• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 121
  • 8
  • 7
  • 6
  • 5
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 224
  • 224
  • 158
  • 72
  • 65
  • 50
  • 47
  • 43
  • 39
  • 37
  • 33
  • 31
  • 30
  • 30
  • 29
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Browsing and searching compressed documents /

Wan, Raymond. January 2003 (has links)
Thesis (Ph.D.)--University of Melbourne, Dept. of Computer Science and Software Engineering, 2004. / Typescript (photocopy). Includes bibliographical references (leaves 247-263).
52

From Tapestry to SVD a survey of the algorithms that power Recommender systems /

Huttner, Joseph. January 2009 (has links)
Thesis (B.A.)--Haverford College, Dept. of Computer Science, 2009. / Includes bibliographical references.
53

Digital media exchange : a digital media school in Pretoria

Osman, Rafeeq. January 2008 (has links)
Thesis (MArch (Prof)) -- University of Pretoria, 2008. / Abstract in English. Includes bibliographical references.
54

Barriers to e-learning job training government employee experiences in an online wilderness management course /

Eidson, Lisa Ayrdrie Kathleen. January 2009 (has links)
Thesis (MS)--University of Montana, 2009. / Title from author supplied metadata. Contents viewed on April 7, 2010. Includes bibliographical references.
55

Science and health web information utilization an investigation into knowledge building by everyday life information seekers.

Bird, Nora J. January 2008 (has links)
Thesis (Ph. D.)--Rutgers University, 2008. / "Graduate Program in Communication, Information and Library Studies." Includes bibliographical references (p. 181-190).
56

Understanding and improving navigation within electronic documents : a thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy in the University of Canterbury /

Alexander, Jason. January 2009 (has links)
Thesis (Ph. D.)--University of Canterbury, 2009. / Typescript (photocopy). Includes bibliographical references (p. 287-318). Also available via the World Wide Web.
57

Multi-stage modeling of HTML documents

Levering, Ryan Reed. January 2004 (has links)
Thesis (M.S.)--State University of New York at Binghamton, Department of Computer Science, 2004. / Includes bibliographical references.
58

User redefinition of search goals through interaction with an information retrieval system

Hider, Philip Martin January 2004 (has links)
Search goals of users of information retrieval systems have commonly been assumed to be static and well-formed. However, a significant amount of goal redefinition is detected in the studies described. A pilot study examined user behaviour at a library OPAC, showing that search results would quite frequently induce users to reconsider and revise their search goals, sometimes following up with a new search based on this revision (labeled "strong" goal redefinition). The main analysis employed transaction logs from the OCLC FirstSearch service, investigating what factors, if any, might affect the amount of goal redefinition that takes place during a search session. To this end, ten hypotheses were proposed and considered. Within each search session, logged queries were coded according to their conceptual differences or similarities, in order for indices of strong goal redefinition to be constructed: a chronological content analysis was thus performed on the transaction logs. The indices of redefinition for search sessions on different FirstSearch databases were compared. It was found that different databases induced goal redefinition to different extents. Further analysis showed that the metadata displayed by a database appeared to affect the amount of goal redefinition, and that the presence of abstracts in results was a positive factor, as was the presence of descriptors and identifiers, perhaps because of the former's hyperlinking nature on the FirstSearch interface. On the other hand, no evidence was found to indicate that abstract length has much of an effect on goal redefinition, nor hit rate or levels of precision and recall. Of the two indices of redefinition that were produced, the "refined" index showed signs of greater precision. Implications of the findings are discussed. It is suggested that goal redefinition should be considered a positive result of system feedback, and that systems should readily allow users to follow up on redefined goals. Abstracts and summaries of documents should be presented to the user as frequently as possible, and hyperlinks from key terms in the metadata should also be created to assist evolving searches. The importance of how system feedback is encountered by the user is emphasized in a new model of information retrieval, which embraces the nonconscious as part of the "cognitive viewpoint," allowing for nonconscious information wants to enter into a user's consciousness through cues encountered during the scanning of search results, triggering a redefinition of search goal. This thesis paves the way for a considerable amount of potentially important research, including: further testing and development of the index of goal redefinition; deeper transaction log analyses, perhaps using screen recorders, examining semantic content and contextualizing at the level of the query; and further identification and analysis of the factors affecting goal redefinition, across different types of information retrieval system.
59

Adaptive search in consumer-generated content environment: an information foraging perspective

Liu, Fei 01 September 2016 (has links)
Inefficiencies associated with online information search are becoming increasingly prevalent in digital environments due to a surge in Consumer Generated Content (CGC). Despite growing scholarly interest in investigating users' information search behavior in CGC environments, there is a paucity of studies that explores the phenomenon from a theory-guided angle. Drawing on Information Foraging Theory (IFT), we re-conceptualize online information search as a form of adaptive user behavior in response to system design constraints. Through this theoretical lens, we advance separate taxonomies for online information search tactics and strategies, both of which constitute essential building blocks of the search process. Furthermore, we construct a research framework that bridges the gap between online information search tactics and strategies by articulating how technology-enabled search tactics contribute to the fulfillment of strategic search goals. We validate our research framework via an online experiment by recruiting participants from Amazon Mechanical Turk (AMT). Participants were tasked to perform searches on custom-developed online review websites, which were modeled after a popular online review website and populated with real restaurant review data. Empirical findings reveal that the provision of different search features indeed engenders distinct search tactics, thereby allowing users varying levels of search determination control and search manipulation control. In turn, both types of search controls affects users' result anticipation and search costs, which when combined, determine the efficiency of goal-oriented search strategy and the utility of exploratory search strategy. This study provides valuable insights that can guide future research and practice.
60

Investigating Android permissions and intents for malware detection

Abro, Fauzia Idrees January 2018 (has links)
Today’s smart phones are used for wider range of activities. This extended range of functionalities has also seen the infiltration of new security threats. Android has been the favorite target of cyber criminals. The malicious parties are using highly stealthy techniques to perform the targeted operations, which are hard to detect by the conventional signature and behaviour based approaches. Additionally, the limited resources of mobile device are inadequate to perform the extensive malware detection tasks. Impulsively emerging Android malware merit a robust and effective malware detection solution. In this thesis, we present the PIndroid ― a novel Permissions and Intents based framework for identifying Android malware apps. To the best of author’s knowledge, PIndroid is the first solution that uses a combination of permissions and intents supplemented with ensemble methods for malware detection. It overcomes the drawbacks of some of the existing malware detection methods. Our goal is to provide mobile users with an effective malware detection and prevention solution keeping in view the limited resources of mobile devices and versatility of malware behavior. Our detection engine classifies the apps against certain distinguishing combinations of permissions and intents. We conducted a comparative study of different machine learning algorithms against several performance measures to demonstrate their relative advantages. The proposed approach, when applied to 1,745 real world applications, provides more than 99% accuracy (which is best reported to date). Empirical results suggest that the proposed framework is effective in detection of malware apps including the obfuscated ones. In this thesis, we also present AndroPIn—an Android based malware detection algorithm using Permissions and Intents. It is designed with the methodology proposed in PInDroid. AndroPIn overcomes the limitation of stealthy techniques used by malware by exploiting the usage pattern of permissions and intents. These features, which play a major role in sharing user data and device resources cannot be obfuscated or altered. These vital features are well suited for resource constrained smartphones. Experimental evaluation on a corpus of real-world malware and benign apps demonstrate that the proposed algorithm can effectively detect malicious apps and is resilient to common obfuscations methods. Besides PInDroid and AndroPIn, this thesis consists of three additional studies, which supplement the proposed methodology. First study investigates if there is any correlation between permissions and intents which can be exploited to detect malware apps. For this, the statistical significance test is applied to investigate the correlation between permissions and intents. We found statistical evidence of a strong correlation between permissions and intents which could be exploited to detect malware applications. The second study is conducted to investigate if the performance of classifiers can further be improved with ensemble learning methods. We applied different ensemble methods such as bagging, boosting and stacking. The experiments with ensemble methods yielded much improved results. The third study is related to investigating if the permissions and intents based system can be used to detect the ever challenging colluding apps. Application collusion is an emerging threat to Android based devices. We discuss the current state of research on app collusion and open challenges to the detection of colluding apps. We compare existing approaches and present an integrated approach that can be used to detect the malicious app collusion.

Page generated in 0.1115 seconds