Author of the publication

Investigate Performance of Expected Maximization on the Knowledge Tracing Model.

, , and . Intelligent Tutoring Systems, volume 8474 of Lecture Notes in Computer Science, page 156-161. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigate Performance of Expected Maximization on the Knowledge Tracing Model., , and . Intelligent Tutoring Systems, volume 8474 of Lecture Notes in Computer Science, page 156-161. Springer, (2014)A honeypot system for wearable networks., , , , and . Sarnoff Symposium, page 199-201. IEEE, (2016)Detecting malicious morphological alterations of ECG signals in body sensor networks., and . IPSN, page 342-343. ACM, (2015)Deploying Data-Driven Security Solutions on Resource-Constrained Wearable IoT Systems., , , and . ICDCS Workshops, page 199-204. IEEE Computer Society, (2017)Patient Identity Verification Based on Physiological Signal Fusion., and . CHASE, page 90-95. IEEE Computer Society / ACM, (2017)A Novel Differential-Chaos-Shift-Keying Secure Communication Scheme., , and . SMC, page 1794-1798. IEEE, (2018)Data-Driven Detection of Sensor-Hijacking Attacks on Electrocardiogram Sensors., and . Mission-Oriented Sensor Networks and Systems (1), 163, Springer, (2019)Detecting Malicious Temporal Alterations of ECG Signals in Body Sensor Networks., and . NSS, volume 9408 of Lecture Notes in Computer Science, page 531-539. Springer, (2015)Detecting Signal Injection Attack-Based Morphological Alterations of ECG Measurements., and . DCOSS, page 127-135. IEEE Computer Society, (2016)