John Fischer

Learn More
The Bush Administration's proposal for establishing a Department of Homeland Security includes a function whose responsibilities include the coordination of policies and actions to protect the nation's critical infrastructure. However, the proposal did not specify criteria for how to determine criticality or which infrastructures should be considered(More)
This paper presents the application of a connection-ist control-learning system to an autonomous mini-robot. The system's design is severely constrained by the computing power and memory available on board the mini-robot and the on-board training time is greatly limited by the short life of the battery. The system is capable of rapid unsupervised learning(More)
The Bush Administration's proposal for establishing a Department of Homeland Security includes a function whose responsibilities include the coordination of policies and actions to protect the nation's critical infrastructure. However, the proposal did not specify criteria for how to determine criticality or which infrastructures should be considered(More)
A neural network approach to the classic inverted pendulum task is presented. This task is the task of keeping a rigid pole, hinged to a cart and free to fall in a plane, in a roughly vertical orientation by moving the cart horizontally in the plane while keeping the cart within some maximum distance of its starting position. This task constitutes a(More)
Inappropriate mechanical ventilation in patients with acute respiratory distress syndrome can lead to ventilator-induced lung injury (VILI) and increase the morbidity and mortality. Reopening collapsed lung units may significantly reduce VILI, but the mechanisms governing lung recruitment are unclear. We thus investigated the dynamics of lung recruitment at(More)
This thesis addresses the discretionary privacy demands of users in heterogeneous distributed systems such as ubiquitous computing environments. Because of the physical proximity and pervasiveness of personal devices, sensors, actuators, and other devices and services, ubiquitous computing environments need a powerful infrastructure for coordinating(More)
A proactive routing protocol called Multi-Mesh Tree (MMT) was developed for use in wireless ad hoc network to extend connectivity from an Internet gateway to around 20 mobile nodes in a city area. In the work presented here, we extend MMT to wireless ad hoc networks of around one hundred nodes through a clustering algorithm that is integrated into the MMT(More)
This paper evaluates recent proposals for compatibilism about doxastic freedom, and attempts to refine them by applying Fischer and Ravizza's moderate reasons-responsiveness compatibilism to doxastic freedom. I argue, however, that even this refined version of doxastic compatibilism is subject to challenging counterexamples and is more difficult to support(More)