Sciweavers

352 search results - page 23 / 71
» The Power of Experience: On the Usefulness of Validation Kno...
Sort
View
TKDE
2010
158views more  TKDE 2010»
14 years 10 months ago
Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses
—With the popularity of voting systems in cyberspace, there are growing evidence that the current voting systems can be manipulated by fake votes. This problem has attracted many...
Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yan...
KI
2010
Springer
14 years 9 months ago
Towards Opportunistic Action Selection in Human-Robot Cooperation
A robot that is to assist humans in everyday activities should not only be efficient, but also choose actions that are understandable for a person. One characteristic of human task...
Thibault Kruse, Alexandra Kirsch
84
Voted
TEC
2008
91views more  TEC 2008»
14 years 11 months ago
Applying a Traffic Lights Evolutionary Optimization Technique to a Real Case: "Las Ramblas" Area in Santa Cruz de Tenerife
Abstract--In previous research, we have designed and successfully tested a Traffic Light Cycles Evolutionary Optimization Architecture. In this paper, we attempt to validate those ...
Javier J. Sánchez Medina, Manuel J. Gal&aac...
WWW
2009
ACM
16 years 12 days ago
Unsupervised query categorization using automatically-built concept graphs
Automatic categorization of user queries is an important component of general purpose (Web) search engines, particularly for triggering rich, query-specific content and sponsored ...
Eustache Diemert, Gilles Vandelle
BMCBI
2011
14 years 3 months ago
BICEPP: an example-based statistical text mining method for predicting the binary characteristics of drugs
Background: The identification of drug characteristics is a clinically important task, but it requires much expert knowledge and consumes substantial resources. We have developed ...
Frank P. Y. Lin, Stephen Anthony, Thomas M. Polase...