Abstract. Reservoir computing approaches have been successfully applied to a variety of tasks. An inherent problem of these approaches, is, however, their variation in performance ...
: We present an automated detector that can predict a student’s future performance on a transfer post-test, a post-test involving related but different skills than the skills stu...
Ryan Shaun Joazeiro de Baker, Sujith M. Gowda, Alb...
The wide variety of remote sensors used in Intelligent Transportation Systems (ITS) applications (loops, probe vehicles, radar, cameras, etc.) has created a need for general method...
Daniel J. Dailey, Stuart Maclean, Fritz W. Cathey,...
Intrusion-tolerant replication enables the construction of systems that tolerate a finite number of malicious faults. An arbitrary number of faults can be tolerated during system ...
— We present an approach to optimizing the transfer of data objects within a user’s collection of computers and personal devices, subject to a variety of user-defined quality ...