Sciweavers

1265 search results - page 168 / 253
» Computer poker: A review
Sort
View
CEC
2007
IEEE
15 years 4 months ago
A cost benefit operator for efficient multi level genetic algorithm searches
— In this paper we present a novel cost benefit operator that assists multi level genetic algorithm searches. Through the use of the cost benefit operator, it is possible to dyna...
George G. Mitchell, Barry McMullin, James Decraene
WAPCV
2007
Springer
15 years 4 months ago
Learning to Attend - From Bottom-Up to Top-Down
The control of overt visual attention relies on an interplay of bottom-up and top-down mechanisms. Purely bottom-up models may provide a reasonable account of the looking behaviors...
Hector Jasso, Jochen Triesch
ITICSE
2005
ACM
15 years 3 months ago
A research-led curriculum in multimedia: learning about convergence
Traditional teaching methods have acknowledged limitations. Lectures may be used to transmit information efficiently, but often fail to motivate students to engage with the subjec...
Hugh C. Davis, Su White
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
15 years 3 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar
CHI
2004
ACM
15 years 3 months ago
Trust and mistrust of online health sites
Do different design and information content factors influence trust and mistrust of online health sites? Fifteen women faced with a risky health decision were observed while searc...
Elizabeth Sillence, Pamela Briggs, Lesley Fishwick...