Sciweavers

645 search results - page 95 / 129
» Function factorization using warped Gaussian processes
Sort
View
108
Voted
AMI
2008
Springer
15 years 4 months ago
Designing an Interactive Messaging and Reminder Display for Elderly
Despite the wealth of information and communication technology in society today, there appears to be a lack of acceptable information services for the growing elderly population in...
Erwin R. van Veldhoven, Martijn H. Vastenburg, Dav...
ASSETS
2010
ACM
15 years 2 months ago
Customizable keyboard
Customizable Keyboard is an on-screen keyboard designed to be flexible and expandable. Instead of giving the user a keyboard layout Customizable Keyboard allows the user to create...
Eric S. Missimer, Samuel Epstein, John J. Magee, M...
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
15 years 8 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...
ECIR
2007
Springer
15 years 4 months ago
A Bayesian Approach for Learning Document Type Relevance
Retrieval accuracy can be improved by considering which document type should be filtered out and which should be ranked higher in the result list. Hence, document type can be used...
Peter C. K. Yeung, Stefan Büttcher, Charles L...
113
Voted
DAGSTUHL
2006
15 years 3 months ago
A Framework for Analyzing Composition of Security Aspects
The methodology of aspect-oriented software engineering has been proposed to factor out concerns that are orthogonal to the core functionality of a system. In particular, this is a...
Jorge Fox, Jan Jürjens