Computational law

Results: 115



#Item
91Microsoft Word - eT122705[1].d.doc

Microsoft Word - eT122705[1].d.doc

Add to Reading List

Source URL: www.epo.org

Language: English - Date: 2011-06-14 11:51:07
92Identification of Technology Terms in Patents Peter Anick, Marc Verhagen and James Pustejovsky Computer Science Department Brandeis University Waltham, MA, United States peter [removed], [removed], james

Identification of Technology Terms in Patents Peter Anick, Marc Verhagen and James Pustejovsky Computer Science Department Brandeis University Waltham, MA, United States peter [removed], [removed], james

Add to Reading List

Source URL: www.lrec-conf.org

Language: English - Date: 2014-05-20 12:22:00
93DT R - T[removed]F I N AL DFRW S T ECHN IC A L R E PO RT A Road Map for Digital Forensic Research  Report From the First Digital Forensic Research Workshop (DFRWS)

DT R - T[removed]F I N AL DFRW S T ECHN IC A L R E PO RT A Road Map for Digital Forensic Research Report From the First Digital Forensic Research Workshop (DFRWS)

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2007-03-18 22:31:04
94Chapter 20  Trust and Recommendations Patricia Victor, Martine De Cock, and Chris Cornelis  Abstract Recommendation technologies and trust metrics constitute the two pillars

Chapter 20 Trust and Recommendations Patricia Victor, Martine De Cock, and Chris Cornelis Abstract Recommendation technologies and trust metrics constitute the two pillars

Add to Reading List

Source URL: www.cwi.ugent.be

Language: English - Date: 2010-05-30 12:55:40
95Enhanced Recommendations Through Propagation of Trust and Distrust Patricia Victor, Chris Cornelis, and Martine De Cock Computational Web Intelligence, Dept. of Appl. Math. and Comp. Sci. Ghent University, Krijgslaan 281

Enhanced Recommendations Through Propagation of Trust and Distrust Patricia Victor, Chris Cornelis, and Martine De Cock Computational Web Intelligence, Dept. of Appl. Math. and Comp. Sci. Ghent University, Krijgslaan 281

Add to Reading List

Source URL: www.cwi.ugent.be

Language: English - Date: 2006-09-28 07:15:58
96Undersampled Critical Branching Processes on Small-World and Random Networks Fail to Reproduce the Statistics of Spike Avalanches Tiago L. Ribeiro1*, Sidarta Ribeiro2, Hindiael Belchior2, Fa´bio Caixeta2, Mauro Copelli1

Undersampled Critical Branching Processes on Small-World and Random Networks Fail to Reproduce the Statistics of Spike Avalanches Tiago L. Ribeiro1*, Sidarta Ribeiro2, Hindiael Belchior2, Fa´bio Caixeta2, Mauro Copelli1

Add to Reading List

Source URL: repositorio.ufrn.br

Language: English - Date: 2014-04-22 15:36:40
97DT R - T[removed]F I N AL DFRW S T ECHN IC A L R E PO RT A Road Map for Digital Forensic Research  Report From the First Digital Forensic Research Workshop (DFRWS)

DT R - T[removed]F I N AL DFRW S T ECHN IC A L R E PO RT A Road Map for Digital Forensic Research Report From the First Digital Forensic Research Workshop (DFRWS)

Add to Reading List

Source URL: dfrws.org

Language: English - Date: 2007-03-18 22:31:04
98Warsaw, [removed]Goals of the uTrust project In open, distributed systems, autonomous users frequently have to make decisions under uncertainty. The outcomes of their decisions (and the welfare or utility of the

Warsaw, [removed]Goals of the uTrust project In open, distributed systems, autonomous users frequently have to make decisions under uncertainty. The outcomes of their decisions (and the welfare or utility of the

Add to Reading List

Source URL: sieci.pjwstk.edu.pl

Language: English - Date: 2007-10-28 08:14:47
9910th International Society for Music Information Retrieval Conference (ISMIR[removed]EVALUATION OF ALGORITHMS USING GAMES: THE CASE OF MUSIC TAGGING Edith Law CMU

10th International Society for Music Information Retrieval Conference (ISMIR[removed]EVALUATION OF ALGORITHMS USING GAMES: THE CASE OF MUSIC TAGGING Edith Law CMU

Add to Reading List

Source URL: ismir2009.ismir.net

Language: English - Date: 2014-01-23 13:04:38
100The Apocryphal Machinery of Cyphernautics Telecomix Crypto Munitions Bureau November 8, 2010– Initial selection.

The Apocryphal Machinery of Cyphernautics Telecomix Crypto Munitions Bureau November 8, 2010– Initial selection.

Add to Reading List

Source URL: telecomix.org

Language: English - Date: 2014-06-07 09:33:17