Sciweavers

7475 search results - page 1452 / 1495
» Supporting use case based requirements engineering
Sort
View
WSDM
2010
ACM
214views Data Mining» more  WSDM 2010»
16 years 1 months ago
Pairwise Interaction Tensor Factorization for Personalized Tag Recommendation
Tagging plays an important role in many recent websites. Recommender systems can help to suggest a user the tags he might want to use for tagging a specific item. Factorization mo...
Steffen Rendle, Lars Schmidt-Thieme
ATAL
2009
Springer
15 years 10 months ago
Reward shaping for valuing communications during multi-agent coordination
Decentralised coordination in multi-agent systems is typically achieved using communication. However, in many cases, communication is expensive to utilise because there is limited...
Simon A. Williamson, Enrico H. Gerding, Nicholas R...
MM
2005
ACM
371views Multimedia» more  MM 2005»
15 years 9 months ago
Data grid for large-scale medical image archive and analysis
Storage and retrieval technology for large-scale medical image systems has matured significantly during the past ten years but many implementations still lack cost-effective backu...
H. K. Huang, Aifeng Zhang, Brent J. Liu, Zheng Zho...
ISRR
2005
Springer
149views Robotics» more  ISRR 2005»
15 years 9 months ago
Emergence, Exploration and Learning of Embodied Behavior
A novel model for dynamic emergence and adaptation of embodied behavior is proposed. A musculo-skeletal system is controlled by a number of chaotic elements, each of which driving...
Yasuo Kuniyoshi, Shinsuke Suzuki, Shinji Sangawa
CCS
2003
ACM
15 years 9 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
« Prev « First page 1452 / 1495 Last » Next »