Sciweavers

645 search results - page 95 / 129
» Function factorization using warped Gaussian processes
Sort
View
AMI
2008
Springer
15 years 1 months ago
Designing an Interactive Messaging and Reminder Display for Elderly
Despite the wealth of information and communication technology in society today, there appears to be a lack of acceptable information services for the growing elderly population in...
Erwin R. van Veldhoven, Martijn H. Vastenburg, Dav...
ASSETS
2010
ACM
14 years 11 months ago
Customizable keyboard
Customizable Keyboard is an on-screen keyboard designed to be flexible and expandable. Instead of giving the user a keyboard layout Customizable Keyboard allows the user to create...
Eric S. Missimer, Samuel Epstein, John J. Magee, M...
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
15 years 4 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...
ECIR
2007
Springer
15 years 17 days ago
A Bayesian Approach for Learning Document Type Relevance
Retrieval accuracy can be improved by considering which document type should be filtered out and which should be ranked higher in the result list. Hence, document type can be used...
Peter C. K. Yeung, Stefan Büttcher, Charles L...
DAGSTUHL
2006
15 years 15 days ago
A Framework for Analyzing Composition of Security Aspects
The methodology of aspect-oriented software engineering has been proposed to factor out concerns that are orthogonal to the core functionality of a system. In particular, this is a...
Jorge Fox, Jan Jürjens