Sciweavers

1527 search results - page 130 / 306
» What About Wednesday
Sort
View
COGSCI
2004
108views more  COGSCI 2004»
13 years 10 months ago
Making the ineffable explicit: estimating the information employed for face classifications
When we look at a face, we readily perceive that person's gender, expression, identity, age, and attractiveness. Perceivers as well as scientists have hitherto had little suc...
Michael C. Mangini, Irving Biederma
ABIALS
2008
Springer
14 years 4 months ago
Anticipative Control of Voluntary Action: Towards a Computational Model
Abstract. Human action is goal-directed and must thus be guided by anticipations of wanted action effects. How anticipatory action control is possible and how it can emerge from ex...
Pascal Haazebroek, Bernhard Hommel
WDAG
2009
Springer
160views Algorithms» more  WDAG 2009»
14 years 2 months ago
Brief Announcement: The Minimum Failure Detector for Non-Local Tasks in Message-Passing Systems
This paper defines the basic notions of local and non-local tasks, and determines the minimum information about failures that is necessary to solve any non-local task in message-p...
Carole Delporte-Gallet, Hugues Fauconnier, Sam Tou...
RAID
1999
Springer
14 years 2 months ago
IDS Standards: Lessons Learned to Date
: I will discuss two efforts to get Intrusion Detection Systems to work together - the Common Intrusion Detection Framework (CIDF), and the IETF's working group to develop an ...
Stuart Staniford-Chen
MANSCI
2007
198views more  MANSCI 2007»
13 years 10 months ago
Real Options in Technology Licensing
“Real options” is often viewed as a valuable managerial tool of flexibility and exploration in new technology investment. Real options theory has been criticized, however, due...
Arvids A. Ziedonis