Sciweavers

ICWSM
2010
13 years 6 months ago
What's Worthy of Comment? Content and Comment Volume in Political Blogs
In this paper we aim to model the relationship between the text of a political blog post and the comment volume--that is, the total amount of response--that a post will receive. W...
Tae Yano, Noah A. Smith
DAGSTUHL
2007
13 years 6 months ago
BIO Logical Agents: Norms, Beliefs, Intentions in Defeasible Logic
Abstract. In this paper we follow the BOID (Belief, Obligation, Intention, Desire) architecture to describe agents and agent types in Defeasible
Guido Governatori, Antonino Rotolo
CAINE
2008
13 years 6 months ago
Matching 2D Fragments of Objects
This paper describes an algorithm that pieces together 2D fragments of an object. Matching fragments of an object is useful for solving puzzles or reassembling archaeological frag...
Catherine Stringfellow, Richard Simpson, H. Bui, Y...
ARCSF
2008
13 years 6 months ago
Nonlinear Control Based On Differential Geometry
This paper presents a study on nonlinear control systems
Gildeberto S. Cardoso, Oswaldo Ludwig, Leizer Schn...
ACL
2008
13 years 6 months ago
Event Matching Using the Transitive Closure of Dependency Relations
This paper describes a novel event-matching strategy using features obtained from the transitive closure of dependency relations. The method yields a model capable of matching eve...
Daniel M. Bikel, Vittorio Castelli
DGCI
2008
Springer
13 years 6 months ago
About the Frequencies of Some Patterns in Digital Planes Application to Area Estimators
In this paper we prove that the function giving the frequency of a class of patterns of digital planes with respect to the slopes of the plane is continuous and piecewise affine, m...
Alain Daurat, Mohamed Tajine, Mahdi Zouaoui
ICCSA
2010
Springer
13 years 6 months ago
An Identifiable Yet Unlinkable Authentication System with Smart Cards for Multiple Services
The purpose of this paper is to realize an authentication system which satisfies four requirements for security, privacy protection, and usability, that is, impersonation resistanc...
Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Ke...
AOSE
2006
Springer
13 years 6 months ago
An Agent-Environment Interaction Model
This paper develops a model for precisely defining how an agent interacts with objects in its environment through the use of its capabilities. Capabilities are recursively defined ...
Scott A. DeLoach, Jorge L. Valenzuela
ARCS
2008
Springer
13 years 6 months ago
Potentials of Branch Predictors: From Entropy Viewpoints
Predictors essentially predicts the most recent events based on the record of past events, history. It is obvious that prediction performance largely relies on regularity
Takashi Yokota, Kanemitsu Ootsu, Takanobu Baba
AISC
2008
Springer
13 years 6 months ago
Towards an Implementation of a Computer Algebra System in a Functional Language
This paper discusses the pros and cons of using a functional language for implementing a computer algebra system. The contributions of the paper are twofold. Firstly, we discuss so...
Oleg Lobachev, Rita Loogen