Sciweavers

1615 search results - page 112 / 323
» Computer science and decision theory
Sort
View
CSE
2009
IEEE
15 years 7 months ago
Privacy-Preserving Multi-agent Constraint Satisfaction
—Constraint satisfaction has been a very successful paradigm for solving problems such as resource allocation and planning. Many of these problems pose themselves in a context in...
Thomas Léauté, Boi Faltings
96
Voted
ISWC
2002
IEEE
15 years 5 months ago
Using Wearable Computers to Construct Semantic Representations of Physical Spaces
The representation of physical space has traditionally focused on keyphrases such as “Computer Science Building” or “Physics Department” that help us in describing and nav...
Fernando Diaz
RECOMB
2003
Springer
16 years 28 days ago
Optimizing exact genetic linkage computations
Genetic linkage analysis is a challenging application which requires Bayesian networks consisting of thousands of vertices. Consequently, computing the likelihood of data, which i...
Dan Geiger, Maáyan Fishelson
HRI
2007
ACM
15 years 4 months ago
Experiments with a robotic computer: body, affect and cognition interactions
We present RoCo, the first robotic computer designed with the ability to move its monitor in subtly expressive ways that respond to and encourage its user's own postural move...
Cynthia Breazeal, Andrew Wang, Rosalind W. Picard
PKC
2010
Springer
161views Cryptology» more  PKC 2010»
15 years 2 months ago
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
ded abstract of this paper appears in 13th International Conference on Practice and Theory in Public Key Cryptography (PKC) 2010, Lecture Notes in Computer Science Vol. ?, P. Nguye...
Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Vi...