Sciweavers

381 search results - page 50 / 77
» Alpha-integration of multiple evidence
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 3 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
VISUAL
1999
Springer
15 years 3 months ago
Visual Presentations in Multimedia Learning: Conditions that Overload Visual Working Memory
How should we design visual presentations to explain how a complex system works? One promising approach involves multimedia presentation of explanations in visual and verbal format...
Roxana Moreno, Richard E. Mayer
CSCW
1998
ACM
15 years 3 months ago
Design for Individuals, Design for Groups: Tradeoffs between Power and Workspace Awareness
Users of synchronous groupware systems act both as individuals and as members of a group, and designers must try to support both roles. However, the requirements of individuals an...
Carl Gutwin, Saul Greenberg
SEAL
1998
Springer
15 years 3 months ago
Genetic Programming with Active Data Selection
Genetic programming evolves Lisp-like programs rather than fixed size linear strings. This representational power combined with generality makes genetic programming an interesting ...
Byoung-Tak Zhang, Dong-Yeon Cho
ITS
2010
Springer
136views Multimedia» more  ITS 2010»
15 years 3 months ago
Do Micro-Level Tutorial Decisions Matter: Applying Reinforcement Learning to Induce Pedagogical Tutorial Tactics
Pedagogical tutorial tactics are policies for a tutor to decide the next action when there are multiple actions available. When the contents were controlled so as to be the same, l...
Min Chi, Kurt VanLehn, Diane J. Litman