Sciweavers

15 search results - page 2 / 3
» How do I loaf here
Sort
View
ATAL
2006
Springer
13 years 10 months ago
Certified reputation: how an agent can trust a stranger
Current computational trust models are usually built either on an agent's direct experience of an interaction partner (interaction trust) or reports provided by third parties...
Trung Dong Huynh, Nicholas R. Jennings, Nigel R. S...
MHCI
2009
Springer
14 years 25 days ago
Kartta: extracting landmarks near personalized points-of-interest from user generated content
Most mobile navigation systems focus on answering the question, “I know where I want to go, now can you show me exactly how to get there?” While this approach works well for m...
Arttu Perttula, Scott Carter, Laurent Denoue
KDD
2008
ACM
142views Data Mining» more  KDD 2008»
14 years 6 months ago
Weighted graphs and disconnected components: patterns and a generator
The vast majority of earlier work has focused on graphs which are both connected (typically by ignoring all but the giant connected component), and unweighted. Here we study numer...
Mary McGlohon, Leman Akoglu, Christos Faloutsos
IJCAI
1989
13 years 7 months ago
A Theorem Prover for Prioritized Circumscription
In a recent paper, Ginsberg shows how a backward-chaining ATMS can be used to construct a theorem prover for circumscription. Here, this work is extended to handle prioritized cir...
Andrew B. Baker, Matthew L. Ginsberg
BIOSYSTEMS
2007
123views more  BIOSYSTEMS 2007»
13 years 6 months ago
Real time computation: Zooming in on population codes
Information processing in nervous systems intricately combines computation at the neuronal and network levels. Many computations may be envisioned as sequences of signal processin...
Olivier Rochel, Netta Cohen