Sciweavers

2285 search results - page 241 / 457
» Active Imitation Learning
Sort
View
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 2 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
EDM
2008
108views Data Mining» more  EDM 2008»
15 years 12 days ago
Do Students Who See More Concepts in an ITS Learn More?
Active engagement in the subject material has been strongly linked to deeper learning. In traditional teaching environments, even though the student might be presented with new con...
Moffat Mathews, Tanja Mitrovic
HCI
2007
15 years 12 days ago
Web 2.0 Technology: Future Interfaces for Technology Enhanced Learning?
Web 2.0 is an emerging catch phrase and the applications associated with it shocked the traditional eLearning world. However, is this really all new and can it be considered suitab...
Martin Ebner, Andreas Holzinger, Hermann A. Maurer
AAAI
1994
15 years 8 days ago
Learning to Coordinate without Sharing Information
Researchers in the eld of Distributed Arti cial Intelligence (DAI) have been developing e cient mechanisms to coordinate the activities of multiple autonomous agents. The need for...
Sandip Sen, Mahendra Sekaran, John Hale
ICALT
2010
IEEE
15 years 1 days ago
Towards the Generalization of Game-Based Learning: Integrating Educational Video Games in LAMS
In e-Learning the interest on the use of new kinds of highly-interactive content is increasing. In this regard video games are one of the media that is gaining momentum because of ...
Ángel del Blanco, Javier Torrente, Pablo Mo...