The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Play is a vital activity in which children observe the world, learn new concepts and experiment with them. Even though the social aspect of play is very important, the computer science community has struggled to address it. Digital playgrounds have been built in which children can play in technologically enhanced installations, but the detailed study of the social component of play within these installations...
Social Web applications have successfully transformed content consuming users into content producers. Aside of socializing, these applications are frequently used to disseminate information and coordinate purposeful activities, such as disaster response, political action, and neighborhood organizations. These activities are carried out via human interpreted messages. In many cases, dedicated information...
In this article we introduce the C-Model of Interaction between humans and Digital Media1 we empirically researched and analyzed in learning scenarios (workshops). In our trienal research project called “Subject Formation and Digital Culture” (SKUDI) we arranged and designed a series of constructivist and constructionist workshops. In these workshops dealing with robots, smart textiles, fabrication...
Usability as well as accessibility is a key aspect in development of human-computer interaction. This paper presents the basis of usability evaluation methodology and reviews the methodology used in empirical studies of usability evaluation for disabled people. Finally, we present a solution (METBA) as a system for managing the information related to evaluation of human behavioral observation contents...
A main challenge facing the law-enforcement and intelligence-gathering environment is accurately and efficiently analyzing the huge volumes of data. Analyzing crime data can be difficult because of recognizing key features and transactions among the large amounts of data, of which only a small section is relevant to illegal process. An intelligent forensic system (IFS) is a powerful medium that enables...
A novel concept for approaching digital investigations is presented. User-contributory case-based reasoning (UCCBR) is a method by which previous results from digital forensic (DF) examinations are stored and reused in future investigations. The advantages of a UCCBR system are discussed which include implementing UCCBR as an auditing tool, a method for optimizing evidence retrieval and anomalous...
This paper describes the early stages of an experiment investigating the role of the computer as a creative collaborator in the game design process. We introduce the Shibumi set, a closed game system so simple that its rule space can be completely defined, yet deep enough to allow interesting games to emerge. Constraining the search space to such a closed system has computational benefits, but had...
Cooperation in nature is a complex topic and its study has left scientists with many open questions. Over the past two decades research has been undertaken into how cooperation works in an evolutionary context and how we can emulate it for social analysis. Numerous computer models have been developed and analyzed, with many models formulated as spatial or network games. These games use various update...
We investigate the practical effectiveness of a theoretically sound algorithm for dynamic difficulty adjustment in computer games: Firstly, we show how the partially ordered set master (Posm) algorithm [11] can be incorporated in board games, taking checkers and Chinese chess as examples. Secondly, we describe an empirical study of (i) Posm on checkers against synthetic opponents of varying strength,...
Driving includes many social factors, such as interaction with other vehicles. In this study, we attempted to examine the social interactions in driving through developing a novel driver assistance system; this system is intended to aid non-expert drivers in assessing such interactions. We first present a novel networked driving simulator based on SIGVerse which is a software platform for research...
We present strike response times comparison for a traditional and popular table top Indian game, Carrom, measured under three conditions: face-to-face/co-located live, virtual with live feed of the co-player and virtual without the feed of co-player. The game of Carrom, in Indian context, rates high on the social interaction experience and is played with extreme levels of engagement and involvement...
In the ever growing literature on countering the cyber threat, the so-called JDL model of data fusion, well established in the information fusion community, has been applied to characterize the inner structure of problems within cyber defence and their mutual relationship. The overarching goal is to provide contributions to comprehensive cyber situational awareness by producing timely situation pictures...
Due to the development of World Wide Web technologies, people are living in the place flooding trillions of web pages in every moment. The amount of web size has been increasing dramatically. For this reason, it is getting more difficult to find relevant web documents corresponding to what users want to read. Classifying documents into predefined categories is one of the most important tasks in Natural...
It has been accepted by Cloud Computing vendors that retrieving data from a cloud environment once they have been deleted is next to impossible. This constitutes a major hurdle for the digital forensics examiner as it greatly limits the pool of potential evidence that could be collected during an investigation. In this concept paper we will discuss a different approach to the above problem that spans...
Several concepts from traditional research on Artificial Intelligence (AI) need to be trained before they can be used. For example, when applied to a computer game, its AI framework has to “learn” how the game should be played. However, such trainings may not be trivial due to the often complex game world environments. This paper presents a novel training approach for game AI frameworks where, instead...
Engineering for products was changed to product lifecycle management (PLM) during the past ten years. This change was in great extent result of continuous developments in CAD/CAM/CAE/CAT and other engineering areas during the last third of the past century. New characteristics of the present PLM-based engineering practice are application of virtual engineering technology, integration of various areas...
Web-based language learning (WBLL) environment has provided English education a new arena where learning and teaching activities are vivified by the feats of computer and internet technology. A full development of learner autonomy can conduce to success in web-based English learning. This paper aims to find out ways to improve learner autonomy to achieve Chinese students' success in web-based English...
Uses CAPTCHA in web page can to a certain extent, to resist the attacks from network. But many sites using the CAPTCHA is based on the English or the digital characters, and only adopts a simple deformation treatment, safety not guaranteed. The Chinese CAPTCHA in upper case characters, and adding noise, deformation processing, the machine automatically recognizes the very difficult. The experiment...
Current commercial anti-malware products fail to guarantee a 100% detection and prevention of malware. This paper proposes an evaluation framework called ATE (Anti-malware Technique Evaluator) that can be used to evaluate commercial anti-malware products. ATE identifies the vulnerabilities in anti-malware products by providing a set of requirements that must be fulfilled by the anti-malware product...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.