Sciweavers

3556 search results - page 214 / 712
» Can machine learning be secure
Sort
View
ICALT
2008
IEEE
15 years 7 months ago
Glosser: Enhanced Feedback for Student Writing Tasks
We describe Glosser, a system that supports students in writing essays by 1) scaffolding their reflection with trigger questions, and 2) using text mining techniques to provide co...
Jorge J. Villalón, Paul Kearney, Rafael A. ...
83
Voted
ICALT
2007
IEEE
15 years 7 months ago
Applying Web Usage Mining Techniques to Discover Potential Browsing Problems of Users
In this paper, a web usage mining based approach is proposed to discover potential browsing problems. Two web usage mining techniques in the approach are introduced, including Aut...
I-Hsien Ting, Chris Kimble, Daniel Kudenko
87
Voted
ICALT
2006
IEEE
15 years 6 months ago
Social Software and the Emergence of Control
Social software, such as blogs, wikis, tagging systems and collaborative filters, treats the group as a first-class object within the system. Drawing from theories of transactiona...
Jon Dron
80
Voted
ICALT
2006
IEEE
15 years 6 months ago
Evaluation of a Queuing Theory and Systems Modeling Course Based on UML
This paper presents how a new teaching method in the way that a queuing theory and systems modeling or simulation course can be done, was evaluated by the teachers and the student...
Athanasios Perdos, Alexander Chatzigeorgiou, Georg...
72
Voted
ICALT
2005
IEEE
15 years 6 months ago
Designing a Multimedia-Based Cognitive Tool for Solving Word Problems Involving Fractions
Various studies have indicated that many students in the world faced difficulties in solving word problems especially when the problems involve fractions. A study conducted on Mal...
Azlina Ahmad, Siti Salwah Salim, Roziati Zainuddin