Sciweavers

572 search results - page 63 / 115
» Assessing a C
Sort
View
AIEDU
2005
185views more  AIEDU 2005»
13 years 10 months ago
A Bayesian Student Model without Hidden Nodes and its Comparison with Item Response Theory
The Bayesian framework offers a number of techniques for inferring an individual's knowledge state from evidence of mastery of concepts or skills. A typical application where ...
Michel C. Desmarais, Xiaoming Pu
BMCBI
2005
161views more  BMCBI 2005»
13 years 9 months ago
Non-linear mapping for exploratory data analysis in functional genomics
Background: Several supervised and unsupervised learning tools are available to classify functional genomics data. However, relatively less attention has been given to exploratory...
Francisco Azuaje, Haiying Wang, Alban Chesneau
TMI
2008
91views more  TMI 2008»
13 years 9 months ago
MRI-Based Automated Computer Classification of Probable AD Versus Normal Controls
Automated computer classification (ACC) techniques are needed to facilitate physician's diagnosis of complex diseases in individual patients. We provide an example of ACC usin...
Simon Duchesne, A. Caroli, C. Geroldi, Christian B...
BMCBI
2004
104views more  BMCBI 2004»
13 years 9 months ago
Discriminative topological features reveal biological network mechanisms
Background: Recent genomic and bioinformatic advances have motivated the development of numerous network models intending to describe graphs of biological, technological, and soci...
Manuel Middendorf, Etay Ziv, Carter Adams, Jen Hom...
ISI
2008
Springer
13 years 10 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham