Sciweavers

EDM
2008
121views Data Mining» more  EDM 2008»
13 years 10 months ago
Analytic Comparison of Three Methods to Evaluate Tutorial Behaviors
We compare the purposes, inputs, representations, and assumptions of three methods to evaluate the fine-grained interactions of intelligent tutors with their students. One method i...
Jack Mostow, Xiaonan Zhang
EDM
2008
289views Data Mining» more  EDM 2008»
13 years 10 months ago
Developing a Log-based Motivation Measuring Tool
The purpose of this study is to develop a conceptual framework and a tool for measuring motivation of online learners. The study was carried out in three phases, the first of which...
Arnon Hershkovitz, Rafi Nachmias
EDM
2008
108views Data Mining» more  EDM 2008»
13 years 10 months ago
Do Students Who See More Concepts in an ITS Learn More?
Active engagement in the subject material has been strongly linked to deeper learning. In traditional teaching environments, even though the student might be presented with new con...
Moffat Mathews, Tanja Mitrovic
EDM
2008
93views Data Mining» more  EDM 2008»
13 years 10 months ago
A Preliminary Analysis of the Logged Questions that Students Ask in Introductory Computer Science
Asking questions is widely believed to contribute to student learning, but little is known about the questions that students ask or how to exploit them in tutorial interventions to...
Cecily Heiner
EDM
2008
193views Data Mining» more  EDM 2008»
13 years 10 months ago
Can we predict which groups of questions students will learn from?
In a previous study ([4]), we used the ASSISTment system to track student knowledge longitudinally over the course of a schools year, based upon each student using our system about...
Mingyu Feng, Neil T. Heffernan, Joseph E. Beck, Ke...
DMIN
2008
241views Data Mining» more  DMIN 2008»
13 years 10 months ago
Leakage Detection by Adaptive Process Modeling
Abstract-- In this paper, we propose an adaptive linear approach for time series modeling and steam line leakage detection. Weighted recursive least squares (WRLS) method is used f...
Jaakko Talonen, Miki Sirola, Jukka Parviainen
DMIN
2008
158views Data Mining» more  DMIN 2008»
13 years 10 months ago
Mining User Movement Behavior Patterns in a Mobile Service Environment
Abstract - The rapid advances of wireless and web technologies enable the mobile users to request various kinds of services via mobile devices at anytime and anywhere. To provide t...
Yen-Ssu Chou, Tzung-Shi Chen
DMIN
2008
145views Data Mining» more  DMIN 2008»
13 years 10 months ago
Privacy-Preserving Classification of Horizontally Partitioned Data via Random Kernels
We propose a novel privacy-preserving nonlinear support vector machine (SVM) classifier for a data matrix A whose columns represent input space features and whose individual rows ...
Olvi L. Mangasarian, Edward W. Wild
DMIN
2008
134views Data Mining» more  DMIN 2008»
13 years 10 months ago
Political Leaning Categorization by Exploring Subjectivities in Political Blogs
This paper addresses a relatively new text categorization problem: classifying a political blog as either `liberal' or `conservative', based on its political leaning. Ins...
Maojin Jiang, Shlomo Argamon
DMIN
2008
147views Data Mining» more  DMIN 2008»
13 years 10 months ago
Naive credal classifier 2: an extension of naive Bayes for delivering robust classifications
Naive credal classifier 2 (NCC2) extends naive Bayes in order to deliver more robust classifications. NCC2 is based on a set of prior densities rather than on a single prior; as a ...
Giorgio Corani, Marco Zaffalon