Pen-based interfaces offer exciting opportunities in ubiquitous computing by enabling new hardware form factors and socially acceptable computing tasks. However, prevailing ink re...
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
The proliferation of digital libraries and the large amount of existing documents raise important issues in efficient handling of documents. Printed texts in documents need to be...
— The paper presents a thought experiment as to the feasibility of using large scale wireless sensor networks as a vehicle for high level scientific investigation. The discussion...
Designing agents whose behavior challenges human players adequately is a key issue in computer games development. This work presents a novel technique, based on reinforcement lear...
Gustavo Andrade, Geber Ramalho, Hugo Santana, Vinc...