NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Koc, Levent – ProQuest LLC, 2013
With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…
Descriptors: Bayesian Statistics, Computer Security, Computer Networks, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Barnes, Tiffany; Stamper, John – Educational Technology & Society, 2010
In building intelligent tutoring systems, it is critical to be able to understand and diagnose student responses in interactive problem solving. However, building this understanding into a computer-based intelligent tutor is a time-intensive process usually conducted by subject experts. Much of this time is spent in building production rules that…
Descriptors: Intelligent Tutoring Systems, Logical Thinking, Tutors, Probability