Sciweavers

5456 search results - page 1066 / 1092
» General Equilibrium Theory
Sort
View
AIL
2005
99views more  AIL 2005»
14 years 11 months ago
Persuasion Dialogue in Online Dispute Resolution
In this paper we show how dialogue-based theories of argumentation can contribute to the construction of effective systems of dispute resolution. Specifically we consider the role ...
Douglas Walton, David M. Godden
SOFTWARE
2008
14 years 11 months ago
What Do We Know about Developer Motivation?
s of titles and abstracts) as irrelevant to our focus. We read the remaining 519 papers in full to establish our final list. The 92 papers we chose were originally published in the...
Tracy Hall, Helen Sharp, Sarah Beecham, Nathan Bad...
IJON
2007
88views more  IJON 2007»
14 years 11 months ago
Information maximization in face processing
This perspective paper explores principles of unsupervised learning and how they relate to face recognition. Dependency coding and information maximization appear to be central pr...
Marian Stewart Bartlett
TCSV
2008
156views more  TCSV 2008»
14 years 11 months ago
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication
Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, howe...
Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qi...
TEC
2008
127views more  TEC 2008»
14 years 11 months ago
Fingerprinting: Visualization and Automatic Analysis of Prisoner's Dilemma Strategies
Fingerprinting is a technique for generating a representation-independent functional signature for a game playing agent. Fingerprints can be used to compare agents across represent...
Daniel A. Ashlock, Eun-Youn Kim
« Prev « First page 1066 / 1092 Last » Next »