Malicious software—so called malware—poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffe...
Konrad Rieck, Philipp Trinius, Carsten Willems, Th...
- We propose a novel framework for imitation learning that helps a humanoid robot achieve its goal of learning. There are apparent discrepancies in shapes and sizes among humans an...
Woosung Yang, Nak Young Chong, ChangHwan Kim, Bum-...
Predictive state representations (PSRs) are models that represent the state of a dynamical system as a set of predictions about future events. The existing work with PSRs focuses ...
Britton Wolfe, Michael R. James, Satinder P. Singh
Admission control strategies play an important role in congestion control and in guaranteeing the quality of service in Asynchronous Transfer Mode (ATM) networks. Three categories...
Abstract. Self-efficacy is an individual's belief about her ability to perform well in a given situation. Because selfefficacious students are effective learners, endowing int...
Scott W. McQuiggan, Bradford W. Mott, James C. Les...