Sciweavers

710 search results - page 15 / 142
» An Approach for Detecting Learning Styles in Learning Manage...
Sort
View
ESORICS
2011
Springer
12 years 7 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
ICALT
2008
IEEE
14 years 2 months ago
NUCLEO: Adaptive Computer Supported Collaborative Learning in a Role Game Based Scenario
This paper presents the adaptation model used in NUCLEO, a pilot e-learning environment that is currently being developed at the Complutense University of Madrid. The NUCLEO syste...
Pilar Sancho, Rubén Fuentes-Fernánde...
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
13 years 11 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
NIPS
2007
13 years 9 months ago
Managing Power Consumption and Performance of Computing Systems Using Reinforcement Learning
Electrical power management in large-scale IT systems such as commercial datacenters is an application area of rapidly growing interest from both an economic and ecological perspe...
Gerald Tesauro, Rajarshi Das, Hoi Chan, Jeffrey O....
ECTEL
2006
Springer
13 years 11 months ago
Production and Deployment of Educational Videogames as Assessable Learning Objects
Abstract. The generalization of game-based Learning Objects as serious learning material requires their integration into pre-existing e-learning infrastructure (systems and courses...
Iván Martínez-Ortiz, Pablo Moreno-Ge...