Sciweavers

120 search results - page 23 / 24
» Implicit Authentication through Learning User Behavior
Sort
View
ECAI
2010
Springer
14 years 7 months ago
Social Recommendation with Interpersonal Influence
Social recommendation, that an individual recommends an item to another, has gained popularity and success in web applications such as online sharing and shopping services. It is l...
Junming Huang, Xueqi Cheng, Jiafeng Guo, Huawei Sh...
TCIAIG
2010
14 years 4 months ago
Game Bot Detection via Avatar Trajectory Analysis
The objective of this work is to automatically detect the use of game bots in online games based on the trajectories of account users. Online gaming has become one of the most popu...
Hsing-Kuo Pao, Kuan-Ta Chen, Hong-Chung Chang
SIGDOC
2003
ACM
15 years 2 months ago
Alternative methods for field usability research
Field usability research involves observing people in their own environments—for example, workplaces, homes, and schools—to learn their normal or natural behavior. Through fie...
Laurie Kantner, Deborah Hinderer Sova, Stephanie R...
SIGCSE
2002
ACM
126views Education» more  SIGCSE 2002»
14 years 9 months ago
Design patterns for games
Designing a two-person game involves identifying the game model to compute the best moves, the user interface (the "view") to play the game, and the controller to coordi...
Dung Zung Nguyen, Stephen B. Wong
CHI
2005
ACM
15 years 10 months ago
Extending tangible interfaces for education: digital montessori-inspired manipulatives
This paper introduces a new framework for thinking about tangible interfaces in education, with specific focus on problem domains. Manipulatives are physical objects specifically ...
Oren Zuckerman, Saeed Arida, Mitchel Resnick