Sciweavers

4803 search results - page 269 / 961
» Game Design Patterns
Sort
View
142
Voted
FPLAY
2008
15 years 6 months ago
Lessons from Brain Age on password memorability
User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
Alain Forget, Sonia Chiasson, Robert Biddle
IJIT
2004
15 years 6 months ago
An HCI Template for Distributed Applications
Both software applications and their development environment are becoming more and more distributed. This trend impacts not only the way software computes, but also how it looks. T...
Xizhi Li
147
Voted
ATAL
2009
Springer
15 years 2 months ago
Replicator Dynamics for Multi-agent Learning: An Orthogonal Approach
Today's society is largely connected and many real life applications lend themselves to be modeled as multi-agent systems. Although such systems as well as their models are d...
Michael Kaisers, Karl Tuyls
ERSA
2009
149views Hardware» more  ERSA 2009»
15 years 2 months ago
Harnessing Human Computation Cycles for the FPGA Placement Problem
Harnessing human computation is an approach to find problem solutions. In this paper, we investigate harnessing this human computation for a Field Programmable Gate Array (FPGA) p...
Luke Terry, Vladimir Roitch, Shoeb Tufail, Kirit S...
ICASSP
2011
IEEE
14 years 8 months ago
Social norm and long-run learning in peer-to-peer networks
We start by formulating the resource sharing in peer-to-peer (P2P) networks as a random-matching gift-giving game, where self-interested peers aim at maximizing their own long-ter...
Yu Zhang, Mihaela van der Schaar