One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
We investigate how positive, neutral and negative feedback responses from an Intelligent Tutoring System (ITS) influences learners‟ affect and physiology. AutoTutor, an ITS with ...
Payam Aghaei Pour, M. Sazzad Hussain, Omar AlZoubi...
Abstract— A distributed online learning framework for support vector machines (SVMs) is presented and analyzed. First, the generic binary classification problem is decomposed in...
Protein phosphorylation is a crucial regulatory mechanism in various organisms. With recent improvements in mass spectrometry, phosphorylation site data are rapidly accumulating. D...
Jianjiong Gao, Ganesh Kumar Agrawal, Jay J. Thelen...
In engineering design the use of approximation models (= surrogate models) has become standard practice for design space exploration, sensitivity analysis, visualization and optimi...
Dirk Gorissen, Ivo Couckuyt, Karel Crombecq, Tom D...