Sciweavers

1233 search results - page 240 / 247
» Reinforcement learning
Sort
View
SIGCSE
2006
ACM
133views Education» more  SIGCSE 2006»
14 years 4 months ago
Student progress monitoring tool using treeview
In this paper, we present an extensible visualization tool that is being used in a web-based closed laboratory system. The goal of this project is to provide a tool for both stude...
Jungsoon P. Yoo, Sung K. Yoo, Chris Lance, Judy Ha...
SIGCSE
2004
ACM
112views Education» more  SIGCSE 2004»
14 years 4 months ago
Using software testing to move students from trial-and-error to reflection-in-action
Introductory computer science students rely on a trial and error approach to fixing errors and debugging for too long. Moving to a reflection in action strategy can help students ...
Stephen H. Edwards
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
14 years 3 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
EGICE
2006
14 years 2 months ago
Evolutionary Generation of Implicative Fuzzy Rules for Design Knowledge Representation
Abstract. In knowledge representation by fuzzy rule based systems two reasoning mechanisms can be distinguished: conjunction-based and implication-based inference. Both approaches ...
Mark Freischlad, Martina Schnellenbach-Held, Torbe...
RAID
2000
Springer
14 years 2 months ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner