{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:54:48Z","timestamp":1729662888163,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/fuzzy.2010.5584905","type":"proceedings-article","created":{"date-parts":[[2010,9,29]],"date-time":"2010-09-29T14:06:18Z","timestamp":1285769178000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["User modeling: Through statistical analysis and an evolving classifier"],"prefix":"10.1109","author":[{"given":"Jose A.","family":"Iglesias","sequence":"first","affiliation":[]},{"given":"Plamen","family":"Angelov","sequence":"additional","affiliation":[]},{"given":"Agapito","family":"Ledezma","sequence":"additional","affiliation":[]},{"given":"Araceli","family":"Sanchis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Data Mining Tools See5 and C5 0","year":"2003","author":"quinlan","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/900051.900061"},{"key":"ref11","first-page":"982","article-title":"User profiling for computer security","author":"pepyne","year":"2004","journal-title":"Proc American Control Conference"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1109\/5326.983930","article-title":"Dna sequence classification via an expectation maximization algorithm and neural networks: a case study","volume":"31","author":"ma","year":"2001","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part C"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254307"},{"key":"ref14","article-title":"Computer intrusion: Detecting masquerades","author":"schonlau","year":"2001","journal-title":"Statistical Science"},{"article-title":"Learning and Memory: An Integrated Approach","year":"1995","author":"anderson","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/367390.367400"},{"key":"ref17","first-page":"207","article-title":"Sequence classification using statistical pattern recognition","volume":"4723","author":"iglesias","year":"2007","journal-title":"IDA"},{"key":"ref18","first-page":"111","article-title":"Learning the sequential coordinated behavior of teams from observations","volume":"2752","author":"kaminka","year":"2002","journal-title":"RoboCup"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11681960_13"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011117102175"},{"key":"ref27","article-title":"An empirical study of the naive bayes classifier","author":"rish","year":"2001","journal-title":"Proceedings of IICAI-01 Workshop on Empirical Methods in Artificial Intelligence"},{"article-title":"User and Task Analysis for Interface Design","year":"1998","author":"hackos","key":"ref3"},{"key":"ref6","first-page":"90","article-title":"Creating user profiles from a command-line interface: A statistical approach","volume":"5535","author":"iglesias","year":"2009","journal-title":"UMAP 2009 Proceedings of the 1st and 7th International Conference on User Modeling Adaptation and Personalization"},{"article-title":"C4.5: programs for machine learning","year":"1993","author":"quinlan","key":"ref29"},{"key":"ref5","first-page":"497","article-title":"Feature based modelling: A methodology for producing coherent, consistent, dynamically changing models of agents competency","author":"webb","year":"1993","journal-title":"Proceedings of the 1993 World Conference on Artificial Intelligence in Education (AI-ED'93)"},{"article-title":"Rule-based Models: A Tool for Design of Flexible Adaptive Systems","year":"2002","author":"angelov","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ESDIS.2009.4938994"},{"key":"ref2","article-title":"Technology's edge: The educational benefits of computer-aided instruction","author":"barrow","year":"2008","journal-title":"National Bureau of Economic Research"},{"key":"ref9","first-page":"109","article-title":"Wum: A web utilization miner","author":"spiliopoulou","year":"1998","journal-title":"EDBT Workshop WebDB98"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73110-8_45"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1995.380415"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2003.817053"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2008.925904"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2007.368145"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CIISP.2007.369172"},{"journal-title":"Using Unix Collected Traces of 168 Users","year":"1988","author":"greenberg","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2005.1452543"}],"event":{"name":"2010 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2010,7,18]]},"location":"Barcelona, Spain","end":{"date-parts":[[2010,7,23]]}},"container-title":["International Conference on Fuzzy Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5573642\/5583929\/05584905.pdf?arnumber=5584905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T10:36:14Z","timestamp":1497868574000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5584905\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/fuzzy.2010.5584905","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}