Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
This position paper shows how several classical methods in adaptive learning can be addressed using IMS Learning Design. After a definition of four main questions to classify adap...
Requirements for educational software could be based on an analysis of existing learning situations. In order to obtain useful information about teaching practices, an explorative ...
Luca Tateo, Giuseppina Marsico, Maria Annarumma, G...
This paper reports on a number of experiments where three different groups of artificial agents learn, forecast and trade their holdings in a real stock market scenario given exoge...
Abstract. A variant of iterative learning in the limit (cf. [LZ96]) is studied when a learner gets negative examples refuting conjectures containing data in excess of the target la...