computer security is a very important thing in an information system. The strength of the NTRU algorithm is the difficulty of finding a short vector of a lattice (a discrete subgroup of a collection of vectors that in...
详细信息
Malware had been a problem for quite some times since it spreads easily and can cause various problems. Currently, malware is also one of the big threats for internet users. With a huge number of internet users today,...
详细信息
This paper describes a software authentication technique based on the public key cryptography for information integrity. The software provider can use a secret key to sign any released program and the user can verify ...
详细信息
Symmetric algorithms offer speed but have weaknesses in key distribution, while asymmetric algorithms are secure but less efficient for encrypting and decrypting large text messages. This research aims to secure data ...
详细信息
Traffic signs are important markers in two-wheeled and four-wheeled vehicles. However, there is a change in direction or arrangement on the road that cannot be opened on a map which can cause incorrect information, wh...
详细信息
In this paper, we present a novel approach toward revealing social identity phenomena in videogames using archetypal analysis (AA). Conventionally used as a dimensionality reduction technique for multivariate data, we...
In this paper, we present a novel approach toward revealing social identity phenomena in videogames using archetypal analysis (AA). Conventionally used as a dimensionality reduction technique for multivariate data, we demonstrate how AA can reveal social phenomena and inequity such as gender/race-related steretoyping and marginalization in videogame designs. We analyze characters and default attribute distributions of two critically acclaimed and commercially successful videogames (The Elder Scrolls IV: Oblivion and Ultima IV) together with 190 characters created by players in a user-study using a third system of our own design. We show that AA can computationally 1) reveal implicit categorization of characters in videogames (e.g., base player roles and hybrid roles), 2) model real world racial stereotypes and stigma using character attributes (e.g., physically dominant attributes for Oblivion's ostensibly African-American "Redguard" race) and 3) model gender marginalization and bias (e.g., males characterized as more archetypal representations of each race than females across attributes.) We highlight how AA is an effective approach for computationally modeling identity representations and how it provides a systematic way for the critical assessment of social identity phenomena in videogames.
Platform business models like Uber Ride or Airbnb Lodging enable innovative business models by operating digital platforms to connect providers and consumers of products and services in two-sided markets. A particular...
详细信息
A basic laboratory exercise was designed and implemented, for K-12 students, which delves into the measurement of basics of electrical circuit parameters, such as resistance, current and voltage. This 2-3 hour lab exe...
Fluid simulations require efficient dynamics, surface extraction and rendering in order to achieve real time interaction. We present a novel technique for the surface extraction of stream-shaped fluid simulations repr...
详细信息
This paper describes COMET, a collaborative intelligent tutoring system for medical problem-based learning. The system uses Bayesian networks to model individual student knowledge and activity, as well as that of the ...
详细信息
This paper describes COMET, a collaborative intelligent tutoring system for medical problem-based learning. The system uses Bayesian networks to model individual student knowledge and activity, as well as that of the group. It incorporates a multi-modal interface that integrates text and graphics so as to provide a rich communication channel between the students and the system, as well as among students in the group. Students can sketch directly on medical images, search for medical concepts, and sketch hypotheses on a shared workspace. The prototype system incorporates substantial domain knowledge in the area of head injury diagnosis. A major challenge in building COMET has been to develop algorithms for generating tutoring hints. Tutoring in PBL is particularly challenging since the tutor should provide as little guidance as possible while at the same time not allowing the students to get lost. From studies of PBL sessions at a local medical school, we have identified and implemented eight commonly used hinting strategies. We compared the tutoring hints generated by COMET with those of experienced human tutors. Our results show that COMET's hints agree with the hints of the majority of the human tutors with a high degree of statistical agreement (McNemar test, p = 0.652, Kappa = 0.773). Copyright 2004 ACM.
暂无评论