We propose using the human body for “storing” data used in devices for the imminent ubiquitous computing era. In the future, people will use information appliances as powerful ...
Abstract. Human-computer interaction (HCI) has fundamentally changed computing. The ubiquity of HCI can be seen in several kinds of application areas, such as text editing, hyperte...
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally anal...
ID-logic uses ideas from the field of logic programming to extend second order logic with non-monotone inductive defintions. In this work, we reformulate the semantics of this lo...
Abstract. Multiclass SVMs are usually implemented by combining several two-class SVMs. The one-versus-all method using winner-takes-all strategy and the one-versus-one method imple...