Abstract. This paper is about the evaluation of the results of clustering algorithms, and the comparison of such algorithms. We propose a new method based on the enrichment of a se...
This article constructs a foundation for warfare at the individual level, where agents in two groups fire and absorb shots according to a non-stationary Poisson process. We determ...
Intelligent tutoring systems help students acquire cognitive skills by tracing students’ knowledge and providing relevant feedback. However, feedback that focuses only on the cog...
Ido Roll, Ryan Shaun Baker, Vincent Aleven, Bruce ...
The k-anonymity model is a privacy-preserving approach that has been extensively studied for the past few years. To minimize the information loss due to anonymization, it is cruci...
We test a method of clustering dialects of English according to patterns of shared phonological features. Previous linguistic research has generally considered phonological feature...
Naomi Nagy, Xiaoli Zhang, George Nagy, Edgar W. Sc...