Search
Now showing items 1091-1100 of 1390
Latent Case Model: A Generative Approach for Case-Based Reasoning and Prototype Classification
(2014-05-26)
We present a general framework for Bayesian case-based reasoning and prototype classification and clustering -- Latent Case Model (LCM). LCM learns the most representative prototype observations of a dataset by performing ...
Quaternionic Representation of the Riesz Pyramid for Video Magnification
(2014-04-26)
Recently, we presented a new image pyramid, called the Riesz pyramid, that uses the Riesz transform to manipulate the phase in non-oriented sub-bands of an image sequence to produce real-time motion-magnified videos. In ...
Energy-Efficient Approximate Computation in Topaz
(2014-08-19)
We present Topaz, a new task-based language for computations that execute on approximate computing platforms that may occasionally produce arbitrarily inaccurate results. The Topaz implementation maps approximate tasks ...
Possibilistic Beliefs and Higher-Level Rationality
(2014-06-09)
We consider rationality and rationalizability for normal-form games of incomplete information in which the players have possibilistic beliefs about their opponents. In this setting, we prove that the strategies compatible ...
Possibilistic Beliefs and Higher-Level Rationality
(2014-06-09)
We consider rationality and rationalizability for normal-form games of incomplete information in which the players have possibilistic beliefs about their opponents. In this setting, we prove that the strategies compatible ...
Assessing the suitability of user centric design methods when applied in a developing world context
(2010)
The application of information and communication technologies to development (ICT4Dev) is widely believed to have the potential to improve livelihoods in developing regions. Within the field of HCI, it is recognised that ...
The effects of network factors on the performance of 3G UMTS applications
(2010)
3G is the wireless network technology expected to allow wireless applications to perform on par with wired applications. However 3G has factors which limit its performance. These factors include both device factors such ...
Extensibility in end-user network applications : a feature or a flaw?
(2011)
The rise in global connectivity driven by user-demand is bringing about a wave of end-user interconnectivity applications. This, coupled with the improvements in software security that have forced a shift from syntactic ...
Resolving the hydration of hexacyclic systems using ultrasonic interferometry and computer simulations
(2010)
The major part of this thesis focuses on investigating dynamic hydration behaviour of a series of hexacycylic molecules in water, by using computational techniques validated through ultrasound interferometry experiments. ...
An architecture for secure searchable cloud storage
(2012)
Cloud Computing is a relatively new and appealing concept; however, users may not fully trust Cloud Providers with their data and can be reluctant to store their files on Cloud Storage Services. The problem is that Cloud ...