We introduce a technique for detecting anomalous patterns in a categorical feature (one that takes values from a finite alphabet). It differs from most anomaly detection methods u...
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
In this paper an instructional framework is proposed for supporting personalised learning in the context of webbased adaptive educational hypermedia systems. A learning-focused ap...
Today, systems should react based on explicit demands from the learner or even proactively react based on changes in the working environment. The success of this type of systems de...
Abstract. Dealing with heterogeneous ontologies by means of semantic mappings has become an important area of research and a number of systems for discovering mappings between onto...