intrusion detection through learning behavior modelComputer Communications10.1016/S0140-3664(00)00364-924:12(1202-1212)Online publication date: 1-Jul-2001
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGMETRICS '85: Proceedings of the 1985 ACM SIGMETRICS conference on Measurement and modeling of computer systems
    August 1985
    203 pages
    ISBN:0897911695
    DOI:10.1145/317795
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 August 1985

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Acceptance Rates

    Overall Acceptance Rate 459 of 2,691 submissions, 17%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 11 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (1994)Generative networkload models for a single server environmentACM SIGMETRICS Performance Evaluation Review10.1145/183019.18303122:1(118-127)Online publication date: 1-May-1994
    • (1994)Generative networkload models for a single server environmentProceedings of the 1994 ACM SIGMETRICS conference on Measurement and modeling of computer systems10.1145/183018.183031(118-127)Online publication date: 1-May-1994
    • (2001)Intrusion detection through learning behavior modelComputer Communications10.1016/S0140-3664(00)00364-924:12(1202-1212)Online publication date: 1-Jul-2001
    • (2000)Intelligent prefetch in WWW using client behavior characterizationProceedings 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.PR00728)10.1109/MASCOT.2000.876424(13-19)Online publication date: 2000
    • (1995)Hierarchical approach to building generative networkload modelsComputer Networks and ISDN Systems10.1016/0169-7552(94)00012-I27:7(1193-1206)Online publication date: 1-May-1995
    • (1991)Real-time anomaly detection using a nonparametric pattern recognition approachProceedings Seventh Annual Computer Security Applications Conference10.1109/CSAC.1991.213016(80-89)Online publication date: 1991

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media