Sciweavers

2001 search results - page 377 / 401
» An Update on Generalized Information Theory
Sort
View
EUROCRYPT
2007
Springer
14 years 1 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
GECCO
2007
Springer
163views Optimization» more  GECCO 2007»
14 years 1 months ago
Interactive evolution of XUL user interfaces
We attack the problem of user fatigue by using an interactive genetic algorithm to evolve user interfaces in the XUL interface definition language. The interactive genetic algori...
Juan C. Quiroz, Sushil J. Louis, Sergiu M. Dascalu
GECCO
2007
Springer
256views Optimization» more  GECCO 2007»
14 years 1 months ago
A particle swarm optimization approach for estimating parameter confidence regions
Point estimates of the parameters in real world models convey valuable information about the actual system. However, parameter comparisons and/or statistical inference requires de...
Praveen Koduru, Stephen Welch, Sanjoy Das
GECCO
2007
Springer
168views Optimization» more  GECCO 2007»
14 years 1 months ago
Evolutionary benefits of evolvable component integration
A system composed of multiple interacting components is capable of responding to contextual information and producing a higher range of non-linear responses to stimuli compared to...
David Malkin, R. Beau Lotto
ICMI
2007
Springer
199views Biometrics» more  ICMI 2007»
14 years 1 months ago
Interest estimation based on dynamic bayesian networks for visual attentive presentation agents
In this paper, we describe an interface consisting of a virtual showroom where a team of two highly realistic 3D agents presents product items in an entertaining and attractive wa...
Boris Brandherm, Helmut Prendinger, Mitsuru Ishizu...