Sciweavers

729 search results - page 53 / 146
» A practical method for courseware evaluation
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 2 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
ICC
2007
IEEE
14 years 2 months ago
Locating Congested Segments on the Internet by Clustering the Delay Performance of Multiple Paths
— A practical method of locating congested segments on the Internet by periodic end-to-end packet delay measurements along multiple paths is presented. This method is a network t...
Atsuo Tachibana, Shigehiro Ano, Toru Hasegawa, Mas...
IDA
2005
Springer
14 years 1 months ago
Learning from Ambiguously Labeled Examples
Inducing a classification function from a set of examples in the form of labeled instances is a standard problem in supervised machine learning. In this paper, we are concerned w...
Eyke Hüllermeier, Jürgen Beringer
MLCW
2005
Springer
14 years 1 months ago
Lessons Learned in the Challenge: Making Predictions and Scoring Them
In this paper we present lessons learned in the Evaluating Predictive Uncertainty Challenge. We describe the methods we used in regression challenges, including our winning method ...
Jukka Kohonen, Jukka Suomela
WAIM
2009
Springer
14 years 7 days ago
Intervention Events Detection and Prediction in Data Streams
Abstract. Mining interesting patterns in data streams has attracted special attention recently. This study revealed the principles behind observations, through variation of interve...
Yue Wang, Changjie Tang, Chuan Li, Yu Chen, Ning Y...