The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
One of the most popular student modeling techniques currently available is Constraint Based Modeling (CBM), which is based on Ohlsson's theory of learning from performance err...
This paper describes a new approach for detecting objects based on measuring the spatial consistency between different parts of an object. These parts are pre-defined on a set of...
The information explosion in today’s electronic world has created the need for information filtering techniques that help users filter out extraneous content to identify the righ...
Kannan Chandrasekaran, Susan Gauch, Praveen Lakkar...
— A key challenge for autonomous navigation in cluttered outdoor environments is the reliable discrimination between obstacles that must be avoided at all costs, and lesser obsta...
David M. Bradley, Ranjith Unnikrishnan, James Bagn...