Dissertations / Theses on the topic 'Behavioral graph'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Behavioral graph.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Torbey, Elie. "Control/data flow graph synthesis using evolutionary computation and behavioral estimation." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp02/NQ37080.pdf.
Full textTorbey, Elie Carleton University Dissertation Engineering Electronics. "Control/data flow graph synthesis using evolutionary computation and behavioral estimation." Ottawa, 1999.
Find full textBodily, Ty Alvin. "A Graph Theoretical Analysis of Functional Brain Networks Related to Memory and Healthy Aging." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7567.
Full textMahamadi, Abdelrhman. "Bond Graph Models for Human Behavior." University of Akron / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=akron1479485016074583.
Full textJanssen, Alisha L. "Physical Activity and Working Memory in Multiple Sclerosis: An Investigation of Neuropsychological and NeuroImaging Associations." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu149788064943423.
Full textFleig, John David. "Citationally Enhanced Semantic Literature Based Discovery." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1082.
Full textMacKelvie, Erin. "A Comparison of Traditional Aggregated Data to a Comprehensive Second-by-Second Data Depiction in Functional Analysis Graphs." Scholarly Commons, 2021. https://scholarlycommons.pacific.edu/uop_etds/3730.
Full textHeyman, Susanna. "Visualizing Financial Futures." Doctoral thesis, KTH, Medieteknik och interaktionsdesign, MID, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-211657.
Full textQC 20170809
Varga, Adam. "Identifikace a charakterizace škodlivého chování v grafech chování." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442388.
Full textKuhlman, Christopher James. "Generalizations of Threshold Graph Dynamical Systems." Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/76765.
Full textMaster of Science
Hu¨ttel, Hans. "Decidability, behavioural equivalences and infinite transition graphs." Thesis, University of Edinburgh, 1991. http://hdl.handle.net/1842/411.
Full textAyala-Hoffmann, Jose. "Global behavior of graph dynamics with applications to Markov chains." [Ames, Iowa : Iowa State University], 2008.
Find full textStreib, Kevin. "IMPROVED GRAPH-BASED CLUSTERING WITH APPLICATIONS IN COMPUTER VISION AND BEHAVIOR ANALYSIS." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1331063343.
Full textSaxton, Valerie Patricia. "Influence of ripening grape compounds on behavioural responses of birds." Phd thesis, Lincoln University. Agriculture and Life Sciences Division, 2004. http://theses.lincoln.ac.nz/public/adt-NZLIU20061207.121738/.
Full textSaxton, V. P. "Influence of ripening grape compounds on behavioural responses of birds." Diss., Lincoln University, 2004. http://hdl.handle.net/10182/28.
Full textHellmann, Jennifer K. "Neighbor Effects: The Influence of Colony-level Social Structure on Within-group Dynamics in a Social Fish." The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1464129648.
Full textTamersoy, Acar. "Graph-based algorithms and models for security, healthcare, and finance." Diss., Georgia Institute of Technology, 2016. http://hdl.handle.net/1853/54986.
Full textKnight, Daniel William. "Reactor behavior and its relation to chemical reaction network structure." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1438274630.
Full textRijal, Jhalendra P. "Environmental and behavioral factors associated with the infestation of vineyards by larvae of grape root borer." Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/46871.
Full textPh. D.
Agharazi, Hanieh. "A Swarm Intelligent Approach To Condition Monitoring of Dynamic Systems." Case Western Reserve University School of Graduate Studies / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=case1457024014.
Full textSuzuki, Reiji, Masanori Kato, and Takaya Arita. "Cyclic coevolution of cooperative behaviors and network structures." American Physical Society, 2008. http://hdl.handle.net/2237/11274.
Full textButler, Steven Kay. "Bounding the Number of Graphs Containing Very Long Induced Paths." Diss., CLICK HERE for online access, 2003. http://contentdm.lib.byu.edu/ETD/image/etd158.pdf.
Full textLancaster, Joseph Paul Jr. "Predicting the behavior of robotic swarms in discrete simulation." Diss., Kansas State University, 2015. http://hdl.handle.net/2097/18980.
Full textDepartment of Computing and Information Sciences
David Gustafson
We use probabilistic graphs to predict the location of swarms over 100 steps in simulations in grid worlds. One graph can be used to make predictions for worlds of different dimensions. The worlds are constructed from a single 5x5 square pattern, each square of which may be either unoccupied or occupied by an obstacle or a target. Simulated robots move through the worlds avoiding the obstacles and tagging the targets. The interactions between the robots and the robots and the environment lead to behavior that, even in deterministic simulations, can be difficult to anticipate. The graphs capture the local rate and direction of swarm movement through the pattern. The graphs are used to create a transition matrix, which along with an occupancy matrix, can be used to predict the occupancy in the patterns in the 100 steps using 100 matrix multiplications. In the future, the graphs could be used to predict the movement of physical swarms though patterned environments such as city blocks in applications such as disaster response search and rescue. The predictions could assist in the design and deployment of such swarms and help rule out undesirable behavior.
Lorins, Peterson Marthen. "A Comparative Analysis Between Context-Based Reasoning (CxBR) and Contextual Graphs (CxGs)." Master's thesis, University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2302.
Full textM.S.Cp.E.
Department of Electrical and Computer Engineering
Engineering and Computer Science
Computer Engineering
Laouadi, Rabah. "Analyse du flot de contrôle multivariante : application à la détection de comportements des programmes." Thesis, Montpellier, 2016. http://www.theses.fr/2016MONTT255.
Full textWithout executing an application, is it possible to predict the target method of a call site? Is it possible to know the types and values that an expression can contain? Is it possible to determine exhaustively the set of behaviors that an application can perform? In all three cases, the answer is yes, as long as a certain approximation is accepted.There is a class of algorithms - little known outside of academia - that can simulate and analyze a program to compute conservatively all information that can be conveyed in an expression. In this thesis, we present these algorithms called CFAs (Control flow analysis), and more specifically the multivariant k-l-CFA algorithm.We combine k-l-CFA algorithm with taint analysis, which consists in following tainted sensitive data inthe control flow to determine if it reaches a sink (an outgoing flow of the program).This combination with the integration of abstract interpretation for the values, aims to identify asexhaustively as possible all behaviors performed by an application.The problem with this approach is the high number of false positives, which requiresa human post-processing treatment.It is therefore essential to increase the accuracy of the analysis by increasing k.k-l-CFA is notoriously known as having a high combinatorial complexity, which is exponential commensurately with the value of k.The first contribution of this thesis is to design a model and most efficient implementationpossible, carefully separating the static and dynamic parts of the analysis, to allow scalability.The second contribution of this thesis is to propose a new CFA variant based on k-l-CFA algorithm -called *-CFA - , which consists in keeping locally for each variant the parameter k, and increasing this parameter in the contexts which justifies it.To evaluate the effectiveness of our implementation of k-l-CFA, we make a comparison with the Wala framework.Then, we do the same with the DroidBench benchmark to validate out taint analysis and behavior detection. Finally , we present the contributions of *-CFA algorithm compared to standard CFA algorithms in the context of taint analysis and behavior detection
Manglani, Heena R. "A neural network analysis of sedentary behavior and information processing speed in multiple sclerosis." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu15253688510945.
Full textVasseur, Baptiste. "Étude de problèmes différentiels elliptiques et paraboliques sur un graphe." Thesis, Littoral, 2014. http://www.theses.fr/2014DUNK0400/document.
Full textAfter a quick presentation of usual notations for the graph theory, we study the set of harmonic functions on graphs, that is, the functions whose laplacian is zero. These functions form a vectorial space. On a uniformly locally finite tree, we shaw that this space has dimension one or infinity. When the graph has an infinite number of cycles, this result change and we describe some examples showing that there exists a graph on which the harmonic functions form a vectorial space of dimension n, for all n. We also treat the case of a particular periodic graph. Then, we study more precisely the eigenvalues of infinite dimension. In this case, the eigenspace contains a subspace isomorphic to the set of bounded sequences. An inequality concerning the spectral is given when edges length is equal to one. Examples show that these inclusions are optimal. We also study the asymptotic behavior of eigenvalues for elliptic operators under dynamical Kirchhoff node conditions. We write the problem as a Sturm-Liouville operator and we transform it in a matrix problem. Then we find a characteristic equation whose zeroes correspond to eigenvalues. We deduce a formula for the asymptotic behavior. In the last chapter, we study the stability of stationary solutions for some reaction-diffusion problem whose the non-linear term is polynomial
Visockas, Vilius. "Comparing Expected and Real–Time Spotify Service Topology." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-96352.
Full textSpotify är en växande musikströmningstjänst som möjliggör för dess användare att lyssna på sin favoritmusik. Med ett snabbt växande användartal, följer en tillväxt i kapacitet som måste tillhandahållas genom deras datacenter. Denna växande kapacitet är nödvändig trots det faktum att mycket av deras innehåll hämtas från andra användare via en peer-to-peer modell. Spotifys backend (den infrastruktur som kör Spotifys tjänster) består av ett antal distinkta typer som tillhandahåller bl.a. sökning och lagring. I takt med att deras backend växer, ökar risken att tjänster missköter sig. Därför är det inte bara viktigt för Spotifys driftgrupp, utan även för deras utvecklare, att förstå hur dessa kommunicerar. Detta problem är en utmaning p.g.a. deras storskaliga infrastruktur, och blir större i takt med att den växer. Företaget strävar efter tillväxt och förväntar detta i både antalet användare och tillgängligt innehåll. Stadigt ökande funktioner och antalet distinkta plattformar bidrar till komplexitet. Ytterligare en utmaning är att bidra med verktyg som kan användas av driftgrupp för att tillhandahålla information i ett tillgängligt och överskådligt format, och att förhoppningsvis integrera dessa i en daglig arbetsrutin. Det slutgiltiga målet är att designa, utveckla, implementera och utvärdera ett verktyg som låter deras driftgrupp (och utvecklare) förstå beteenden i olika tjänster som finns i Spotifys infrastruktur. Då dessa tjänster är utplacerade på olika servrar, reflekteras kommunikationen mellan dem i deras nätverketskommunikation. För att förstå tjänsternas beteende när det potentiellt kan finnas tusentals servrar bör vi leta efter mönster i topologin, istället för beteenden på individuella servrar.
Zhang, Don C. "Using Icon Array as a Visual Aid for Communicating Validity Information." Bowling Green State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1459517352.
Full textAvelin, Benny. "Boundary Behavior of p-Laplace Type Equations." Doctoral thesis, Uppsala universitet, Analys och tillämpad matematik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-198008.
Full textLuquette, Allana Duncan. "The effects of graphic display and training in visual inspection on teachers' detection of behavior change." [Tampa, Fla.] : University of South Florida, 2004. http://purl.fcla.edu/fcla/etd/SFE0000584.
Full textMiller, Eric J. ""Effects of Grape Seed Extract, Lutein, and Omega-3 Fatty Acids on Lens Epithelial Cell Behavior In Vitro and Ex Vivo"." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1397743093.
Full textZareen, Farhath. "Detecting RTL Trojans Using Artificial Immune Systems and High Level Behavior Classification." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7992.
Full textKuhlman, Christopher J. "High Performance Computational Social Science Modeling of Networked Populations." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/51175.
Full textPh. D.
Johnson, Thomas Alex. "Integrating models and simulations of continuous dynamic system behavior into SysML." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24768.
Full textTan, Enhua. "Spam Analysis and Detection for User Generated Content in Online Social Networks." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1365520334.
Full textEl, Meligy Abdelhamid Sherif Hanie. "Providing High Performance Computing based Models as a Service: Architecture and Services for Modeling Contagions on Large Networked Populations." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/84456.
Full textPh. D.
Song, Hyunjin. "A Dynamic Longitudinal Examination of Social Networks and Political Behavior: The Moderating Effect of Local Network Properties and Its Implication for Social Influence Processes." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1427490761.
Full textKnight, Christopher J. "Hydrogen bond topology order/disorder transitions in ice and the behavior of defects in a disordered ice lattice /." Columbus, Ohio : Ohio State University, 2009. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1236788109.
Full textSiddiqui, Asher. "Capturing JUnit Behavior into Static Programs : Static Testing Framework." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-5510.
Full textIn this research paper, it evaluates the benefits achievable from static testing framework by analyzing and transforming the JUnit3.8 source code and static execution of transformed code. Static structure enables us to analyze the code statically during creation and execution of test cases. The concept of research is by now well established in static analysis and testing development. The research approach is also increasingly affecting the static testing process and such research oriented work has proved particularly valuable for those of us who want to understand the reflective behavior of JUnit3.8 Framework.
JUnit3.8 Framework uses Java Reflection API to invoke core functionality (test cases creation and execution) dynamically. However, Java Reflection API allows developers to access and modify structure and behavior of a program. Reflection provides flexible solution for creating test cases and controlling the execution of test cases. Java reflection helps to encapsulate test cases in a single object representing the test suite. It also helps to associate each test method with a test object. Where reflection is a powerful tool to perform potential operations, on the other hand, it limits static analysis. Static analysis tools often cannot work effectively with reflection.
In order to avoid the reflection, Static Testing Framework provides a static platform to analyze the JUnit3.8 source code and transform it into non-reflective version that emulates the dynamic behavior of JUnit3.8. The transformed source code has possible leverage to replace reflection with static code and does same things in an execution environment of Static Testing Framework that reflection does in JUnit3.8. More besides, the transformed code also enables execution environment of Static Testing Framework to run test methods statically. In order to measure the degree of efficiency, the implemented tool is evaluated. The evaluation of Static Testing Framework draws results for different Java projects and these statistical data is compared with JUnit3.8 results to measure the effectiveness of Static Testing Framework. As a result of evaluation, STF can be used for static creation and execution of test cases up to JUnit3.8 where test cases are not creating within a test class and where real definition of constructors is not required. These problems can be dealt as future work by introducing a middle layer to execute test fixtures for each test method and by generating test classes as per real definition of constructors.
Yonder, Erkan. "Pricing To Market: An Evaluation For Turkey." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608568/index.pdf.
Full text#8217
s exports and the estimated pricing to market elasticities are compared as well. In general, we find that there is pricing to market in the exports of Turkey for the investigated sectors.
Costa, Wander Lairson. "Avanços no estudo de complexidade em linguagem regular de autômatos celulares elementares." Universidade Presbiteriana Mackenzie, 2013. http://tede.mackenzie.br/jspui/handle/tede/1431.
Full textUniversidade Presbiteriana Mackenzie
Cellular automata are totally discrete systems that act locally in a simple and deterministic way, but whose resulting global behavior can be extremely complex. The set of possible global configurations in one finite time step for a CA can be described by a regular language, which in turn can be represented by a finite automaton, more precisely the so-called process graph, in which all states are initial and final. Here, we study the temporal evolution complexity of the elementary cellular automata (i.e., one-dimensional, binary, with radius 1), and related previous works are revisited and discussed, indicating problems and their consequences. We also start up a novel approach for the problem, substituting the process graph based representation that describes the configuration at each time step by adjacency matrices derived from them. In fact, we extend the classical adjacency matrix notation, as they cannot fully represent process graphs. With this new notation, we show that it is possible to obtain the algorithm to generate a process graph for an arbitrary finite time step for each of the rules at study. In conclusion, although advancing the limit graph problem, it still remains open, and we provide suggestions for further research.
Autômatos celulares são sistemas totalmente discretos que agem localmente de forma simples e determinística, mas cujo comportamento global resultante pode ser extremamente complexo. O conjunto de possíveis configurações globais em um passo de tempo t finito para um autômato celular pode ser descrito por uma linguagem regular, a qual por sua vez pode ser representada por meio de um autômato finito, mais precisamente, pelo chamado grafo de processo, em que todos os estados são iniciais e finais. Estuda-se aqui a complexidade da evolução temporal dos autômatos celulares elementares (i.e., unidimensionais, binários, de raio 1), e trabalhos anteriores são revisitados e discutidos, no quais apontam-se problemas e suas consequências. Também inicia-se uma nova abordagem para o problema, substituindo a representação dos grafos de processo que descrevem a configuração a cada passo de tempo por matrizes de adjacência deles derivadas. De fato, estende-se a notação clássica de matriz de adjacência, já que ela se mostra insuficiente para descrever completamente os grafos de processo em questão. Com essa nova notação, mostra-se que é possível obter o algoritmo que gere o grafo de processo de tempo t para cada uma das regras estudadas. Conclui-se que, embora houve avanços para o problema do grafo limite, este ainda permanece aberto, e sugestões para continuação da pesquisa são dadas.
Todeschini, Adrien. "Probabilistic and Bayesian nonparametric approaches for recommender systems and networks." Thesis, Bordeaux, 2016. http://www.theses.fr/2016BORD0237/document.
Full textWe propose two novel approaches for recommender systems and networks. In the first part, we first give an overview of recommender systems and concentrate on the low-rank approaches for matrix completion. Building on a probabilistic approach, we propose novel penalty functions on the singular values of the low-rank matrix. By exploiting a mixture model representation of this penalty, we show that a suitably chosen set of latent variables enables to derive an expectation-maximization algorithm to obtain a maximum a posteriori estimate of the completed low-rank matrix. The resulting algorithm is an iterative soft-thresholded algorithm which iteratively adapts the shrinkage coefficients associated to the singular values. The algorithm is simple to implement and can scale to large matrices. We provide numerical comparisons between our approach and recent alternatives showing the interest of the proposed approach for low-rank matrix completion. In the second part, we first introduce some background on Bayesian nonparametrics and in particular on completely random measures (CRMs) and their multivariate extension, the compound CRMs. We then propose a novel statistical model for sparse networks with overlapping community structure. The model is based on representing the graph as an exchangeable point process, and naturally generalizes existing probabilistic models with overlapping block-structure to the sparse regime. Our construction builds on vectors of CRMs, and has interpretable parameters, each node being assigned a vector representing its level of affiliation to some latent communities. We develop methods for simulating this class of random graphs, as well as to perform posterior inference. We show that the proposed approach can recover interpretable structure from two real-world networks and can handle graphs with thousands of nodes and tens of thousands of edges
Hart, M. J. Alexandra. "Action in Chronic Fatigue Syndrome: an Enactive Psycho-phenomenological and Semiotic Analysis of Thirty New Zealand Women's Experiences of Suffering and Recovery." Thesis, University of Canterbury. Social and Political Sciences, 2010. http://hdl.handle.net/10092/5294.
Full textRangel, Guilherme [Verfasser]. "Behavioral congruences and verification of graph transformation systems with applications to model refactoring / vorgelegt von Guilherme Salum Rangel." 2008. http://d-nb.info/991732073/34.
Full textHsu, Chun-Hsien, and 許峻舷. "Behaviors of the Colin de Verdière graph invariant under some graph operations." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/xn9q7y.
Full textLee, Fong-Ruei, and 李豐瑞. "Graph-Based Behavior Analysis for User Verification." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/09716758079271523860.
Full text國立臺灣科技大學
資訊工程系
98
Part of our lives exist in an electronic community. Many of our activities rely on web services like searching for coffee shops, paying money to banks, even scheduling our daily activities. Many of the services need a veri cation process to confirm our identity and user privilege. In network, unlawful users may issue attacks to steal information through the Internet. The verification step can help us to distinguish between the lawful users and intruders. In a host, user without enough privilege may gain access to data they are not supposed to see. We propose a mechanism to allow automatic verification given nothing but user computer usage profile. We discuss two types of computer usages: network usage and host usage. The proposed method can monitor the network or host data for user profiling and to decide the user identity. In network environment, the user may use web to obtain valuable information. To avoid network attacks, we usually adopt Intrusion detection systems (IDS) to enhance network security. More specifically, given alert sequences generated by IDS, we would like to spot the subsequences with malicious behavior. The challenge in this case is to filter out the false alarms in the alert sequences. In a host, users may run processes for their tasks like compiling Java codes, surfing the web, or playing online games. In this case, the input is process sequence and our goal is to distinguish user identities with different user profiles. The input like alert sequences or process sequences is one kind of sequential data. Different from other sequential data, to deal with the network or host sequential data, we may encounter some difficulties. The subsequences generated from different users with different intentions may interleave with each other. Also, the data may be noisy so that the typical user profile is hard to describe. Here, we propose an approach for verification based on the behaviors extracted from the event sequence like alert sequence or process sequence. We use graph to describe a subsequence with certain intention. The graph is built by a Markov Chain model with sliding window to describe the behavior from the sequence. To distinguish between two behaviors, we propose a graph-based dissimilarity measure. Finally, we use the manifold learning to represent the behaviors and to detect the malicious behavior or the unauthorized access. The experiment results show that the proposed method can reach high detection accuracy while maintaining low false positives.
Rose, Daniel John. "Asymptotic behavior of combinatorial optimization and proximity graphs on random point sets /." Diss., 2000. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:9982856.
Full textSHAN-YUNTENG and 鄧善云. "Learning Spatial-Temporal User Behaviors with Symbolic Graphs." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/e23ujd.
Full text國立成功大學
資訊工程學系
107
Recently, interesting user behaviors have been found in different fields. Therefore, many research focuses on understanding user behaviors, needs, and motivations through observation techniques, data analysis, and machine learning methodologies. By learning different user behaviors, the prediction of user behaviors can lead to applications for indispensable services such as trajectory patterns mining, social links prediction, and personalized recommender systems. Due to the high penetration rate of cost-effective mobile devices, it becomes possible to continuously collect user behavior records with temporal and spatial information. As such, many spatial-temporal learning methodologies have been proposed to figure out the hidden information of user behaviors with the spatial or temporal sense. In my dissertation, we attempt to learn spatial-temporal user behaviors which are left unexplored thus far in different scenarios such as indoor spaces, social networks, and E-learning systems. More specifically, we investigated the following three kinds of user behaviors, spatial-temporal stop-by behaviors in indoor spaces, temporal worship behaviors in celebrity-dived networks, and temporal rating behaviors in E-learning systems. Learning Spatial-Temporal Stop-by Behaviors with Uncertain Symbolic Graphs in Indoor Spaces: In this work, we explore a new mining paradigm, called Indoor Stop-by Patterns (ISP), to discover user stop-by behavior in mall-like indoor environments. The discovery of ISPs enables new marketing collaborations, such as a joint coupon promotion, among stores in indoor spaces (e.g., shopping malls). Moreover, it can also help in eliminating the overcrowding situation. To pursue better practicability, we consider the cost-effective wireless sensor-based environment and conduct the analysis of indoor stop-by behaviors on real data. The proposed Probabilistic Top-k Indoor Stop-by Patterns Discovery (PTkISP) framework incorporates the probabilistic model to identify top-k ISPs over uncertain data collected from sensing logs. Moreover, we develop an uncertain symbolic model and devise an Index 1-itemset (IIS) algorithm to enhance the accuracy and efficiency. Our experimental studies on one synthetic data and one real data show that the proposed PTkISP framework can efficiently discover high-quality ISPs and can provide insightful observations for marketing collaborations. Learning Temporal Worship Behaviors with Heterogeneous Symbolic Graph in Celebrity-Dived Networks: We in this work explore a new link prediction paradigm, called ‘worship’ prediction, to discover worship links between users and celebrities on celebrity-dived networks. The prediction of ‘worship’ links enables valuable social services, such as viral marketing, popularity estimation, and celebrity recommendation. However, as the concern of business security and personal privacy, only public-accessible statistical social properties, instead of the detailed information of users, can be utilized to predict the ‘worship’ labels. To address these issues, a novel learning framework is devised, including a heterogeneous factor graph with new discovered statistical properties and a Gaussian estimation based learning algorithm with active learning. Our experimental studies on real data, including Instagram, Twitter, and DBLP, show that the proposed learning framework can overcome the problem of missing labels and efficiently discover worship links. Learning Temporal Rating Behaviors with Dependent Symbolic Graphs in E-Learning Systems: In this work, we address an important issue on the exploration of user rating behaviors from an interactive question-answering process in E-learning systems. A novel interactive learning system, called CagMab, is devised to interactively recommend questions with a round-by-round strategy, which contributes to applications such as a conversational bot for self-evaluation. The flow enables users to discover their weakness and further helps them to progress. Even though formulating the problem with the multi-armed bandit framework provides a solution, it often leads to suboptimal results for interactive unknowns recommendation as it simply relies on the contextual features of answered questions. To address this issue, we develop a novel interactive learning framework by borrowing strengths from the dependency of concept-aware graphs for learning user ratings. Our experimental studies on real data show that the proposed framework can effectively predict user ratings in an interactive fashion for the recommendation in E-learning systems. In summary, we in my dissertation focus on learning spatial-temporal user behaviors with symbolic graphs in indoor spaces, social networks, and E-learning systems. The experimental results of learning the proposed user behaviors show that incorporating symbolic graphs with machine learning algorithms can significantly improve the accuracy performances.
Agarwal, Manish. "Viewing Behavior Model Graphs (VBMG) for characterizing user viewing behavior in program visualizations." 2007. http://purl.galileo.usg.edu/uga%5Fetd/agarwal%5Fmanish%5F%5F200705%5Fms.
Full text