Security is gaining relevance in the development of embedded devices. Toward a secure system at each level of design, this paper addresses security aspects related to Network-on-Ch...
Abstract—This paper introduces and compares some techniques used to predict the student performance at the university. Recently, researchers have focused on applying machine lear...
Nguyen Thai-Nghe, Andre Busche, Lars Schmidt-Thiem...
Two hybrid systems for classifying seven categories of human facial expression are proposed. The £rst system combines independent component analysis (ICA) and support vector mach...
Ioan Buciu, Constantine Kotropoulos, Ioannis Pitas
ontainer. In particular, an iterator abstracts away differences in specific container types, allowing you to view the collection simply as a sequence of items. A generic algorith...
This work deals with the application of kernel methods to structured relational settings such as semantic knowledge bases expressed in Description Logics. Our method integrates a n...