Sciweavers

592 search results - page 75 / 119
» Learning of personalized security settings
Sort
View
IPM
2008
139views more  IPM 2008»
13 years 7 months ago
Complex adaptive filtering user profile using graphical models
This article explores how to develop complex data driven user models that go beyond the bag of words model and topical relevance. We propose to learn from rich user specific info...
Yi Zhang 0001
ETS
2000
IEEE
82views Hardware» more  ETS 2000»
13 years 7 months ago
Towards a Philosophy of Instruction
What is the nature of instructional design? Is instructional design merely the practical application of learning theories to learning situations? What elements form the building b...
J. Michael Spector
ATAL
2005
Springer
14 years 1 months ago
Fuzzy number approach to trust in coalition environment
General trust management model that we present is adapted for ad-hoc coalition environment, rather than for classic client-supplier relationship. The trust representation used in ...
Martin Rehák, Michal Pechoucek, Petr Benda
ISI
2003
Springer
14 years 29 days ago
Authorship Analysis in Cybercrime Investigation
Criminals have been using the Internet to distribute a wide range of illegal materials globally in an anonymous manner, making criminal identity tracing difficult in the cybercrime...
Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen
CSDA
2008
147views more  CSDA 2008»
13 years 7 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach