Sciweavers

1562 search results - page 62 / 313
» Learning a Scanning Understanding for
Sort
View
DSN
2008
IEEE
15 years 5 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
ICANN
2005
Springer
15 years 9 months ago
Reinforcement Learning in MirrorBot
For this special session of EU projects in the area of NeuroIT, we will review the progress of the MirrorBot project with special emphasis on its relation to reinforcement learning...
Cornelius Weber, David Muse, Mark Elshaw, Stefan W...
125
Voted
FECS
2008
148views Education» more  FECS 2008»
15 years 5 months ago
Net4Voice - New Technologies for voice-converting in barrier-free learning environment
- Net4Voice project consists in testing voice recognition techniques and methods within learning contexts. The need to support learning process with non traditional technologies de...
Raffaella Primiani, Daniela Tibaldi, Luca Garlasch...
105
Voted
ETS
2002
IEEE
121views Hardware» more  ETS 2002»
15 years 3 months ago
Interactions of organizational culture and collaboration in working and learning
This paper reports the methodologies and findings of research done by the Enterprise Social Learning Architecture (ESLA) Task into learning processes in two diverse environments w...
Irena M. Ali, Celina Pascoe, Leoni Warne
149
Voted
AIEDU
2008
162views more  AIEDU 2008»
15 years 3 months ago
Designing Learning by Teaching Agents: The Betty's Brain System
The idea that teaching others is a powerful way to learn is intuitively compelling and supported in the research literature. We have developed computer-based, domain-independent Te...
Krittaya Leelawong, Gautam Biswas