Search Constraints
« Previous |
1 - 20 of 59
|
Next »
Search Results
Select an image to start the slideshow
MARA and public user characteristics in response to phishing emails
1 of 20
Integration of operations research and artificial intelligence approaches to solve the nurse rostering problem
2 of 20
Studying the lives of software bugs
3 of 20
Pragmatic cost estimation for web applications
4 of 20
Investigating effective inspection of object-oriented code
5 of 20
Planning as Quantified Boolean Formulae
6 of 20
A comparative analysis of algorithms for satellite operations scheduling
7 of 20
Exploring the information seeking behaviour of Muslim migrants in Scotland, a Glasgow case of study
8 of 20
Generalising plans to influence landscapes for robust agent execution in virtual worlds
9 of 20
Algebraic methods for incremental maintenance and updates of views within XML databases
10 of 20
Extracting and exploiting interaction information in constraint-based local search
11 of 20
Evaluating readability as a factor in information security policies
12 of 20
A new heuristic-based model of goal recognition without libraries
13 of 20
Design and evaluation of an Interactive Topic Detection and Tracking interface
14 of 20
Automated software development and model generation by means of syntactic and semantic analysis
15 of 20
Users' relevance criteria for videos in leisure contexts
16 of 20
Creation of a goal-driven and reactive agent architecture
17 of 20
Updating RDF in the semantic web
18 of 20
Induction and coinduction schemes in category theory
19 of 20
Resource discovery in heterogeneous digital content environments
20 of 20