From post

Characterizing the Effectiveness of Tutorial Dialogue with Hidden Markov Models.

, , , , , , и . Intelligent Tutoring Systems (1), том 6094 из Lecture Notes in Computer Science, стр. 55-64. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Lost Cell Recovery Technique Using Convolutional Coding at the ATM Adaptation Layer in B-ISDN/ATM., , и . Data Communication Networks and their Performance, том C-21 из IFIP Transactions, стр. 141-159. North-Holland, (1993)Factors Influencing ATM Adapter Throughput., , , , и . Multimedia Tools Appl., 2 (3): 253-271 (1996)Locally Invertible Multivariate Polynomial Matrices., , и . WCC, том 3969 из Lecture Notes in Computer Science, стр. 427-441. Springer, (2005)Diversity-based detection of security anomalies., и . HotSoS, стр. 29. ACM, (2014)Characterizing the Effectiveness of Tutorial Dialogue with Hidden Markov Models., , , , , , и . Intelligent Tutoring Systems (1), том 6094 из Lecture Notes in Computer Science, стр. 55-64. Springer, (2010)Experimental Analysis of the SABUL Congestion Control Algorithm., , и . NETWORKING, том 3042 из Lecture Notes in Computer Science, стр. 1433-1439. Springer, (2004)A Model for Sharing of Confidential Provenance Information in a Query Based System., и . IPAW, том 5272 из Lecture Notes in Computer Science, стр. 62-69. Springer, (2008)Modeling execution time of multi-stage N-version fault-tolerant software., , и . COMPSAC, стр. 505-511. IEEE, (1990)A survey of common security vulnerabilities and corresponding countermeasures for SaaS., и . GLOBECOM Workshops, стр. 59-63. IEEE, (2014)A formal model towards scientific workflow security in a cloud., и . Int. J. Cloud Comput., 7 (3/4): 226-236 (2018)