Sciweavers

335 search results - page 64 / 67
» Efficiency of multimodal metaphors in the presentation of le...
Sort
View
EUROCRYPT
1997
Springer
13 years 11 months ago
Oblivious Transfers and Privacy Amplification
Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-two string OT, a sender offers two strings, one of which the other party, called the receive...
Gilles Brassard, Claude Crépeau
SDM
2004
SIAM
212views Data Mining» more  SDM 2004»
13 years 8 months ago
Clustering with Bregman Divergences
A wide variety of distortion functions, such as squared Euclidean distance, Mahalanobis distance, Itakura-Saito distance and relative entropy, have been used for clustering. In th...
Arindam Banerjee, Srujana Merugu, Inderjit S. Dhil...
UIST
2010
ACM
13 years 5 months ago
Designing adaptive feedback for improving data entry accuracy
Data quality is critical for many information-intensive applications. One of the best opportunities to improve data quality is during entry. USHER provides a theoretical, data-dri...
Kuang Chen, Joseph M. Hellerstein, Tapan S. Parikh
KDD
2005
ACM
163views Data Mining» more  KDD 2005»
14 years 7 months ago
Data Sparsity Issues in the Collaborative Filtering Framework
Abstract. With the amount of available information on the Web growing rapidly with each day, the need to automatically filter the information in order to ensure greater user effici...
Miha Grcar, Dunja Mladenic, Blaz Fortuna, Marko Gr...
BIOADIT
2004
Springer
14 years 26 days ago
The Genealogy of Biomimetics: Half a Century?s Quest for Dynamic IT
Abstract. Biologically inspired approaches to the design of general IT are presently flourishing. Investigating the scientific and historical roots of the tendency will serve to pr...
Mikkel Holm Sørensen