Zobrazeno 1 - 10
of 86
pro vyhledávání: '"Helen, Ashman"'
Autor:
Darusalam Darusalam, Helen Ashman
Publikováno v:
Knowledge Engineering and Data Science, Vol 1, Iss 2, Pp 55-63 (2018)
Profiling and identifying individual users is an approach for intrusion detection in a computer system. User profiles are important in many applications since they record highly user-specific information - profiles are basically built to record infor
Externí odkaz:
https://doaj.org/article/fac8cd99fe2e472e82a60686a267ee76
Publikováno v:
In The ORBIT Journal 2017 1(2):1-19
Publikováno v:
Information Research: an international electronic journal. 25
Introduction. Most university students depend significantly, sometimes exclusively, on the Google search engine for their academic information needs. User satisfaction leads to users’ deeper engagement with an information system that is shown to im
Autor:
Helen Ashman, Darusalam Darusalam
Publikováno v:
Knowledge Engineering and Data Science, Vol 1, Iss 2, Pp 55-63 (2018)
Profiling and identifying individual users is an approach for intrusion detection in a computer system. User profiles are important in many applications since they record highly user-specific information - profiles are basically built to record infor
Autor:
Marianna Sigala, Preben Hansen, Edwin Mouda Ye, Jia Tina Du, Songshan (Sam) Huang, Helen Ashman
Publikováno v:
Proceedings of the Association for Information Science and Technology. 56:829-831
In an era of information overload, people often work together on information‐intensive projects. Group holidaying is such an example where people plan and conduct trips together. In this poster paper we present preliminary findings from an ongoing
Autor:
Helen Ashman, Marianna Sigala, Jia Tina Du, Edwin Mouda Ye, Preben Hansen, Songshan (Sam) Huang
Publikováno v:
Information Processing & Management. 58:102581
A group trip entails collaborative information behaviour (CIB) of multiple actors seeking, sharing, and using travel-related information. However, there is a lack of investigation on how people choose to assume or be appointed different CIB roles dur
The use of recorded lecture videos (RLVs) in mathematics instruction continues to advance. Prior research at the post-secondary level has indicated a tendency for RLV use in mathematics to be negatively correlated with academic performance, although
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::54cd9f60bf84409e6bf504e530eeaf28
https://hdl.handle.net/11541.2/131727
https://hdl.handle.net/11541.2/131727
Publikováno v:
Journal of Network and Computer Applications. 72:14-27
Intrusion detection systems are important for detecting and reacting to the presence of unauthorised users of a network or system. They observe the actions of the system and its users and make decisions about the legitimacy of the activity and users.
Publikováno v:
Journal of Network and Computer Applications. 70:171-182
Users interact with social media in a number of ways, providing a variety of data, from ratings and approvals to quantities of text. Public discussion for hotspots in particular generates significant volume and velocity of user-contributed text, freq
Publikováno v:
Applied Mathematics and Computation. 285:59-78
Due to growing user demand, web application development is becoming increasingly complicated. Multiple programming languages along with the complex multi-tier architecture commonly involved in web application development contribute to the probability