91![Microsoft Word - eT122705[1].d.doc Microsoft Word - eT122705[1].d.doc](https://www.pdfsearch.io/img/c05997973e08555c68b59c4fe27f2ad4.jpg) | Add to Reading ListSource URL: www.epo.orgLanguage: English - Date: 2011-06-14 11:51:07
|
---|
92![Identification of Technology Terms in Patents Peter Anick, Marc Verhagen and James Pustejovsky Computer Science Department Brandeis University Waltham, MA, United States peter [removed], [removed], james Identification of Technology Terms in Patents Peter Anick, Marc Verhagen and James Pustejovsky Computer Science Department Brandeis University Waltham, MA, United States peter [removed], [removed], james](https://www.pdfsearch.io/img/7ae233f8cb74c97132c5da511c5da040.jpg) | Add to Reading ListSource URL: www.lrec-conf.orgLanguage: English - Date: 2014-05-20 12:22:00
|
---|
93![DT R - T[removed]F I N AL DFRW S T ECHN IC A L R E PO RT A Road Map for Digital Forensic Research Report From the First Digital Forensic Research Workshop (DFRWS) DT R - T[removed]F I N AL DFRW S T ECHN IC A L R E PO RT A Road Map for Digital Forensic Research Report From the First Digital Forensic Research Workshop (DFRWS)](https://www.pdfsearch.io/img/86f2a0efcca817b4207df39a127cd0e8.jpg) | Add to Reading ListSource URL: www.dfrws.orgLanguage: English - Date: 2007-03-18 22:31:04
|
---|
94![Chapter 20 Trust and Recommendations Patricia Victor, Martine De Cock, and Chris Cornelis Abstract Recommendation technologies and trust metrics constitute the two pillars Chapter 20 Trust and Recommendations Patricia Victor, Martine De Cock, and Chris Cornelis Abstract Recommendation technologies and trust metrics constitute the two pillars](https://www.pdfsearch.io/img/c286e066be07b42559a7d0142a0e6356.jpg) | Add to Reading ListSource URL: www.cwi.ugent.beLanguage: English - Date: 2010-05-30 12:55:40
|
---|
95![Enhanced Recommendations Through Propagation of Trust and Distrust Patricia Victor, Chris Cornelis, and Martine De Cock Computational Web Intelligence, Dept. of Appl. Math. and Comp. Sci. Ghent University, Krijgslaan 281 Enhanced Recommendations Through Propagation of Trust and Distrust Patricia Victor, Chris Cornelis, and Martine De Cock Computational Web Intelligence, Dept. of Appl. Math. and Comp. Sci. Ghent University, Krijgslaan 281](https://www.pdfsearch.io/img/6f5c8773e8dd323cfe46a89c85f21631.jpg) | Add to Reading ListSource URL: www.cwi.ugent.beLanguage: English - Date: 2006-09-28 07:15:58
|
---|
96![Undersampled Critical Branching Processes on Small-World and Random Networks Fail to Reproduce the Statistics of Spike Avalanches Tiago L. Ribeiro1*, Sidarta Ribeiro2, Hindiael Belchior2, Fa´bio Caixeta2, Mauro Copelli1 Undersampled Critical Branching Processes on Small-World and Random Networks Fail to Reproduce the Statistics of Spike Avalanches Tiago L. Ribeiro1*, Sidarta Ribeiro2, Hindiael Belchior2, Fa´bio Caixeta2, Mauro Copelli1](https://www.pdfsearch.io/img/6eaf8befe605a3b42f0a81b89f9d8530.jpg) | Add to Reading ListSource URL: repositorio.ufrn.brLanguage: English - Date: 2014-04-22 15:36:40
|
---|
97![DT R - T[removed]F I N AL DFRW S T ECHN IC A L R E PO RT A Road Map for Digital Forensic Research Report From the First Digital Forensic Research Workshop (DFRWS) DT R - T[removed]F I N AL DFRW S T ECHN IC A L R E PO RT A Road Map for Digital Forensic Research Report From the First Digital Forensic Research Workshop (DFRWS)](https://www.pdfsearch.io/img/b826b9b7186d35940ac5ee5e34576ef4.jpg) | Add to Reading ListSource URL: dfrws.orgLanguage: English - Date: 2007-03-18 22:31:04
|
---|
98![Warsaw, [removed]Goals of the uTrust project In open, distributed systems, autonomous users frequently have to make decisions under uncertainty. The outcomes of their decisions (and the welfare or utility of the Warsaw, [removed]Goals of the uTrust project In open, distributed systems, autonomous users frequently have to make decisions under uncertainty. The outcomes of their decisions (and the welfare or utility of the](https://www.pdfsearch.io/img/37efae1adc32093687b86890db3314f9.jpg) | Add to Reading ListSource URL: sieci.pjwstk.edu.plLanguage: English - Date: 2007-10-28 08:14:47
|
---|
99![10th International Society for Music Information Retrieval Conference (ISMIR[removed]EVALUATION OF ALGORITHMS USING GAMES: THE CASE OF MUSIC TAGGING Edith Law CMU 10th International Society for Music Information Retrieval Conference (ISMIR[removed]EVALUATION OF ALGORITHMS USING GAMES: THE CASE OF MUSIC TAGGING Edith Law CMU](https://www.pdfsearch.io/img/a1cee9963942a422715c51580d0ec5a7.jpg) | Add to Reading ListSource URL: ismir2009.ismir.netLanguage: English - Date: 2014-01-23 13:04:38
|
---|
100![The Apocryphal Machinery of Cyphernautics Telecomix Crypto Munitions Bureau November 8, 2010– Initial selection. The Apocryphal Machinery of Cyphernautics Telecomix Crypto Munitions Bureau November 8, 2010– Initial selection.](https://www.pdfsearch.io/img/7945b3adfd40aaccfc85cf7f23693878.jpg) | Add to Reading ListSource URL: telecomix.orgLanguage: English - Date: 2014-06-07 09:33:17
|
---|