This paper explores the role that feedback based on past actions and motivational states of the learner can have in a motivationally and metacognitively aware Intelligent Tutoring ...
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Background: We consider effects of dependence among variables of high-dimensional data in multiple hypothesis testing problems, in particular the False Discovery Rate (FDR) contro...
The primary contribution of this paper is an algorithm capable of identifying parameters in certain mixed linear/nonlinear state-space models, containing conditionally linear Gauss...
— In this paper, we discuss and evaluate our two metro wavelength division multiplexing (WDM) ring network architectures for variable-length packet traffic. The paper begins with...
Bernardi Pranggono, Rashid Mehmood, Jaafar M. H. E...