Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Gaussian Process Temporal Difference (GPTD) learning offers a Bayesian solution to the policy evaluation problem of reinforcement learning. In this paper we extend the GPTD framew...
Abstract. This paper proposes a generic extension to propositional rule learners to handle multiple-instance data. In a multiple-instance representation, each learning example is r...
We describe a novel framework developed for transfer learning within reinforcement learning (RL) problems. Then we exhibit how this framework can be extended to intelligent tutorin...
Kimberly Ferguson, Beverly Park Woolf, Sridhar Mah...
The paper presents an evaluation method for e-learning platforms, based on different types of measurements collected in logs of interactions during learning sessions, and on the an...
Vlad Posea, Dan Mihaila, Stefan Trausan-Matu, Vale...