By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
In previous work, we presented a tight approximate response-time analysis for tasks with offsets. While providing a tight bound on response times, the tight analysis exhibits simi...
We apply learning vector quantization to the analysis of tiling microarray data. As an example we consider the classification of C. elegans genomic probes as intronic or exonic. T...
Observation activity, on instrumented collective learning situations, enables participants to appropriate themselves corresponding systems in their own practice. In this paper, we...
Understanding knowledge representations in neural nets has been a difficult problem. Principal components analysis (PCA) of contributions (products of sending activations and conn...
Thomas R. Shultz, Yuriko Oshima-Takane, Yoshio Tak...