Heuristic

Results: 1243



#Item
11Citation: Sundar, S. Shyam. “The MAIN Model: A Heuristic Approach to Understanding Technology Effects on Credibility.

Citation: Sundar, S. Shyam. “The MAIN Model: A Heuristic Approach to Understanding Technology Effects on Credibility." Digital Media, Youth, and Credibility. Edited by Miriam J. Metzger and Andrew J. Flanagin. The John

Add to Reading List

Source URL: pdfs.semanticscholar.org

- Date: 2017-03-17 17:57:09
    12Constraint-Based Heuristic On-line Test Generation from Non-deterministic I/O EFSMs∗ Danel Ahman† Marko K¨aa¨ ramees

    Constraint-Based Heuristic On-line Test Generation from Non-deterministic I/O EFSMs∗ Danel Ahman† Marko K¨aa¨ ramees

    Add to Reading List

    Source URL: danelahman.github.io

    - Date: 2018-03-25 20:15:13
      13A Novel Event Insertion Heuristic for Creating Feasible Course Timetables ¨ Moritz Muhlenthaler · Rolf Wanka

      A Novel Event Insertion Heuristic for Creating Feasible Course Timetables ¨ Moritz Muhlenthaler · Rolf Wanka

      Add to Reading List

      Source URL: www12.informatik.uni-erlangen.de

      - Date: 2010-10-30 13:36:46
        14Library of Latin Texts – Series A responsability: Center ‘Traditio Litterarum Occidentalium’ • Scholarly  • Heuristic work

        Library of Latin Texts – Series A responsability: Center ‘Traditio Litterarum Occidentalium’ • Scholarly • Heuristic work

        Add to Reading List

        Source URL: drupal.upsa.es

        - Date: 2011-12-21 11:29:07
          15Heuristic Cube Pruning in Linear Time Andrea Gesmundo Department of Computer Science University of Geneva

          Heuristic Cube Pruning in Linear Time Andrea Gesmundo Department of Computer Science University of Geneva

          Add to Reading List

          Source URL: aclweb.org

          - Date: 2012-06-21 10:18:58
            16Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities Ben Smith and Laurie Williams Department of Computer Science North Carolina State University [ben_smith, laurie_

            Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities Ben Smith and Laurie Williams Department of Computer Science North Carolina State University [ben_smith, laurie_

            Add to Reading List

            Source URL: bensmith.s3.amazonaws.com

            - Date: 2012-06-18 14:14:58
              17Citation: Sundar, S. Shyam. “The MAIN Model: A Heuristic Approach to Understanding Technology Effects on Credibility.

              Citation: Sundar, S. Shyam. “The MAIN Model: A Heuristic Approach to Understanding Technology Effects on Credibility." Digital Media, Youth, and Credibility. Edited by Miriam J. Metzger and Andrew J. Flanagin. The John

              Add to Reading List

              Source URL: www.marketingsociale.net

              - Date: 2013-07-08 03:56:56
                18Heuristic Search for Non-Bottom-Up Tree Structure Prediction  Andrea Gesmundo Department of Computer Science University of Geneva

                Heuristic Search for Non-Bottom-Up Tree Structure Prediction Andrea Gesmundo Department of Computer Science University of Geneva

                Add to Reading List

                Source URL: aclweb.org

                - Date: 2011-07-20 22:52:35
                  19Natural Language Inference by Tree-Based Convolution and Heuristic Matching Lili Mou∗, 1 Rui Men,∗1 Ge Li,†1 Yan Xu,1 Lu Zhang,1 Rui Yan,2 Zhi Jin†1 1 Key  Laboratory of High Confidence Software Technologies (Pek

                  Natural Language Inference by Tree-Based Convolution and Heuristic Matching Lili Mou∗, 1 Rui Men,∗1 Ge Li,†1 Yan Xu,1 Lu Zhang,1 Rui Yan,2 Zhi Jin†1 1 Key Laboratory of High Confidence Software Technologies (Pek

                  Add to Reading List

                  Source URL: arxiv.org

                  - Date: 2016-05-15 21:01:08