dc.identifier.citation |
[1] Mazlina abdul majid. “Human behaviour modelling: an investigation using traditional discrete event and combined discrete event and agent-based simulation” SCSC’09 proceedings of the summer computer simulation conference page 177-184, 2009 [2] Po-Ming Chen, Hui-Yin Wu, Chih-Yu Hsu, and Wen-Hung Liao. “Logging and analyzing mobile user behaiviour” International Symposium on Cyber Behavior, February 10‐12, 2012, Taipei, Taiwan. [3] Muhammad Awais Azam, Jonathan Loo, Sardar Khan, Muhammad Adeel, Waleed Ejaz. “Human Behaviour Analysis Using Data Collected from Mobile Devices.” International Journal on Advances in Life Sciences, volume 4, numbers 1 and 2, 2012 [4] Po-Ming Chen, Cheng-Ho Chen, Wen-Hung Liao, Tsai-Yen Li. “A Service Platform for Logging and Analyzing Mobile User Behaviors” Appeared in Proceeding of Edutainment 2011, LNCS 6872, 2011 [5] Seung-Cheol Lee, Juryon Paik, Jeewoong Ok, Insang Song, and Ung Mo Kim.“Efficient Mining of User Behaviors by Temporal Mobile Access Patterns” International Journal of Computer Science and Network Security, VOL.7 No.2, February 2007 [6] Haiping Ma, Huanhuan Cao, Qiang Yang, Enhong Chen, Jilei Tian. “A Habit Mining Approach for Discovering Similar Mobile Users” WWW'12 - Proceedings of the 21st Annual Conference on World Wide Web. 2012, p. 231-240 Page 40 of 40 [7] Qiang Xu, Jeffrey Erman, Alexandre Gerber. “Identifying diverse usage behaviors of smartphone apps” IMC ‘11 Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. [8] Shakina.S, J.Rosaline Nirmala. “Mining and Prediction of Mobile User Behavior in Location Based Service Environment” International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012. [9] M. Ficek, T. Pop, P. Vláˇcil, K. Dufková, L. Kencl, andM. Tomek . “Performance study of active tracking in a cellular etwork using a modular signaling platform”. In Proc. ACMMOBISYS , 2010. [10] B. D. Higgins, A. Reda, T. Alperovich, J. Flinn, T. J. Giuli,B. Noble, and D. Watson. Intentional networking opportunistic exploitation of mobile network diversity. InProc. ACM MOBICOM , 2010. [11] A. Gember, A. Anand, and A. Akella. A Comparative Studyof Handheld and Non-Handheld Traffic in Campus WiFiNetworks. In Proc. International Conference on Passive andActive Network Measurement (PAM), 2011. [12] Zdravko Markov Central, Ingrid Russell Connecticut State University University of Hartford . An Introduction to the WEKA Data Mining System |
en_US |