Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
Modeling human behavior requires vast quantities of accurately labeled training data, but for ubiquitous people-aware applications such data is rarely attainable. Even researchers...
Daniel Peebles, Hong Lu, Nicholas D. Lane, Tanzeem...
This paper presents Gridcole, a new collaborative learning system that can be easily tailored by educators in order to support their own CSCL scenarios, using computing services pr...
Miguel L. Bote-Lorenzo, Luis M. Vaquero-Gonz&aacut...
This paper describes a three-year study conducted among chemistry instructors (professors and teaching assistants) at a post-secondary institution. The goal was to explore the int...
Synaptic plasticity is believed to underlie the formation of appropriate patterns of connectivity that stabilize stimulus-selective reverberations in the cortex. Here we present a ...