Sciweavers

4911 search results - page 770 / 983
» Personal Learning Environments
Sort
View
112
Voted
CCS
2011
ACM
13 years 11 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
CODASPY
2012
13 years 6 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
ICPR
2008
IEEE
16 years 3 days ago
Detecting global motion patterns in complex videos
Learning dominant motion patterns or activities from a video is an important surveillance problem, especially in crowded environments like markets, subways etc., where tracking of...
Min Hu, Mubarak Shah, Saad Ali
84
Voted
ICML
2003
IEEE
15 years 11 months ago
Planning in the Presence of Cost Functions Controlled by an Adversary
We investigate methods for planning in a Markov Decision Process where the cost function is chosen by an adversary after we fix our policy. As a running example, we consider a rob...
H. Brendan McMahan, Geoffrey J. Gordon, Avrim Blum
WWW
2004
ACM
15 years 11 months ago
Combining individual tutoring with automatic course sequencing in WBT systems
Usually, the success of systems using automatic course sequencing depends strongly on careful authoring and foreseeing of all curriculum alternatives before any learning session e...
Denis Helic, Hermann A. Maurer, Nick Scerbakov