Sciweavers

273 search results - page 28 / 55
» Electricity Markets: How Many, Where and When
Sort
View
AIMS
2008
Springer
14 years 2 months ago
Cooperation under Scarcity: The Sharer's Dilemma
Abstract. Many researchers have used game theory to study the problem of encouraging cooperation in peer-to-peer and mobile ad hoc networks, where resources are provided collective...
Michael Rogers, Saleem Bhatti
DMIN
2006
115views Data Mining» more  DMIN 2006»
13 years 9 months ago
Data Mining Techniques to Study Therapy Success with Autistic Children
Autism spectrum disorder has become one of the most prevalent developmental disorders, characterized by a wide variety of symptoms. Many children need extensive therapy for years t...
Gondy Leroy, Annika Irmscher, Marjorie H. Charlop-...
ANLP
2000
109views more  ANLP 2000»
13 years 9 months ago
Predicting Automatic Speech Recognition Performance Using Prosodic Cues
In spoken dialogue systems, it is important for a system to know how likely a speech recognition hypothesis is to be correct, so it can reprompt for fresh input, or, in cases wher...
Diane J. Litman, Julia Hirschberg, Marc Swerts
LWA
2008
13 years 9 months ago
Arguing on Issues with Mathematical Knowledge Items in a Semantic Wiki
In informal collections of collaboratively created knowledge like wikis, there is no well-defined way of reporting issues with knowledge items. When something is wrong or needs im...
Christoph Lange 0002, Tuukka Hastrup, Stephane Cor...
FOCS
2005
IEEE
14 years 1 months ago
On the Impossibility of Obfuscation with Auxiliary Input
Barak et al. formalized the notion of obfuscation, and showed that there exist (contrived) classes of functions that cannot be obfuscated. In contrast, Canetti and Wee showed how ...
Shafi Goldwasser, Yael Tauman Kalai