Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "user-profiles" wg kryterium: Temat


Wyświetlanie 1-3 z 3
Tytuł:
Predictive modeling in a VoIP system
Autorzy:
Simionovici, A. M.
Tantar, A. A.
Bouvry, P.
Didelot, L.
Powiązania:
https://bibliotekanauki.pl/articles/308590.pdf
Data publikacji:
2013
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
particle algorithms
prediction
user-profiles
VoIP
Opis:
An important problem one needs to deal with in a Voice over IP system is server overload. One way for preventing such problems is to rely on prediction techniques for the incoming traffic, namely as to proactively scale the available resources. Anticipating the computational load induced on processors by incoming requests can be used to optimize load distribution and resource allocation. In this study, the authors look at how the user profiles, peak hours or call patterns are shaped for a real system and, in a second step, at constructing a model that is capable of predicting trends.
Źródło:
Journal of Telecommunications and Information Technology; 2013, 4; 32-40
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Data clustering for the block profile method of intruder detection
Autorzy:
Wesolowski, T.
Kudlacik, P.
Powiązania:
https://bibliotekanauki.pl/articles/333027.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
user-profiles
intruder detection
computer security
user verification
profil użytkownika
wykrywanie intruza
bezpieczeństwo komputera
weryfikacja użytkownika
Opis:
The paper concerns the problem of computer security and intrusion detection. In particular the problem of detecting the masqueraders – intruders who pretend to be authorized users of computer systems. The article presents an improvement of the block profile method of intruder detection for computer systems. As a base for the work the block profiles were taken and the clustering of the block profiles data was performed. The aim was to detect the masqueraders within the test data. The problem of computer security is particularly important in medical applications. Activities of intruder can distort the data stored in medical databases and analyzed by the medical expert systems or decision support systems and thus make it difficult to support the diagnosis of diseases. For this reason it is necessary protect the medical computer systems from unauthorized access. This article presents the preliminary research and conclusions.
Źródło:
Journal of Medical Informatics & Technologies; 2013, 22; 209-216
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Reading in Public Libraries: Space, Reading Activities, and User Profiles
Autorzy:
Sequeiros, Paula
Powiązania:
https://bibliotekanauki.pl/articles/2106921.pdf
Data publikacji:
2013-07-31
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
User Profiles
Single Case Studies
Space Relations
Qualitative Methodology
Public Libraries
Library Buildings
Portugal
Opis:
This single case research was developed within a public library in Porto, Portugal, Biblioteca Municipal Almeida Garrett. Its main objective was to understand how public library readers interact with space, the Internet technology, and reading resources, and how these interactions shape the representations of what a public library is. This case was chosen because the library has a recent and renowned building, high reader use levels, and Internet access. The design of user profiles was an intermediate step, and then a partial result in the process of understanding provision and appropriation of technology, space, and reading resources (all media and supports) in a specific context. The construction of these profiles is presented and  discussed in this paper. A qualitative, single case study was designed according to Burawoy’s Extended Case Method, departing from the framework of several theories – Feenberg and Bakardjieva’s approach to  Internet uses, Lefèbvre and Certeau’s approach on space – and some library users and studies of  Internet user profiles – by Rodrigues, Bakardjieva, and by other authors. A theoretical, diversified sample was constructed. User profiles were designed as a way of depicting common reading practices by grouping readers’ characteristics according to Internet, space, and bibliographical resource usage. Along with this usage, social demographics, motivations, meanings, and feelings were enquired about to construct a thick narrative. Observation of all forms of reading practices, in-depth interviews, informal conversations, children’s drawings, photography, and an architectural and social analysis of the building were used. The library has diversified uses, tied to present-day everyday life conditions, and its space and management style are flexible enough to allow for different user appropriations. As to the general reading atmosphere, high satisfaction was reported, and the most appreciated features of social and architectural space were signaled by readers. User profiles reflect diversified usage modes, diverse relations to space, to Internet and bibliographic resources, and to other users. Both the theoretical framework and the selected methodology proved fruitful for the intended purpose. These readers’ profiles may provide a tool to understand and manage public library services, given the adequate fittingness. The same may be said about readers’ evaluation of space, in general, or, specifically, about space appropriations, and, above all, about the production of stimulating reading atmospheres
Źródło:
Qualitative Sociology Review; 2013, 9, 3; 220-240
1733-8077
Pojawia się w:
Qualitative Sociology Review
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-3 z 3

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies