We developed AirTransNote, an interactive learning system augmented by digital pens and PDAs for each student. All notes written on regular paper sheets are immediately digitized ...
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Support vector machines (SVMs) are regularly used for classification of unbalanced data by weighting more heavily the error contribution from the rare class. This heuristic techn...
Multiarmed bandit problem is a typical example of a dilemma between exploration and exploitation in reinforcement learning. This problem is expressed as a model of a gambler playi...
Author identification models fall into two major categories according to the way they handle the training texts: profile-based models produce one representation per author while in...