The content of information security curricula spans a wide array of topics. Because of this variety, a program needs to focus on some particular aspect and provide appropriate dep...
In a tutoring system based on an exploratory environment, it is also important to provide direct guidance to students. We endowed iList, our linked list tutor, with the ability to ...
Davide Fossati, Barbara Di Eugenio, Stellan Ohlsso...
It is often desirable to evaluate an image based on its quality. For many computer vision applications, a perceptually meaningful measure is the most relevant for evaluation; howe...
In this paper, we investigate an approach based on support vector machines (SVMs) for detection of microcalcification (MC) clusters in digital mammograms, and propose a successive ...
Issam El-Naqa, Yongyi Yang, Miles N. Wernick, Niko...
This paper describes an investigation into the refinement of context-based human behavior models through the use of experiential learning. Specifically, a tactical agent was endow...