We analyze the technique for reducing the complexity of entropy coding consisting in the a priori grouping of the source alphabet symbols, and in dividing the coding process in tw...
A typical consent dialog was shown in 2×2×3 experimental variations to 80,000 users of an online privacy tool. We find that polite requests and button texts pointing to a volun...
Traditional teaching methods have acknowledged limitations. Lectures may be used to transmit information efficiently, but often fail to motivate students to engage with the subjec...
In this paper, we apply the auction-based theories in economics to camera networks. We develop a set of auction protocols to do camera active control (pan/tilt/zoom) intelligently...
We discuss the design of the Intermediary Agent's brain, the control module of an embodied conversational virtual peer in a simulation game aimed at providing learning experi...