Sciweavers

288 search results - page 57 / 58
» What Happened
Sort
View
ICAD
2004
13 years 8 months ago
Listening to the Mind Listening
The following explains what mappings have been chosen for a sonification of several data channels from set containing a recording of the neural activity of a person listening to a...
Hans Van Raaij
IJCAI
1997
13 years 8 months ago
Reasoning about Concurrent Execution Prioritized Interrupts, and Exogenous Actions in the Situation Calculus
As an alternative to planning, an approach to highlevel agent control based on concurrent program execution is considered. A formal definition in the situation calculus of such a ...
Giuseppe De Giacomo, Yves Lespérance, Hecto...
AI
2008
Springer
13 years 7 months ago
The well-designed young mathematician
This paper complements McCarthy's "The well designed child", in part by putting it in a broader context, the space of possible well designed progeny, and in part by...
Aaron Sloman
RR
2010
Springer
13 years 5 months ago
Query-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Martin Knechtel, Heiner Stuckenschmidt
CIKM
2011
Springer
12 years 7 months ago
Effective retrieval of resources in folksonomies using a new tag similarity measure
Social (or folksonomic) tagging has become a very popular way to describe content within Web 2.0 websites. However, as tags are informally defined, continually changing, and ungo...
Giovanni Quattrone, Licia Capra, Pasquale De Meo, ...