Sciweavers

12052 search results - page 176 / 2411
» computing 2010
Sort
View
87
Voted
EXPERT
2010
107views more  EXPERT 2010»
14 years 11 months ago
Learning and Predicting the Evolution of Social Networks
Björn Bringmann, Michele Berlingerio, Frances...
EXPERT
2010
124views more  EXPERT 2010»
14 years 11 months ago
Personalized Email Prioritization Based on Content and Social Network Analysis
Yiming Yang, Shinjae Yoo, Frank Lin, Il-Chul Moon
EXPERT
2010
109views more  EXPERT 2010»
14 years 11 months ago
Satellite Control Using Rational Agent Programming
Louise A. Dennis, Michael Fisher, Alexei Lisitsa, ...
CI
2010
94views more  CI 2010»
14 years 11 months ago
Cognitive and Behavioral Model Ensembles for Autonomous Virtual Characters
Jeffrey S. Whiting, Jonathan Dinerstein, Parris K....
JCIT
2010
158views more  JCIT 2010»
14 years 9 months ago
Improvement of a Secure Convex Hull Two-Party Computation Protocol
In 2008, Wang et. al. first investigate a sort of specific secure multi-party computation--secure convex hull two-party computation, and construct two protocols based on Gift wrap...
Wenjie Zhao, Mingxing He