Sciweavers

2316 search results - page 113 / 464
» The many forms of hypercomputation
Sort
View
KDD
2006
ACM
181views Data Mining» more  KDD 2006»
16 years 5 months ago
Cryptographically private support vector machines
We study the problem of private classification using kernel methods. More specifically, we propose private protocols implementing the Kernel Adatron and Kernel Perceptron learning ...
Helger Lipmaa, Sven Laur, Taneli Mielikäinen
VLSID
2002
IEEE
116views VLSI» more  VLSID 2002»
16 years 4 months ago
A Design of Analog C-Matrix Circuits Used for Signal/Data Processing
Various calculation of matrices and vectors has been used in many digital signal processing systems. Although the calculation simply repeats multiplication and addition, the reite...
Takayuki Sugawara, Yoshikazu Miyanaga, Norinobu Yo...
129
Voted
CHI
2003
ACM
16 years 4 months ago
Wan2tlk?: everyday text messaging
Texting--using a mobile phone to send text messages--has become a form of mass communication. Building on studies that described how British teenagers have incorporated text messa...
Rebecca E. Grinter, Margery Eldridge
CHI
2002
ACM
16 years 4 months ago
User activity histories
Current software interfaces fail to incorporate historical data from user interaction into their design. While some systems exhibit a minimalist use of history in the form of undo...
Etienne Pelaprat, R. Benjamin Shapiro
CHI
2001
ACM
16 years 4 months ago
Model for unistroke writing time
Unistrokes are a viable form of text input in pen-based user interfaces. However, they are a very heterogeneous group of gestures the only common feature being that all are drawn ...
Poika Isokoski