scispace - formally typeset
Search or ask a question
Topic

User modeling

About: User modeling is a research topic. Over the lifetime, 10701 publications have been published within this topic receiving 278012 citations.


Papers
More filters
Patent
06 Nov 2000
TL;DR: In this article, a system, device, and method for providing personalized services in a communication system detects physical presence of a user and provides personalized services to the user based upon the physical presence.
Abstract: A system, device, and method for providing personalized services in a communication system detects physical presence of a user and provides personalized services to the user based upon the physical presence of the user. The user is typically identified to some degree, and user-specific information is obtained based upon the identity of the user. The user-specific information is used to provide the personalized services to the user.

121 citations

Proceedings ArticleDOI
02 Nov 2003
TL;DR: Algorithms for programatically detecting and modeling temporal patterns from a record of online presence data are presented and the implications of this technology on the design of computer-mediated communication are discussed.
Abstract: People use their awareness of others' temporal patterns to plan work activities and communication. This paper presents algorithms for programatically detecting and modeling temporal patterns from a record of online presence data. We describe analytic and end-user visualizations of rhythmic patterns and the tradeoffs between them. We conducted a design study that explored the accuracy of the derived rhythm models compared to user perceptions, user preference among the visualization alternatives, and users' privacy preferences. We also present a prototype application based on the rhythm model that detects when a person is "away" for an extended period and predicts their return. We discuss the implications of this technology on the design of computer-mediated communication.

120 citations

Patent
06 May 2014
TL;DR: In this article, a computer-implemented method and system for enabling communication between networked users based on search queries and common characteristics is disclosed, where the authors relate to receiving a search query from a first user and establishing a communication link between the first users and a second user based on the first user's search query.
Abstract: A computer-implemented method and system for enabling communication between networked users based on search queries and common characteristics is disclosed. Particular embodiments relate to receiving a search query from a first user and establishing a communication link between the first user and a second user based on the first user's search query. Particular embodiments relate to receiving a first search query from a first user, receiving a second search query from a second user, determining if the first user and the second user fit within match criteria, and establishing a communication link between the first user and the second user if the first user and the second user fit within match criteria. Particular embodiments relate to receiving a first search query from a first user, receiving a second search query from a second user, determining if the first search query and the second search query fit within match criteria, determining if the first user and the second user fit within match criteria, and establishing a communication link between the first user and the second user if the first search query and the second search query fit within match criteria and if the first user and the second user fit within match criteria.

120 citations

Patent
18 Dec 2001
TL;DR: In this article, an individually targeted content delivery system and methods which allows content to be delivered to at least one set top box while preserving the privacy of the set-top box users is presented.
Abstract: An individually targeted content delivery system and methods which allows content to be delivered to at least one set top box while preserving the privacy of the set top box users. The system and methods of the present invention determine one or more user models for a set top box based on user interactions with the set top box and content to be displayed on the set top box is selected based on the user model. The present invention also allows a set top box to determine when content has been experienced by a set top box user, and to require a set top box user to experience at least one pre-defined content before other content can be viewed.

120 citations

Proceedings ArticleDOI
TL;DR: A non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time and the number of false results is decreased.
Abstract: Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.

119 citations


Network Information
Related Topics (5)
User interface
85.4K papers, 1.7M citations
89% related
Web page
50.3K papers, 975.1K citations
85% related
Web service
57.6K papers, 989K citations
85% related
Mobile computing
51.3K papers, 1M citations
85% related
Mobile device
58.6K papers, 942.8K citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202327
202269
2021150
2020167
2019194
2018216