Results 71 to 80 of about 5,279 (162)

Simultaneous Detection of Compromised Items and Examinees with Item Preknowledge in Online Assessments Using Response Time Data

open access: yesJournal of Educational Measurement, Volume 63, Issue 1, Spring 2026.
Abstract The rapid transition from traditional paper‐and‐pencil tests to computer‐based testing systems has significantly altered the educational landscape, particularly during the COVID‐19 pandemic. While online assessments offer numerous advantages, they also present unique challenges, with test security being paramount.
Cengiz Zopluoglu
wiley   +1 more source

The Strategic Justification for BGP [PDF]

open access: yes
The Internet consists of many administrative domains, or \emph{Autonomous Systems} (ASes), each owned by an economic entity (Microsoft, AT\&T, The Hebrew University, etc.).
Levin, Hagay   +2 more
core   +1 more source

Research on Three‐Dimensional Autonomous Obstacle Avoidance Path Planning Methods for UAVs

open access: yesTransactions on Emerging Telecommunications Technologies, Volume 37, Issue 2, February 2026.
This study presents a three‐dimensional autonomous obstacle‐avoidance path planning method for unmanned aerial vehicles (UAVs) based on a deep reinforcement learning (DRL)‐enhanced Mayfly Algorithm. The traditional Mayfly Algorithm suffers from issues such as random initial population generation and slow convergence.
Chong Wu, Hao Cheng, Hua Wang
wiley   +1 more source

Multiparty Dynamics and Failure Modes for Machine Learning and Artificial Intelligence

open access: yes, 2019
An important challenge for safety in machine learning and artificial intelligence systems is a~set of related failures involving specification gaming, reward hacking, fragility to distributional shifts, and Goodhart's or Campbell's law.
Manheim, David
core   +1 more source

‘If You Thought It Was Going to Make a Difference, You'd Do It Straight Away’: School Staff Decisions to Report to Child Protection

open access: yesChild &Family Social Work, Volume 31, Issue 1, Page 408-419, February 2026.
ABSTRACT School staff make reports of concern to child protection agencies when they have concerns about child abuse and neglect. This decision has significant consequences for children, parents and communities, and for the data reports generate. Decisions occur within an ecological system context containing external, organisational, case and decision ...
Emily Keddell   +3 more
wiley   +1 more source

Improving Assessment on MOOCs Through Peer Identification and Aligned Incentives

open access: yes, 2017
Massive Open Online Courses (MOOCs) use peer assessment to grade open ended questions at scale, allowing students to provide feedback. Relative to teacher based grading, peer assessment on MOOCs traditionally delivers lower quality feedback and fewer ...
Fernando, Shantha   +5 more
core   +1 more source

Algorithmic collusion: theory & practice

open access: yes
We develop a framework to analyze the evolution of bounded memory strategies in a repeated game. In this framework, we introduce the algorithmic learning equations, a set of ordinary differential equations which characterizes the finite-time and asymptotic behavior of the stochastic interaction between learning algorithms that learn a bounded memory ...
openaire   +2 more sources

Dilemmas of dating: The case of aprioristic sexual lookism

open access: yes
Journal of Social Philosophy, EarlyView.
Rossella De Bernardi
wiley   +1 more source

Transforming European Governance: Proposals Towards Transparency, Sustainability and Efficiency for the New European Commission (2024–2029)

open access: yesFinancial Accountability &Management, Volume 42, Issue 1, Page 141-150, February 2026.
ABSTRACT The appointment of the new European Commission for the period 2024–2029 is a critical opportunity to establish a governance model that can address the Union's evolving challenges, ranging from fiscal sustainability and digital transformation to climate imperatives and democratic legitimacy.
Bernardino Benito   +2 more
wiley   +1 more source

Algorithmic Collusion Without Threats

open access: yes
There has been substantial recent concern that pricing algorithms might learn to ``collude.'' Supra-competitive prices can emerge as a Nash equilibrium of repeated pricing games, in which sellers play strategies which threaten to punish their competitors who refuse to support high prices, and these strategies can be automatically learned.
Arunachaleswaran, Eshwar Ram   +4 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy