Placing Humans in the Feedback Loop of Social Infrastructures
暂无分享,去创建一个
[1] Son Doan,et al. BioCaster: detecting public health rumors with a Web-based text mining system , 2008, Bioinform..
[2] Tetsunari Inamura,et al. Motion coaching with emphatic motions and adverbial expressions for human beings by robotic system -Method for controlling motions and expressions with sole parameter- , 2011, 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[3] Akihiko Konagaya,et al. Cluster newton method for sampling multiple solutions of an underdetermined inverse problem: Parameter identification for pharmacokinetics , 2011 .
[4] Yuichiro Yoshikawa,et al. Simulator platform that enables social interaction simulation — SIGVerse: SocioIntelliGenesis simulator , 2010, 2010 IEEE/SICE International Symposium on System Integration.
[5] Noboru Sonehara,et al. Sustainable Cloud Computing , 2011, Bus. Inf. Syst. Eng..
[6] Norbert Wiener,et al. Cybernetics. , 1948, Scientific American.
[7] Antonio Ortega,et al. Interactive Streaming of Stored Multiview Video Using Redundant Frame Structures , 2011, IEEE Transactions on Image Processing.
[8] Mitsuru Ishizuka,et al. MPML3D: Scripting Agents for the 3D Internet , 2011, IEEE Transactions on Visualization and Computer Graphics.
[9] Asanobu Kitamoto. The Development of Typhoon Image Database with Content-Based Search , 2001 .
[10] Takayuki Yamada,et al. Use of invisible noise signals to prevent privacy invasion through face recognition from camera images , 2012, ACM Multimedia.
[11] Juan Carlos Augusto,et al. Ambient Intelligence: The Confluence of Ubiquitous/Pervasive Computing and Artificial Intelligence , 2007 .
[12] Hiroshi Maruyama,et al. Towards Systems Resilience , 2013 .
[13] Douglas C. Schmidt,et al. Ultra-large-scale systems , 2006, OOPSLA '06.
[14] K. Steinbuch,et al. Automat und Mensch , 1961 .
[15] Johannes Buchmann,et al. Internet Privacy: Options for adequate realization , 2013 .
[16] Adnan Darwiche,et al. On the Revision of Probabilistic Beliefs using Uncertain Evidence , 2003, IJCAI.
[17] Nigel Collier,et al. The GENIA project: corpus-based knowledge acquisition and information extraction from genome research papers , 1999, EACL.
[18] Karl Steinbuch. Automat und Mensch : Auf dem Weg zu einer kybernetischen Anthropologie , 1971 .
[19] Sébastien Konieczny,et al. Belief Base Rationalization for Propositional Merging , 2011, IJCAI.
[20] Nigel Collier,et al. Extracting the Names of Genes and Gene Products with a Hidden Markov Model , 2000, COLING.
[21] Shin Nakajima,et al. Integrated Model Checking of Static Structure and Dynamic Behavior using Temporal Description Logics , 2012, Electron. Commun. Eur. Assoc. Softw. Sci. Technol..
[22] Makoto Yokoo,et al. Interactive Algorithm for Multi-Objective Constraint Optimization , 2012, CP.
[23] Asanobu KITAMOTO,et al. DIGITAL TYPHOON : NEAR REAL-TIME AGGREGATION , RECOMBINATION AND DELIVERY OF TYPHOON-RELATED INFORMATION , 2005 .
[24] 国立情報学研究所. National Institute of Informatics : NII , 2000 .
[25] Nigel Collier,et al. PASBio: predicate-argument structures for event extraction in molecular biology , 2004, BMC Bioinformatics.
[26] Allan McConnell,et al. Preparing for Critical Infrastructure Breakdowns: The Limits of Crisis Management and the Need for Resilience , 2007 .
[27] Shin Nakajima. An Architecture of Dynamically Adaptive PHP-based Web Applications , 2011, 2011 18th Asia-Pacific Software Engineering Conference.
[28] Nigel Collier,et al. Sentiment Analysis using Support Vector Machines with Diverse Information Sources , 2004, EMNLP.
[29] Makoto Yokoo,et al. 多目的制約最適化問題における対話型解法の提案;多目的制約最適化問題における対話型解法の提案;Interactive Algorithm for Multi-objective Constraint Optimization , 2013 .
[30] Nigel Collier,et al. Introduction to the Bio-entity Recognition Task at JNLPBA , 2004, NLPBA/BioNLP.
[31] Marc Miska,et al. An Experimental Space for Conducting Controlled Driving Behavior Studies based on a Multiuser Networked 3D Virtual Environment and the Scenario Markup Language , 2013, IEEE Transactions on Human-Machine Systems.
[32] Edsger W. Dijkstra,et al. The humble programmer , 1972, CACM.
[33] Roy Sterritt. Autonomic computing , 2005, Innovations in Systems and Software Engineering.
[34] Erik Hollnagel,et al. Resilience Engineering in Practice: A Guidebook , 2012 .
[35] Norbert Wiener,et al. Cybernetics, or control and communication in the animal and the machine, 2nd ed. , 1961 .
[36] Noboru Sonehara,et al. Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy , 2010, SEC.
[37] Chiaki Sakama,et al. Abduction, unpredictability and Garden of Eden , 2013, Log. J. IGPL.
[38] Akihiko Konagaya,et al. Towards an In Silico Approach to Personalized Pharmacokinetics , 2012 .
[39] Erik Brynjolfsson,et al. That Makes a Competitive Difference , 2008 .
[40] Denis D. Smith,et al. The changing nature of risk and risk management: The challenge of borders, uncertainty and resilience , 2009 .
[41] Nobuhiro Furuyama,et al. Comparing intra- and inter-personal coordination systems: Perceptual effect on stability of finger tapping movement , 2011, 2011 IEEE/SICE International Symposium on System Integration (SII).
[42] Ken-ichi Kawarabayashi,et al. Linear-Space Approximate Distance Oracles for Planar, Bounded-Genus and Minor-Free Graphs , 2011, ICALP.