The problem of transfer learning, where information gained in one learning task is used to improve performance in another related task, is an important new area of research. While...
This exploratory study reports on term-long use of a discussion-based GSS by 137 undergraduate business students in a case-based core MIS course. We develop a model of student par...
Michael Parent, Derrick J. Neufeld, R. Brent Gallu...
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
We advance new active object recognition algorithms that classify rigid objects and estimate their pose from intensity images. Our algorithms automatically detect if the class or p...
We present an iterative algorithm for enforcing policies represented in a first-order logic, which can, in particular, express all transmission-related clauses in the HIPAA Priva...