Sciweavers

5766 search results - page 1054 / 1154
» Reverse Engineering of Data
Sort
View
BICA
2010
14 years 11 months ago
Explanatory Aspirations and the Scandal of Cognitive Neuroscience
In this position paper we argue that BICA must simultaneously be compatible with the explanation of human cognition and support the human design of artificial cognitive systems. Mo...
Ross Gayler, Simon D. Levy, Rens Bod
CORR
2011
Springer
273views Education» more  CORR 2011»
14 years 11 months ago
Natural Language Processing (almost) from Scratch
We propose a unified neural network architecture and learning algorithm that can be applied to various natural language processing tasks including: part-of-speech tagging, chunki...
Ronan Collobert, Jason Weston, Léon Bottou,...
CSCW
2011
ACM
14 years 11 months ago
Peer interaction effectively, yet infrequently, enables programmers to discover new tools
Computer users rely on software tools to work effectively and efficiently, but it is difficult for users to be aware of all the tools that might be useful to them. While there a...
Emerson R. Murphy-Hill, Gail C. Murphy
INFORMATICALT
2011
170views more  INFORMATICALT 2011»
14 years 11 months ago
Community Detection Through Optimal Density Contrast of Adjacency Matrix
Detecting communities in real world networks is an important problem for data analysis in science and engineering. By clustering nodes intelligently, a recursive algorithm is desig...
Tianzhu Liang, Kwok Yip Szeto
TMC
2011
164views more  TMC 2011»
14 years 11 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
« Prev « First page 1054 / 1154 Last » Next »