The modern world continues to change as Information Technology (IT) related applications proceed to evolve at a rapid pace. The need for IT continues to grow as we begin to meaning...
Daniela Marghitu, Elizabeth Zylla-Jones, Santosh B...
The cluster assumption is exploited by most semi-supervised learning (SSL) methods. However, if the unlabeled data is merely weakly related to the target classes, it becomes quest...
In the context of the emerging paradigm of Lifelong Learning, competence-based learning is gradually attracting the attention of the Technology-Enhanced Learning community, since ...
As Computer Science (CS) educators, we are involved in teaching a variety of undergraduate and graduate courses such as database management systems, networking, software developme...
Bhagyavati, Stan Kurkovsky, Christopher C. Whitehe...
We investigate the performance of of several protocol enhancements to the On-Demand Secure Byzantine Routing (ODSBR) [3] protocol in the presence of various Byzantine Attack models...
Baruch Awerbuch, Robert G. Cole, Reza Curtmola, Da...