Sciweavers

7811 search results - page 178 / 1563
» computer 2004
Sort
View
NAACL
2004
15 years 5 months ago
The Tao of CHI: Towards Effective Human-Computer Interaction
End-to-end evaluations of conversational dialogue systems with naive users are currently uncovering severe usability problems that result in low task completion rates. Preliminary...
Robert Porzel, Manja Baudis
117
Voted
CORR
2004
Springer
113views Education» more  CORR 2004»
15 years 4 months ago
An approach to membrane computing under inexactitude
In this paper we introduce a fuzzy version of symport/antiport membrane systems. Our fuzzy membrane systems handle possibly inexact copies of reactives and their rules are endowed...
Jaume Casasnovas, Joe Miró, Manuel Moya, Fr...
COMBINATORICS
2002
102views more  COMBINATORICS 2002»
15 years 4 months ago
Computation in Coxeter Groups-I. Multiplication
An efficient and purely combinatorial algorithm for calculating products in arbitrary Coxeter groups is presented, which combines ideas of Fokko du Cloux and myself. Proofs are lar...
Bill Casselman
SIAMNUM
2010
87views more  SIAMNUM 2010»
14 years 11 months ago
A Note on the Computation of All Zeros of Simple Quaternionic Polynomials
Polynomials with quaternionic coefficients located on only one side of the powers (we call them simple polynomials) may have two different types of zeros: isolated and spherical ze...
Drahoslava Janovská, Gerhard Opfer
TCC
2004
Springer
147views Cryptology» more  TCC 2004»
15 years 9 months ago
Computational Collapse of Quantum State with Application to Oblivious Transfer
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1−2...
Claude Crépeau, Paul Dumais, Dominic Mayers...