Sciweavers

186 search results - page 32 / 38
» Learning about Constraints by Reflection
Sort
View
TOOLS
1999
IEEE
14 years 5 days ago
Employing Object Technology to Expose Fundamental Object Concepts
This paper reports on the utilisation of object technology in a university-level course on software development, specifically designed for distance learning, and now enrolling ove...
Mark Woodman, Robert Griffiths, Simon Holland, Hug...
DPPI
2007
ACM
13 years 11 months ago
Reverse alarm clock: a research through design example of designing for the self
This paper documents a first attempt at "designing for the self", an approach to designing products intended to help people move closer to their idealized sense of self a...
Kursat Kursat Ozenc, James P. Brommer, Bong-keum J...
BMCBI
2006
127views more  BMCBI 2006»
13 years 8 months ago
Automatic discovery of cross-family sequence features associated with protein function
Background: Methods for predicting protein function directly from amino acid sequences are useful tools in the study of uncharacterised protein families and in comparative genomic...
Markus Brameier, Josien Haan, Andrea Krings, Rober...
EUROCRYPT
1997
Springer
13 years 11 months ago
Oblivious Transfers and Privacy Amplification
Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-two string OT, a sender offers two strings, one of which the other party, called the receive...
Gilles Brassard, Claude Crépeau
ICML
2005
IEEE
14 years 8 months ago
Healing the relevance vector machine through augmentation
The Relevance Vector Machine (RVM) is a sparse approximate Bayesian kernel method. It provides full predictive distributions for test cases. However, the predictive uncertainties ...
Carl Edward Rasmussen, Joaquin Quiñonero Ca...