Sciweavers

12052 search results - page 176 / 2411
» computer 2010
Sort
View
EXPERT
2010
107views more  EXPERT 2010»
14 years 7 months ago
Learning and Predicting the Evolution of Social Networks
Björn Bringmann, Michele Berlingerio, Frances...
52
Voted
EXPERT
2010
124views more  EXPERT 2010»
14 years 7 months ago
Personalized Email Prioritization Based on Content and Social Network Analysis
Yiming Yang, Shinjae Yoo, Frank Lin, Il-Chul Moon
66
Voted
EXPERT
2010
109views more  EXPERT 2010»
14 years 7 months ago
Satellite Control Using Rational Agent Programming
Louise A. Dennis, Michael Fisher, Alexei Lisitsa, ...
58
Voted
CI
2010
94views more  CI 2010»
14 years 7 months ago
Cognitive and Behavioral Model Ensembles for Autonomous Virtual Characters
Jeffrey S. Whiting, Jonathan Dinerstein, Parris K....
95
Voted
JCIT
2010
158views more  JCIT 2010»
14 years 5 months ago
Improvement of a Secure Convex Hull Two-Party Computation Protocol
In 2008, Wang et. al. first investigate a sort of specific secure multi-party computation--secure convex hull two-party computation, and construct two protocols based on Gift wrap...
Wenjie Zhao, Mingxing He