For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
This paper addresses the issue of the explanation of the result given to the end-user by a classifier, when it is used as a decision support system. We consider machine learning cl...
Abstract. Although older people are an important user group for smart environments, there has been relatively little work on adapting natural language interfaces to their requireme...
Ravichander Vipperla, Maria Wolters, Kallirroi Geo...
Current brain-computer interface (BCI) research attempts to estimate intended operator body or cursor movements from his/her electroencephalographic (EEG) activity alone. More gene...
Agents that operate in a real-world environment have to process an abundance of information, which may be ambiguous or noisy. We present a method inspired by cognitive research tha...
Maria E. Niessen, Gert Kootstra, Sjoerd de Jong, T...