Sciweavers

1674 search results - page 290 / 335
» Learning Actions From the Web
Sort
View
ICETE
2004
253views Business» more  ICETE 2004»
14 years 11 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
132
Voted
SIGGRAPH
2003
ACM
15 years 3 months ago
Forum: a new approach for the production of educational content
eLearning is developing at an ever increasing rate as universities and colleges recognize its vast potential to reach a deeper and fragmented student pool. For a while, eLearning ...
Christine Daviault, Marcelo Coelho
ACSAC
2009
IEEE
15 years 4 months ago
FIRE: FInding Rogue nEtworks
For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet Service Providers (ISPs). For example, organizatio...
Brett Stone-Gross, Christopher Kruegel, Kevin C. A...
ICML
2010
IEEE
14 years 10 months ago
On the Consistency of Ranking Algorithms
We present a theoretical analysis of supervised ranking, providing necessary and sufficient conditions for the asymptotic consistency of algorithms based on minimizing a surrogate...
John Duchi, Lester W. Mackey, Michael I. Jordan
JODL
2006
136views more  JODL 2006»
14 years 9 months ago
MIT's CWSpace project: packaging metadata for archiving educational content in DSpace
This paper describes work in progress on the research project CWSpace, sponsored by the MIT and Microsoft Research iCampus program, to investigate the metadata standards and protoc...
William Reilly, Robert Wolfe, MacKenzie Smith