Model of computation

Results: 512



#Item
171Towards a classification framework for social machines Nigel Shadbolt, Daniel Alexander Smith, Elena Simperl, Max Van Kleek, Yang Yang, Wendy Hall Web and Internet Science Group University of Southampton, UK

Towards a classification framework for social machines Nigel Shadbolt, Daniel Alexander Smith, Elena Simperl, Max Van Kleek, Yang Yang, Wendy Hall Web and Internet Science Group University of Southampton, UK

Add to Reading List

Source URL: eprints.soton.ac.uk

Language: English - Date: 2013-03-26 06:17:44
172A First-Order Theory of Communication and Multi-Agent Plans: Appendix A Leora Morgenstern IBM Watson Labs

A First-Order Theory of Communication and Multi-Agent Plans: Appendix A Leora Morgenstern IBM Watson Labs

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2005-03-14 13:47:24
173Function Extraction Technology: Computing the Behavior of Malware Rick Linger, Kirk Sayre, Tim Daly, Mark Pleszkoch CERT, Software Engineering Institute Carnegie Mellon University Pittsburgh, PA

Function Extraction Technology: Computing the Behavior of Malware Rick Linger, Kirk Sayre, Tim Daly, Mark Pleszkoch CERT, Software Engineering Institute Carnegie Mellon University Pittsburgh, PA

Add to Reading List

Source URL: daly.axiom-developer.org

Language: English - Date: 2010-08-30 12:03:23
174Probabilistic Model-Building Genetic Algorithms a.k.a. Estimation of Distribution Algorithms a.k.a. Iterated Density Estimation Algorithms  Martin Pelikan

Probabilistic Model-Building Genetic Algorithms a.k.a. Estimation of Distribution Algorithms a.k.a. Iterated Density Estimation Algorithms Martin Pelikan

Add to Reading List

Source URL: medal-lab.org

Language: English - Date: 2012-07-08 09:24:13
175Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model Yehuda Lindell∗ Department of Computer Science Bar-Ilan University Ramat Gan, 52900, Israel

Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model Yehuda Lindell∗ Department of Computer Science Bar-Ilan University Ramat Gan, 52900, Israel

Add to Reading List

Source URL: cjtcs.cs.uchicago.edu

Language: English - Date: 2006-10-01 16:24:33
176c 2004 by Kevin Michael Squire. All rights reserved. HMM-BASED SEMANTIC LEARNING FOR A MOBILE ROBOT  BY

c 2004 by Kevin Michael Squire. All rights reserved. HMM-BASED SEMANTIC LEARNING FOR A MOBILE ROBOT BY

Add to Reading List

Source URL: www.isle.illinois.edu

Language: English - Date: 2005-05-13 18:11:18
177Docking Models in Org Science

Docking Models in Org Science

Add to Reading List

Source URL: hcs.ucla.edu

Language: English - Date: 2007-05-21 17:48:21
178Legally Enforceable Fairness in Secure Two-Party Computation∗ Yehuda Lindell† Department of Computer Science Bar-Ilan University, Israel.

Legally Enforceable Fairness in Secure Two-Party Computation∗ Yehuda Lindell† Department of Computer Science Bar-Ilan University, Israel.

Add to Reading List

Source URL: cjtcs.cs.uchicago.edu

Language: English - Date: 2009-07-16 07:03:28
179Quantum Adversary (Upper) Bound

Quantum Adversary (Upper) Bound

Add to Reading List

Source URL: cjtcs.cs.uchicago.edu

Language: English - Date: 2013-04-06 19:44:11
180McGill University School of Computer Science Game Research at McGill Formal Verification of Computer Narratives GR@M Technical Report No

McGill University School of Computer Science Game Research at McGill Formal Verification of Computer Narratives GR@M Technical Report No

Add to Reading List

Source URL: www.sable.mcgill.ca

Language: English - Date: 2009-06-10 18:11:01