Sciweavers

CG
2010
Springer
12 years 11 months ago
Extraversion in Games
The behavior of a human player in a game expresses the personality of that player. Personality is an important characteristic for modeling the player's profile. In our researc...
Giel van Lankveld, Sonny Schreurs, Pieter Spronck,...
CDC
2010
IEEE
144views Control Systems» more  CDC 2010»
12 years 11 months ago
The decentralized implementability problem
Abstract-- This paper deals with the problems of decentralized implementability and decentralized regular implementability in the context of finite-dimensional linear differential ...
Shaik Fiaz, Harry L. Trentelman
EUSFLAT
2009
152views Fuzzy Logic» more  EUSFLAT 2009»
13 years 2 months ago
Fuzzy and PSO Based Algorithm for Driver's Behavior Modeling
The study of human behavior during driving is of primary importance for the improvement of drivers' security. This study is complex because of numerous situations in which the...
Sohrab Khanmohammadi, Mohammad Ali Tinati, Sehrane...
SICHERHEIT
2010
13 years 2 months ago
A Malware Instruction Set for Behavior-Based Analysis
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient a...
Philipp Trinius, Carsten Willems, Thorsten Holz, K...
PTS
2010
167views Hardware» more  PTS 2010»
13 years 2 months ago
Vidock: A Tool for Impact Analysis of Aspect Weaving on Test Cases
The addition of a cross-cutting concern in a program, through aspect weaving, has an impact on its existing behaviors. If test cases exist for the program, it is necessary to ident...
Romain Delamare, Freddy Munoz, Benoit Baudry, Yves...
PERSUASIVE
2010
Springer
13 years 2 months ago
Behavior Wizard: A Method for Matching Target Behaviors with Solutions
We present a method for matching target behaviors with solutions for achieving those behaviors. Called the Behavior Wizard, this method first classifies behavior change targets int...
B. J. Fogg, Jason Hreha
JCDL
2010
ACM
161views Education» more  JCDL 2010»
13 years 2 months ago
Search behaviors in different task types
Personalization of information retrieval tailors search towards individual users to meet their particular information needs by taking into account information about users and thei...
Jingjing Liu, Michael J. Cole, Chang Liu, Ralf Bie...
ICPR
2010
IEEE
13 years 2 months ago
Online Learning with Self-Organizing Maps for Anomaly Detection in Crowd Scenes
Detecting abnormal behaviors in crowd scenes is quite important for public security and has been paid more and more attentions. Most previous methods use offline trained model to p...
Jie Feng, Chao Zhang, Pengwei Hao
ICMLA
2010
13 years 2 months ago
Multi-Agent Inverse Reinforcement Learning
Learning the reward function of an agent by observing its behavior is termed inverse reinforcement learning and has applications in learning from demonstration or apprenticeship l...
Sriraam Natarajan, Gautam Kunapuli, Kshitij Judah,...
COMPSAC
2010
IEEE
13 years 2 months ago
Behavior Monitoring in Self-Healing Service-Oriented Systems
Web services and service-oriented architecture (SOA) have become the de facto standard for designing distributed and loosely coupled applications. Many servicebased applications de...
Harald Psaier, Florian Skopik, Daniel Schall, Scha...