Sciweavers

1321 search results - page 85 / 265
» A Context Model for Personal Knowledge Management Applicatio...
Sort
View
CORR
2006
Springer
105views Education» more  CORR 2006»
13 years 8 months ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...
CE
2008
160views more  CE 2008»
13 years 9 months ago
Data mining in course management systems: Moodle case study and tutorial
Educational data mining is an emerging discipline, concerned with developing methods for exploring the unique types of data that come from the educational context. This work is a ...
Cristóbal Romero, Sebastián Ventura,...
CCS
2011
ACM
12 years 8 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
PAMI
2006
143views more  PAMI 2006»
13 years 8 months ago
Variational Bayes for Continuous Hidden Markov Models and Its Application to Active Learning
In this paper we present a variational Bayes (VB) framework for learning continuous hidden Markov models (CHMMs), and we examine the VB framework within active learning. Unlike a ...
Shihao Ji, Balaji Krishnapuram, Lawrence Carin
HICSS
2002
IEEE
140views Biometrics» more  HICSS 2002»
14 years 1 months ago
Intelligent Student Profiling with Fuzzy Models
Traditional Web-based educational systems still have several shortcomings when comparing with a real-life classroom teaching, such as lack of contextual and adaptive support, lack...
Dongming Xu, Huaiqing Wang, Kaile Su