Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
We investigate a framework where agents search for satisfying products by using referrals from other agents. Our model of a mechanism for transmitting word-of-mouth and the result...
: This study investigates blind users’ mental models of Windows environment and their strategies in coping with new desktops and applications. The relationship between users’ m...
Sri Hastuti Kurniawan, Alistair G. Sutcliffe, Paul...
The Hierarchical Mixture of Experts (HME) is a well-known tree-structured model for regression and classification, based on soft probabilistic splits of the input space. In its o...
—The paper presents a methodology that combines statistical learning with constraint optimization by locally optimizing Radio Resource Management (RRM) or system parameters of po...
Moazzam Islam Tiwana, Zwi Altman, Berna Sayra&cced...