Sciweavers

2199 search results - page 353 / 440
» Adapting Privacy-Preserving Computation to the Service Provi...
Sort
View
96
Voted
IH
2001
Springer
15 years 5 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
91
Voted
ICALT
2007
IEEE
15 years 7 months ago
A Multiagent Extension for Virtual Reality Based Intelligent Tutoring Systems
Applying Virtual Reality (VR) in combination with Intelligent Tutoring Systems (ITSs) is a promising approach to computer based learning and training. However, the classical struc...
Ricardo Imbert, Leticia Sánchez, Angé...

Publication
207views
15 years 4 months ago
Wave Like an Egyptian — Accelerometer Based Gesture  Recognition for Culture Specific Interactions
The user’s behavior and his interpretation of interactions with others is influenced by his cultural background, which provides a number of heuristics or patterns of behavior and...
Matthias Rehm, Nikolaus Bee and Elisabeth André
92
Voted
SDM
2003
SIAM
125views Data Mining» more  SDM 2003»
15 years 2 months ago
Scalable, Balanced Model-based Clustering
This paper presents a general framework for adapting any generative (model-based) clustering algorithm to provide balanced solutions, i.e., clusters of comparable sizes. Partition...
Shi Zhong, Joydeep Ghosh
120
Voted
ECAI
2010
Springer
15 years 1 months ago
Open-ended Grounded Semantics
Artificial agents trying to achieve communicative goals in situated interactions in the real-world need powerful computational systems for conceptualizing their environment. In ord...
Michael Spranger, Martin Loetzsch, Simon Pauw