Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
12052
search results - page 176 / 2411
»
computing 2010
Sort
relevance
views
votes
recent
update
View
thumb
title
93
click to vote
EXPERT
2010
107
views
more
EXPERT 2010
»
Learning and Predicting the Evolution of Social Networks
15 years 12 days ago
Download
www-kdd.isti.cnr.it
Björn Bringmann, Michele Berlingerio, Frances...
claim paper
Read More »
87
click to vote
EXPERT
2010
124
views
more
EXPERT 2010
»
Personalized Email Prioritization Based on Content and Social Network Analysis
15 years 12 days ago
Download
www.cs.cmu.edu
Yiming Yang, Shinjae Yoo, Frank Lin, Il-Chul Moon
claim paper
Read More »
91
click to vote
EXPERT
2010
109
views
more
EXPERT 2010
»
Satellite Control Using Rational Agent Programming
15 years 12 days ago
Download
www.csc.liv.ac.uk
Louise A. Dennis, Michael Fisher, Alexei Lisitsa, ...
claim paper
Read More »
87
click to vote
CI
2010
94
views
more
CI 2010
»
Cognitive and Behavioral Model Ensembles for Autonomous Virtual Characters
14 years 11 months ago
Download
contentdm.lib.byu.edu
Jeffrey S. Whiting, Jonathan Dinerstein, Parris K....
claim paper
Read More »
132
click to vote
JCIT
2010
158
views
more
JCIT 2010
»
Improvement of a Secure Convex Hull Two-Party Computation Protocol
14 years 9 months ago
Download
www.aicit.org
In 2008, Wang et. al. first investigate a sort of specific secure multi-party computation--secure convex hull two-party computation, and construct two protocols based on Gift wrap...
Wenjie Zhao, Mingxing He
claim paper
Read More »
« Prev
« First
page 176 / 2411
Last »
Next »