For my dissertation, I am designing, implementing and evaluating the use of a new kind of "authorable" virtual peer that allows children with autism to learn about recip...
We report on the design and initial evaluation of two methods for short text input in wearable computing applications using hand gestures. A wireless data glove able to recognize ...
In this paper we present extended definitions of k-anonymity and use them to prove that a given data mining model does not violate the k-anonymity of the individuals represented in...
This workshop will explore the use of low-cost materials and tools to build textile-based interfaces. We will introduce a range methods for handcrafting textile sensors and circui...
In this paper, we report our work on spam filtering with three novel bayesian classification methods: Aggregating One-Dependence Estimators (AODE), Hidden Naïve Bayes (HNB), Loca...