Sciweavers

710 search results - page 57 / 142
» An Approach for Detecting Learning Styles in Learning Manage...
Sort
View
RAID
2007
Springer
14 years 2 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
14 years 8 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
WWW
2003
ACM
14 years 8 months ago
eduSource: Interoperable Network of Learning Object Repositories
In this paper, we describe the approach to achieve a high level of interoperability in the eduSource. The eduSource project is a panCanadian collaborative project to create a test...
Marek Hatala, Griff Richards
ATAL
2010
Springer
13 years 9 months ago
Learning multi-agent state space representations
This paper describes an algorithm, called CQ-learning, which learns to adapt the state representation for multi-agent systems in order to coordinate with other agents. We propose ...
Yann-Michaël De Hauwere, Peter Vrancx, Ann No...
ECML
2007
Springer
14 years 2 months ago
Learning an Outlier-Robust Kalman Filter
We introduce a modified Kalman filter that performs robust, real-time outlier detection, without the need for manual parameter tuning by the user. Systems that rely on high quali...
Jo-Anne Ting, Evangelos Theodorou, Stefan Schaal