Now showing items 11-20 of 40
This volume collects the revised proceedings of the 19th International Security Protocols Workshop, held in Sidney Sussex College, Cambridge, March 2011
The metaplace security model
As part of an ongoing project on the security of online games and virtual reality applications, we joined the open beta test of Metaplace, to carry out our own analysis of Metaplace's security mechanisms, and to observe ...
An exploratory comparative study of distance-learning programmes
(ACPI (Academic Conference Publishing International), 2011)
In this paper we describe an exploratory study of distance learning practice. We review five different distance learning programme models from five different schools at the University of Hertfordshire, each varying in ...
Lateral inhibitory networks : Synchrony, edge enhancement, and noise reduction
This paper investigates how layers of spiking neurons can be connected using lateral inhibition in different ways to bring about synchrony, reduce noise, and extract or enhance features. To illustrate the effects of the ...
Perception in chess and beyond : commentary on Linhares and Freitas (2010)
Linhares and Freitas (2010; LF) argue that experts use analogical or semantic similarity, similarities that are not available from direct surface representations. LF make their case using a critique of Chase and Simon ...
Grounding subgoals in information transitions
In reinforcement learning problems, the construction of subgoals has been identified as an important step to speed up learning and to enable skill transfer. For this purpose, one typically extracts states from various ...
Robots as social mediators for children with Autism : A preliminary analysis comparing two different robotic platforms
Robots can be very helpful therapeutic tools, especially for children with special needs. In the present paper we describe the application of two robotic platforms with different design parameters in interaction with ...
Categorizing facial expressions : a comparison of computational models
Recognizing expressions is a key part of human social interaction, and processing of facial expression information is largely automatic for humans, but it is a non-trivial task for a computational system. The purpose of ...
Semi-automatic analysis of traditional media with machine learning
Security Protocols XIX : 19th International Workshop