The explosive growth of Internet during the last years has been reflected in the ever-increasing amount of the diversity and heterogeneity of user preferences, types and features ...
David Huerva, Jeimy Velez, Silvia Baldiris, Ram&oa...
Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...
Effective teaching involves treating the presentation of new material and the assessment of students’ mastery of this material as part of a seamless and continuous feedback cycl...
Kimberle Koile, Kevin Chevalier, Michel Rbeiz, Ada...
This paper presents a new boosting (arcing) algorithm called POCA, Parallel Online Continuous Arcing. Unlike traditional boosting algorithms (such as Arc-x4 and Adaboost), that co...
Jesse A. Reichler, Harlan D. Harris, Michael A. Sa...
Research on mobile robot navigation has produced two major paradigms for mapping indoorenvironments: grid-based and topological. While grid-based methods produce accurate metric m...