Model of computation

Results: 512



#Item
171Crowdsourcing / Human-based computation / Actor model / Computing / Behavioural sciences / Social information processing / Constructivism / Repertory grid

Towards a classification framework for social machines Nigel Shadbolt, Daniel Alexander Smith, Elena Simperl, Max Van Kleek, Yang Yang, Wendy Hall Web and Internet Science Group University of Southampton, UK

Add to Reading List

Source URL: eprints.soton.ac.uk

Language: English - Date: 2013-03-26 06:17:44
172Models of computation / Agent-based model / Complex systems theory / Scientific modeling / Communication / Entailment / Logic / Multi-agent systems / Science

A First-Order Theory of Communication and Multi-Agent Plans: Appendix A Leora Morgenstern IBM Watson Labs

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2005-03-14 13:47:24
173Malware / Models of computation / Algorithm / Software bug / KeY / Control theory / Actor model / MS Antivirus / Denotational semantics / Theoretical computer science / Applied mathematics / Computing

Function Extraction Technology: Computing the Behavior of Malware Rick Linger, Kirk Sayre, Tim Daly, Mark Pleszkoch CERT, Software Engineering Institute Carnegie Mellon University Pittsburgh, PA

Add to Reading List

Source URL: daly.axiom-developer.org

Language: English - Date: 2010-08-30 12:03:23
174Applied mathematics / Artificial intelligence / Mathematics / Mathematical optimization / Search algorithms / Genetic algorithm / Machine learning / Simulated annealing / Cybernetics / Estimation of distribution algorithm / Evolutionary computation

Probabilistic Model-Building Genetic Algorithms a.k.a. Estimation of Distribution Algorithms a.k.a. Iterated Density Estimation Algorithms Martin Pelikan

Add to Reading List

Source URL: medal-lab.org

Language: English - Date: 2012-07-08 09:24:13
175Universal composability / Zero-knowledge proof / Secure two-party computation / Communications protocol / Commitment scheme / Actor model / Proof of knowledge / IP / PP / Cryptography / Cryptographic protocols / Secure multi-party computation

Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model Yehuda Lindell∗ Department of Computer Science Bar-Ilan University Ramat Gan, 52900, Israel

Add to Reading List

Source URL: cjtcs.cs.uchicago.edu

Language: English - Date: 2006-10-01 16:24:33
176Applied mathematics / Bioinformatics / Computational linguistics / Models of computation / Hidden Markov model / Speech recognition / Artificial neural network / Markov chain / Hidden semi-Markov model / Markov models / Statistics / Machine learning

c 2004 by Kevin Michael Squire. All rights reserved. HMM-BASED SEMANTIC LEARNING FOR A MOBILE ROBOT BY

Add to Reading List

Source URL: www.isle.illinois.edu

Language: English - Date: 2005-05-13 18:11:18
177Cybernetics / Models of computation / Systems theory / Organizational behavior / Kathleen Carley / Computational model / Richard Feynman / System / Computational and Mathematical Organization Theory / Science / Physics / Academia

Docking Models in Org Science

Add to Reading List

Source URL: hcs.ucla.edu

Language: English - Date: 2007-05-21 17:48:21
178Key management / Secure multi-party computation / Secure two-party computation / Cheque / Digital signature / Standard model / Random oracle / Certificate authority / Universal composability / Cryptography / Cryptographic protocols / Public-key cryptography

Legally Enforceable Fairness in Secure Two-Party Computation∗ Yehuda Lindell† Department of Computer Science Bar-Ilan University, Israel.

Add to Reading List

Source URL: cjtcs.cs.uchicago.edu

Language: English - Date: 2009-07-16 07:03:28
179Models of computation / Decision tree model / Quantum algorithm / Quantum computer / PP / Theoretical computer science / Applied mathematics / Computational complexity theory

Quantum Adversary (Upper) Bound

Add to Reading List

Source URL: cjtcs.cs.uchicago.edu

Language: English - Date: 2013-04-06 19:44:11
180Computer science / Model checkers / Concurrency / Automata theory / Diagrams / NuSMV / Petri net / Model checking / Formal verification / Models of computation / Theoretical computer science / Applied mathematics

McGill University School of Computer Science Game Research at McGill Formal Verification of Computer Narratives GR@M Technical Report No

Add to Reading List

Source URL: www.sable.mcgill.ca

Language: English - Date: 2009-06-10 18:11:01
UPDATE