Characterizing Sequences of User Actions for Access Logs Analysis

Author(s):  
Thomas Draier ◽  
Patrick Gallinari
Keyword(s):  
2019 ◽  
Vol 29 (4) ◽  
pp. 1-25 ◽  
Author(s):  
Carmen Cheh ◽  
Uttam Thakore ◽  
Ahmed Fawaz ◽  
Binbin Chen ◽  
William G. Temple ◽  
...  

Author(s):  
James H. Hicinbothom

Human factors engineering research into human-computer interaction (HCI) needs means to easily and objectively study HCI. The Instrumented Interface Construction (IICON) Evaluator, and its associated IICON Data Taps, provide such means. Any X Window system user interface built using development tools for which appropriate IICON Data Taps exist (e.g., IICON Data Taps/TAE+5.2) can be automatically instrumented. Instrumented interfaces can then be used by subjects, recording a complete transcript of user actions. Once an operator's session has been recorded, it can be replayed on-screen as needed for further observation and analysis. These capabilities are extremely helpful for developing cognitive task models (i.e., user models) for analytic purposes, or for construction of Intelligent Agents to be embedded in the operator's computer-based workstation. Furthermore, with a complete objective record of all operator actions, IICON Evaluator supports a wide variety of research investigations of HCI.


Author(s):  
Rachel Winter ◽  
Steve Scheinert ◽  
Mel Stanfill ◽  
Anastasia Salter ◽  
Olivia B. Newton ◽  
...  

Author(s):  
Dr. D. Chitra ◽  
K. Ilakkiya

This paper considers wireless networks in which various paths are obtainable involving each source and destination. It is allowing each source to tear traffic among all of its existing paths, and it may conquer the lowest achievable number of transmissions per unit time to sustain a prearranged traffic matrix. Traffic bound in contradictory instructions in excess of two wireless hops can utilize the “reverse carpooling” advantage of network coding in order to decrease the number of transmissions used. These call such coded hops “hyper-links.” With the overturn carpooling procedure, longer paths might be cheaper than shorter ones. However, convenient is an irregular situation among sources. The network coding advantage is realized only if there is traffic in both directions of a shared path. This project regard as the problem of routing amid network coding by egotistic agents (the sources) as a potential game and develop a method of state-space extension in which extra agents (the hyper-links) decouple sources’ choices from each other by declaring a hyper-link capacity, allowing sources to split their traffic selfishly in a distributed fashion, and then altering the hyper-link capacity based on user actions. Furthermore, each hyper-link has a scheduling constraint in stipulations of the maximum number of transmissions authorized per unit time. Finally these project show that our two-level control scheme is established and verify our investigative insights by simulation.


2019 ◽  
Vol 17 (3) ◽  
pp. 93-110
Author(s):  
A. V. Tkachev ◽  
D. V. Irtegov

The article is devoted to the technique of automated testing of NSUts – automatic assessment system for programming tasks developed at NSU. The main priority for this technique is to test both the old and the new versions of the application, so that the same or minimally modified tests could be executed on two versions of the system with different architectures. This could be useful while organizing the development process for other applications with a long life cycle. To test not only the server but also the client side of the web application, we suggest using tools like Selenium WebDriver to simulate user actions by sending commands to real browsers. We use the well-known Page Object design pattern to handle differences in HTML layout and functionality, and describe a number of ways to make developed tests less fragile and easily adapt those to work with the new version of the system. The article also describes the use of this technique to organize automated testing of the NSUts system and analyzes its effectiveness. The analysis shows that the estimated code coverage by these tests is quite high, and therefore the technique can be considered effective and applied to other similar web applications.


Author(s):  
М.Ю. Уздяев

Увеличение количества пользователей социокиберфизических систем, умных пространств, систем интернета вещей актуализирует проблему выявления деструктивных действий пользователей, таких как агрессия. При этом, деструктивные действия пользователей могут быть представлены в различных модальностях: двигательная активность тела, сопутствующее выражение лица, невербальное речевое поведение, вербальное речевое поведение. В статье рассматривается нейросетевая модель многомодального распознавания человеческой агрессии, основанная на построении промежуточного признакового пространства, инвариантного виду обрабатываемой модальности. Предлагаемая модель позволяет распознавать с высокой точностью агрессию в условиях отсутствия или недостатка информации какой-либо модальности. Экспериментальное исследование показало 81:8% верных распознаваний на наборе данных IEMOCAP. Также приводятся результаты экспериментов распознавания агрессии на наборе данных IEMOCAP для 15 различных сочетаний обозначенных выше модальностей. Growing user base of socio-cyberphysical systems, smart environments, IoT (Internet of Things) systems actualizes the problem of revealing of destructive user actions, such as various acts of aggression. Thereby destructive user actions can be represented in different modalities: locomotion, facial expression, associated with it, non-verbal speech behavior, verbal speech behavior. This paper considers a neural network model of multi-modal recognition of human aggression, based on the establishment of an intermediate feature space, invariant to the actual modality, being processed. The proposed model ensures high-fidelity aggression recognition in the cases when data on certain modality are scarce or lacking. Experimental research showed 81.8% correct recognition instances on the IEMOCAP dataset. Also, experimental results are given concerning aggression recognition on the IEMOCAP dataset for 15 different combinations of the modalities, outlined above.


Author(s):  
Cássia Blondet Baruque ◽  
Marília A. Amaral ◽  
Alexandre Barcellos ◽  
João Carlos da Silva Freitas ◽  
Carlos Juliano Longo
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document