Sciweavers

16160 search results - page 108 / 3232
» How to approach humans
Sort
View
HICSS
2005
IEEE
182views Biometrics» more  HICSS 2005»
14 years 1 months ago
How the Semantic Web is Being Used: An Analysis of FOAF Documents
— Semantic Web researchers have initially focused on the representation, development and use of ontologies but paid less attention to the social and structural relationships invo...
Li Ding, Lina Zhou, Timothy W. Finin, Anupam Joshi
ICC
2009
IEEE
148views Communications» more  ICC 2009»
14 years 2 months ago
Analysis of Probabilistic Flooding: How Do We Choose the Right Coin?
Abstract—This paper studies probabilistic information dissemination in random networks. Consider the following scenario: A node intends to deliver a message to all other nodes in...
Sérgio Crisóstomo, Udo Schilcher, Ch...
CPAIOR
2009
Springer
14 years 2 months ago
Learning How to Propagate Using Random Probing
Abstract. In constraint programming there are often many choices regarding the propagation method to be used on the constraints of a problem. However, simple constraint solvers usu...
Efstathios Stamatatos, Kostas Stergiou
BLISS
2008
IEEE
14 years 2 months ago
Effecting an Improvement to the Fitness Function. How to Evolve a More Identifiable Face
Constructing the face of a criminal from the selection of individual facial parts is a hard task. We have been working on a new system called EvoFIT that involves the selection an...
Charlie D. Frowd, Joanne Park, Alex H. McIntyre, V...
ATAL
2003
Springer
14 years 1 months ago
How to calm hyperactive agents
System performance in multi-agent resource allocation systems can often improve if individual agents reduce their activity. Agents in such systems need a way to modulate their ind...
H. Van Dyke Parunak, Sven Brueckner, Robert S. Mat...