Sciweavers

1176 search results - page 154 / 236
» Exploiting Online Games
Sort
View
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
15 years 22 days ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
CLEF
2008
Springer
15 years 16 days ago
Overview of iCLEF 2008: Search Log Analysis for Multilingual Image Retrieval
This paper summarises activities from the iCLEF 2008 task. In an attempt to encourage greater participation in user-orientated experiments, a new task was organised based on users...
Julio Gonzalo, Paul Clough, Jussi Karlgren
ICWSM
2010
15 years 5 days ago
Modeling Group Dynamics in Virtual Worlds
In this study, we examine human social interactions within virtual worlds and address the question of how group interactions are affected by the surrounding game environment. To i...
Fahad Shah, Gita Reese Sukthankar, Chris Usher
IADIS
2008
15 years 5 days ago
Web 2.0 Technologies For Digital Students
Recent years have seen a new generation of `digital students' emerging in the developed world. Digital students are young adults who have grown up with digital technologies i...
Diana Andone
IJCAI
2007
15 years 4 days ago
Utile Distinctions for Relational Reinforcement Learning
We introduce an approach to autonomously creating state space abstractions for an online reinforcement learning agent using a relational representation. Our approach uses a tree-b...
William Dabney, Amy McGovern