Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 453-457.
• Big Data & Data Mining • Previous Articles Next Articles
TONG Zhen-ming1, LIU Zhi-peng2
CLC Number:
[1]NARDI B,HARRIS J.Strangers and friends:Collaborative play in World of Warcraft[C]∥International Handbook of Internet Research.Springer,2010:395-410. [2]LEE Y T,CHEN K T,CHENG Y M,et al.World of Warcraft avatar history dataset[C]∥Proceedings of the Second Annual ACM Conference on Multimedia Systems.ACM,2011:123-128. [3]TARNG P Y,CHEN K T,HUANG P.On prophesying online gamer departure[C]∥2009 8th Annual Workshop on Network and Systems Support for Games (NetGames).IEEE,2009:1-2. [4]LEE Y T,CHEN K T.Is server consolidation beneficial to MMORPG? A case study of World of Warcraft[C]∥2010 IEEE 3rd International Conference on Cloud Computing (CLOUD).IEEE,2010:435-442. [5]CHEN K T,PAO H K K,CHANG H C.Game bot identification based on manifold learning[C]∥Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games.ACM,2008:21-26. [6]CHEN K T,LIAO A,PAO H K K,et al.Game bot detection based on avatar trajectory[C]∥Entertainment Computing-ICEC 2008. Springer,2009:94-105. [7]DUCHENEAUT N,YEE N,NICKELL E,et al.The life and death of online gaming communities:a look at guilds in world of warcraft[C]∥Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.ACM,2007:839-848. [8]DUCHENEAUT N,YEE N,NICKELL E,et al.Building an MMO with mass appeal a look at gameplay in world of warcraft[J].Games and Culture,2006,1(4):281-317. [9]MITTERHOFER S,PLATZER C,KRUEGEL C,et al.Server-side bot detection in massive multiplayer online games[J].IEEE Security and Privacy,2009,7(3):29-36. [10]PLATZER C.Sequence-based bot detection in massive multi-player online games[C]∥2011 8th International Conference on Information,Communications and Signal Processing (ICICS).IEEE,2011:1-5. [11]ETTER V,KAFSI M,KAZEMI E.Been there,done that:What your mobility traces reveal about your behavior[C]∥Mobile Data Challenge by Nokia Workshop,in Conjunction with Int Conf on Pervasive Computing.2012. [12]WANG J,PRABHALA B.Periodicity based next place prediction[C]∥Nokia Mobile Data Challenge 2012 Workshop Dedicated Task.Citeseer,2012. [13]GAO H,TANG J,LIU H.Mobile location prediction in spatio-temporal context[C]∥Nokia Mobile Data Challenge Workshop.Citeseer,2012. [14]BAUMANN P,KLEIMINGER W,SANTINI S.The influence of temporal and spatial features on the performance of next-place prediction algorithms[C]∥Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing.ACM,2013:449-458. [15]TRAN L H,CATASTA M,MCDOWELL L K,et al.Next Place Prediction using Mobile Data[C]∥Proceedings of the Mobile Data Challenge Workshop (MDC 2012).2012. [16]NOULAS A,SCELLATO S,LATHIA N,et al.Mining User Mobility Features for Next Place Prediction in Location-Based Services[C]∥ICDM.Citeseer,2012:1038-1043. [17]DUDA R O,HART P E,STORK D G.Pattern classification[M].John Wiley & Sons,1999. |
[1] | ZHANG Cheng-wei, LUO Feng-e, DAI Yi. Prediction Method of Flight Delay in Designated Flight Plan Based on Data Mining [J]. Computer Science, 2020, 47(11A): 464-470. |
[2] | ZHANG Jing, YANG Jian, SU Peng. Survey of Monosyllable Recognition in Speech Recognition [J]. Computer Science, 2020, 47(11A): 172-174. |
[3] | JIA Zhi-chun, LI Xiang, YU Zhan-lin, LU Yuan, XING Xing. QoS Satisfaction Prediction of Cloud Service Based on Second Order Hidden Markov Model [J]. Computer Science, 2019, 46(9): 321-324. |
[4] | WU Jian-wei, LI Yan-ling, ZHANG Hui, ZANG Han-lin. HMM Cooperative Spectrum Prediction Algorithm Based on Density Clustering [J]. Computer Science, 2018, 45(9): 129-134. |
[5] | YUE Xin, DU Jun-wei, HU Qiang, WANG Yan-ping. Fault Tree Structure Matching Algorithm and Its Application [J]. Computer Science, 2018, 45(9): 202-206. |
[6] | GONG Fa-ming,ZHU Peng-hai. Word Segmentation Based on Adaptive Hidden Markov Model in Oilfield [J]. Computer Science, 2018, 45(6A): 97-100. |
[7] | YANG Lu, YU Shou-wen and YAN Jian-feng. Type-2 Fuzzy Logic Based Multi-threaded Data Race Detection [J]. Computer Science, 2017, 44(12): 135-143. |
[8] | LI Wei-lin, WEN Jian and MA Wen-kai. Speech Recognition System Based on Deep Neural Network [J]. Computer Science, 2016, 43(Z11): 45-49. |
[9] | YANG Bei, ZHOU Lan-jiang, YU Zheng-tao and LIU Li-jia. Research on Semi-supervised Learning Based Approach for Lao Part of Speech Tagging [J]. Computer Science, 2016, 43(9): 103-106. |
[10] | ZHANG Xiang-gang, TANG Hai, FU Chang-jun and SHI Yu-liang. Gait Recognition Algorithm Based on Hidden Markov Model [J]. Computer Science, 2016, 43(7): 285-289. |
[11] | JIA Zhi-chun and XING Xing. Diagnosis Method of Behavior Inference in Web Service Composition [J]. Computer Science, 2015, 42(4): 60-64. |
[12] | YANG Xiao-dong, CHEN Yi-qiang, YU Han-chao, LIU Jun-fa and LI Zhan-ge. Ultrasonic Waves Based Gesture Recognition Method for Wearable Equipment [J]. Computer Science, 2015, 42(10): 20-24. |
[13] | DING Yong,ZHU Hui-sheng and CAO Hong-gen. Data Flow Forecasting Based on Hybrid EHMM Models [J]. Computer Science, 2014, 41(Z6): 391-393. |
[14] | XIE Bai-lin,JIANG Sheng-yi and ZHANG Qian-sheng. Application-layer DDoS Attack Detection Based on Request Keywords [J]. Computer Science, 2013, 40(7): 121-125. |
[15] | LI Rongl,HU Zhi-jun,ZHENG Jia-heng. Improvement of Web Information Extraction Based on Genetic Algorithm and Hidden Markov Model [J]. Computer Science, 2012, 39(3): 200-205. |
|