Sciweavers

1310 search results - page 183 / 262
» Learning the k in k-means
Sort
View
101
Voted
CHI
2007
ACM
16 years 1 months ago
Modeling and understanding students' off-task behavior in intelligent tutoring systems
We present a machine-learned model that can automatically detect when a student using an intelligent tutoring system is off-task, i.e., engaged in behavior which does not involve ...
Ryan Shaun Joazeiro de Baker
90
Voted
CHI
2001
ACM
16 years 1 months ago
Beyond command knowledge: identifying and teaching strategic knowledge for using complex computer applications
Despite experience, many users do not make efficient use of complex computer applications. We argue that this is caused by a lack of strategic knowledge that is difficult to acqui...
Suresh K. Bhavnani, Frederick Reif, Bonnie E. John
90
Voted
ICSE
2007
IEEE-ACM
16 years 27 days ago
Bug Hunt: Making Early Software Testing Lessons Engaging and Affordable
Software testing efforts account for a large part of the software development costs. We still struggle, however, to properly prepare students to perform software testing activitie...
Sebastian G. Elbaum, Suzette Person, Jonathan Doku...
92
Voted
ALT
2008
Springer
15 years 9 months ago
Entropy Regularized LPBoost
In this paper we discuss boosting algorithms that maximize the soft margin of the produced linear combination of base hypotheses. LPBoost is the most straightforward boosting algor...
Manfred K. Warmuth, Karen A. Glocer, S. V. N. Vish...
121
Voted
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
15 years 7 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto