Sciweavers

24529 search results - page 4827 / 4906
» Computing on Authenticated Data
Sort
View
ASSETS
2008
ACM
14 years 1 days ago
Software and technologies designed for people with autism: what do users want?
Software developers, designers and researchers have been looking to technology for solutions to help and educate people with autism for over two decades. There are many examples o...
Cynthia Putnam, Lorna Chong
ATAL
2008
Springer
14 years 1 days ago
A model of gaze for the purpose of emotional expression in virtual embodied agents
Currently, state of the art virtual agents lack the ability to display emotion as seen in actual humans, or even in hand-animated characters. One reason for the emotional inexpres...
Brent J. Lance, Stacy Marsella
ATAL
2008
Springer
14 years 1 days ago
A statistical relational model for trust learning
We address the learning of trust based on past observations and context information. We argue that from the truster's point of view trust is best expressed as one of several ...
Achim Rettinger, Matthias Nickles, Volker Tresp
AUSAI
2008
Springer
14 years 1 days ago
Character Recognition Using Hierarchical Vector Quantization and Temporal Pooling
In recent years, there has been a cross-fertilization of ideas between computational neuroscience models of the operation of the neocortex and artificial intelligence models of mac...
John Thornton, Jolon Faichney, Michael Blumenstein...
ICALP
2010
Springer
14 years 1 days ago
The Cooperative Game Theory Foundations of Network Bargaining Games
We study bargaining games between suppliers and manufacturers in a network context. Agents wish to enter into contracts in order to generate surplus which then must be divided amon...
MohammadHossein Bateni, MohammadTaghi Hajiaghayi, ...
« Prev « First page 4827 / 4906 Last » Next »