Modeling and Analysis of Social Activity Process
- Computer Science
This paper proposes a novel and unified general framework, called Social Activity Process Modeling and Anal- ysis System (SAPMAS), to model social behaviors and analyze social activity processes by using model checking.
Chapter 2 Modeling and Analysis of Social Activity Process
- Computer Science
This paper proposes a novel and unified general framework, called Social Activity Process Modeling and Analysis System (SAPMAS), to model social behaviors and analyze social activity processes by using model checking.
Behavior Informatics to Discover Behavior Insight for Active and Tailored Client Management
This talk introduces some of real-life applications of behavior informatics in core business, capital markets and government services, associated with highly significant economic benefits and social impact as a result of applying the resultant behavior insight and behavior intelligence.
Special issue on behavior computing
- Computer Science, PsychologyKnowledge and Information Systems
Behavior Computing (or Behavior Informatics) is an emerging field which studies behaviors and behavior-oriented systems from the perspectives of informatics and analytics, aiming to build formal methods and computational theories and techniques for behavior representation, processing and engineering.
- Computer Science, PsychologySpringer London
Researchers, research students and practitioners in behavior studies, including computer science, behavioral science, and social science communities will find this state of the art volume invaluable.
Behavior Informatics: A New Perspective
- EducationIEEE Intelligent Systems
This installment of Trends & Controversies provides an array of perspectives on the latest research in behavior informatics by introducing the work and providing a basic overview of the topic.
Learning Complex Behavioral and Social Data
- Computer Science
Behavioral and social applications are ubiquitous, ranging from business and online applications to social and organizational applications and domains, and an emerging need is to develop an in-depth understanding of the underlying working mechanism, driving force, dynamics and evolution of a behavioral and/or social system as well as the impact on business and context.
Towards a Systematic Process-aware Behavioral Analysis for Security
- Computer ScienceICETE
This work investigates the use of process analysis techniques to build behavioral models understandable by human analysts and delineates a systematic methodology for process-aware behaviors analysis and discusses the findings obtained by applying such a methodology to a real-world event log.
Coupled Behavior Analysis with Applications
- BusinessIEEE Transactions on Knowledge and Data Engineering
A Coupled Hidden Markov Model (CHMM)-based approach is illustrated to model and detect abnormal group-based trading behaviors and it is demonstrated that the proposed CHMMs outperforms HMM-only for modeling a single sequence or combining multiple single sequences, without considering coupling relationships to detect anomalies.
User behavior mining on social media: a systematic literature review
- Computer ScienceMultimedia Tools and Applications
A systematic literature review on the significant aspects and approaches in addressing user behavior mining on social media is provided to provide a deep understanding of user behavioral data.
SHOWING 1-10 OF 66 REFERENCES
Behavior Informatics and Analytics: Let Behavior Talk
- Psychology2008 IEEE International Conference on Data Mining Workshops
BIA can greatly complement the existing means for combined, more informative and social patterns and solutions for critical problem-solving in areas such as dealing with customer-officer interaction, counter-terrorism and monitoring online communities.
An e-customer behavior model with online analytical mining for internet marketing planning
- BusinessDecis. Support Syst.
Behavior-based modeling and its application to Email analysis
- Computer ScienceTOIT
It is shown by way of simulation that virus propagations are detectable since viruses may emit emails at rates different than human behavior suggests is normal, and email is directed to groups of recipients in ways that violate the users' typical communications with their social groups.
Activity Mining: from Activities to Actions
- Computer ScienceInt. J. Inf. Technol. Decis. Mak.
This paper investigates the characteristics and challenges of activity data, and the methodologies and tasks of activity mining based on case-study experience in the area of social security, to discover high impact activity patterns in huge volumes of unbalanced activity transactions.
Mining High Impact Exceptional Behavior Patterns
- Computer SciencePAKDD Workshops
These experiments in mining debt-associated customer behavior in social-security areas show the above approaches are useful in identifying exceptional behavior to deeply understand customer behavior and streamline business process.
Mining Impact-Targeted Activity Patterns in Imbalanced Data
- Computer ScienceIEEE Transactions on Knowledge and Data Engineering
Impact-targeted activities are rare but lead to significant impact on the society, e.g., isolated terrorism activities may lead to a disastrous event threatening national security. Similar issues can…
Activity Mining: Challenges and Prospects
- Computer ScienceADMA
This paper investigates the characteristics and challenges of activity data, and the methodologies and tasks of activity mining, to discover impact-targeted activity patterns in huge volumes of unbalanced activity transactions.
Applying data mining in investigating money laundering crimes
- Computer ScienceKDD '03
This work has identified a new paradigm of problems --- that of automatic community generation based on uni-party data, the data in which there is no direct or explicit link information available, and proposed a new methodology for Link Discovery based on Correlation Analysis (LDCA).
On the structural properties of massive telecom call graphs: findings and implications
- Computer ScienceCIKM '06
This paper uses the Call Detail Records of a mobile operator from four geographically disparate regions to construct call graphs, and introduces the Treasure-Hunt model to describe the shape of mobile call graphs.
The Evolution of KDD: towards Domain-Driven Data Mining
- Computer ScienceInt. J. Pattern Recognit. Artif. Intell.
Traditionally, data mining is an autonomous data-driven trial-and-error process. Its typical task is to let data tell a story disclosing hidden information, in which domain intelligence may not be…