Sciweavers

8655 search results - page 491 / 1731
» Challenges for Trusted Computing
Sort
View
SIGPLAN
2008
15 years 4 months ago
Marketing the programming languages course
Programming languages as a required course is disappearing from undergraduate computer science programs. This is not surprising given that the course often proves to be challengin...
Stuart Reges
JWSR
2007
183views more  JWSR 2007»
15 years 4 months ago
Behaviour-Aware Discovery of Web Service Compositions
: A major challenge for Service–oriented Computing is how to discover and compose (Web) services to build complex applications. We present a matchmaking system that exploits both...
Antonio Brogi, Sara Corfini
AAMAS
1998
Springer
15 years 4 months ago
A Roadmap of Agent Research and Development
This paper provides an overview of research and development activities in the field of autonomous agents and multi-agent systems. It aims to identify key concepts and applications...
Nicholas R. Jennings, Katia P. Sycara, Michael Woo...
SYMMETRY
2010
72views more  SYMMETRY 2010»
14 years 11 months ago
Symmetric Matrix Fields in the Finite Element Method
: The theory of elasticity is used to predict the response of a material body subject to applied forces. In the linear theory, where the displacement is small, the stress tensor wh...
Gerard Awanou
497
Voted
ICA
2012
Springer
14 years 10 days ago
New Online EM Algorithms for General Hidden Markov Models. Application to the SLAM Problem
In this contribution, new online EM algorithms are proposed to perform inference in general hidden Markov models. These algorithms update the parameter at some deterministic times ...
Sylvain Le Corff, Gersende Fort, Eric Moulines