首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 296 毫秒
1.
This paper describes the simulated car racing competition that was arranged as part of the 2007 IEEE Congress on Evolutionary Computation. Both the game that was used as the domain for the competition, the controllers submitted as entries to the competition and its results are presented. With this paper, we hope to provide some insight into the efficacy of various computational intelligence methods on a well-defined game task, as well as an example of one way of running a competition. In the process, we provide a set of reference results for those who wish to use the simplerace game to benchmark their own algorithms. The paper is co-authored by the organizers and participants of the competition.
Julian Togelius (Corresponding author)Email:
Simon LucasEmail:
Ho Duc ThangEmail:
Jonathan M. GaribaldiEmail:
Tomoharu NakashimaEmail:
Chin Hiong TanEmail:
Itamar ElhananyEmail:
Shay BerantEmail:
Philip HingstonEmail:
Robert M. MacCallumEmail:
Thomas HaferlachEmail:
Aravind GowrisankarEmail:
Pete BurrowEmail:
  相似文献   

2.
Quantitative usability requirements are a critical but challenging, and hence an often neglected aspect of a usability engineering process. A case study is described where quantitative usability requirements played a key role in the development of a new user interface of a mobile phone. Within the practical constraints of the project, existing methods for determining usability requirements and evaluating the extent to which these are met, could not be applied as such, therefore tailored methods had to be developed. These methods and their applications are discussed.
Timo Jokela (Corresponding author)Email:
Jussi KoivumaaEmail:
Jani PirkolaEmail:
Petri SalminenEmail:
Niina KantolaEmail:
  相似文献   

3.
We present a study of using camera-phones and visual-tags to access mobile services. Firstly, a user-experience study is described in which participants were both observed learning to interact with a prototype mobile service and interviewed about their experiences. Secondly, a pointing-device task is presented in which quantitative data was gathered regarding the speed and accuracy with which participants aimed and clicked on visual-tags using camera-phones. We found that participants’ attitudes to visual-tag-based applications were broadly positive, although they had several important reservations about camera-phone technology more generally. Data from our pointing-device task demonstrated that novice users were able to aim and click on visual-tags quickly (well under 3 s per pointing-device trial on average) and accurately (almost all meeting our defined speed/accuracy tradeoff of 6% error-rate). Based on our findings, design lessons for camera-phone and visual-tag applications are presented.
Eleanor Toye (Corresponding author)Email:
Richard SharpEmail:
Anil MadhavapeddyEmail:
David ScottEmail:
Eben UptonEmail:
Alan BlackwellEmail:
  相似文献   

4.
Ohne Zusammenfassung
Peter Rohner (Corresponding author)Email:
Robert Winter (Corresponding author)Email:
  相似文献   

5.
There are only a few ethical regulations that deal explicitly with robots, in contrast to a vast number of regulations, which may be applied. We will focus on ethical issues with regard to “responsibility and autonomous robots”, “machines as a replacement for humans”, and “tele-presence”. Furthermore we will examine examples from special fields of application (medicine and healthcare, armed forces, and entertainment). We do not claim to present a complete list of ethical issue nor of regulations in the field of robotics, but we will demonstrate that there are legal challenges with regard to these issues.
Michael Nagenborg (Corresponding author)Email: URL: www.michaelnagenborg.de
Rafael CapurroEmail:
Jutta WeberEmail:
Christoph PingelEmail:
  相似文献   

6.
Research on hybrid bionic systems (HBSs) is still in its infancy but promising results have already been achieved in laboratories. Experiments on humans and animals show that artificial devices can be controlled by neural signals. These results suggest that HBS technologies can be employed to restore sensorimotor functionalities in disabled and elderly people. At the same time, HBS research raises ethical concerns related to possible exogenous and endogenous limitations to human autonomy and freedom. The analysis of these concerns requires reflecting on the availability of scientific models accounting for key aspects of sensorimotor coordination and plastic adaptation mechanisms in the brain.
Pericle Salvini (Corresponding author)Email:
Edoardo DatteriEmail:
Cecilia LaschiEmail:
Paolo DarioEmail:
  相似文献   

7.
To get the maximum benefit from ambient intelligence (AmI), we need to anticipate and react to possible drawbacks and threats emerging from the new technologies in order to devise appropriate safeguards. The SWAMI project took a precautionary approach in its exploration of the privacy risks in AmI and sought ways to reduce them. It constructed four “dark scenarios” showing possible negative implications of AmI, notably for privacy protection. Legal analysis of the depicted futures showed the shortcomings of the current legal framework in being able to provide adequate privacy protection in the AmI environment. In this paper, the authors, building upon their involvement in SWAMI research as well as the further advancement of EU privacy analysis, identify various outstanding issues regarding the legal framework that still need to be resolved in order to deal with AmI in an equitable and efficacious way. This article points out some of the lacunae in the legal framework and postulates several privacy-specific safeguards aimed at overcoming them.
Paul De HertEmail:
Serge Gutwirth (Corresponding author)Email:
Anna MoscibrodaEmail:
David WrightEmail:
Gloria González FusterEmail:
  相似文献   

8.
This viewpoint argues that the introduction of most computer-based system to an organization transforms the organization and changes the work patterns of the system’s users in the organization. These changes interact with the users’ values and beliefs and trigger emotional responses which are sometimes directed against the software system and its proponents. A requirements engineer must be aware of these emotions.
Isabel RamosEmail:
Daniel M. Berry (Corresponding author)Email:
  相似文献   

9.
LuxTrace: indoor positioning using building illumination   总被引:1,自引:1,他引:0  
Tracking location is challenging due to the numerous constraints of practical systems including, but not limited to global cost, device volume and weight, scalability and accuracy; these constraints are typically more severe for systems that should be wearable and used indoors. We investigate the use of wearable solar cells to track changing light conditions (a concept that we named LuxTrace) as a source of user displacement and activity data. We evaluate constraints of this approach and present results from an experimental validation of displacement and activity estimation. The results indicate that a distance estimation accuracy of 21 cm (80% quantile) can be achieved. A simple method to combine LuxTrace with complementary absolute location estimation methods is also presented. We apply carpet-like distributed RFID tags to demonstrate online learning of new lighting environments.
Julian Randall (Corresponding author)Email: URL: www.wearable.ethz.ch
Oliver AmftEmail:
Jürgen BohnEmail:
Martin BurriEmail:
  相似文献   

10.
Nowadays data mining plays an important role in decision making. Since many organizations do not possess the in-house expertise of data mining, it is beneficial to outsource data mining tasks to external service providers. However, most organizations hesitate to do so due to the concern of loss of business intelligence and customer privacy. In this paper, we present a Bloom filter based solution to enable organizations to outsource their tasks of mining association rules, at the same time, protect their business intelligence and customer privacy. Our approach can achieve high precision in data mining by trading-off the storage requirement. This research was supported by the USA National Science Foundation Grants CCR-0310974 and IIS-0546027.
Ling Qiu (Corresponding author)Email:
Yingjiu LiEmail:
Xintao WuEmail:
  相似文献   

11.
We provide the complete record of methodology that let us evolve BrilliAnt, the winner of the Ant Wars contest. Ant Wars contestants are virtual ants collecting food on a grid board in the presence of a competing ant. BrilliAnt has been evolved through a competitive one-population coevolution using genetic programming and fitnessless selection. In this paper, we detail the evolutionary setup that lead to BrilliAnt’s emergence, assess its direct and indirect human-competitiveness, and describe the behavioral patterns observed in its strategy.
Wojciech JaśkowskiEmail:
Krzysztof Krawiec (Corresponding author)Email:
Bartosz WielochEmail:
  相似文献   

12.
The article draws on a decade of work in the UK by the UK Work Organisation Network (UKWON), and recommends a systematic approach. Taking cases in the National Health Service, the focus is on employee involvement, partnership and the development of social capital. High and low road approaches are compared, in an evaluation of the Improving Working Lives programme.
Rosemary Exton (Corresponding author)Email:
Peter TotterdillEmail:
  相似文献   

13.
Wealth distribution based on classic sugarscape model leads to a population increase and the Gini coefficient decrease when cooperation and communication parameters are taken into account. In another study, this model was developed by implying a receipt of one-fifth of the assets of the population and derived utilization for poor people. The results showed a relation between mortality decrease, population increase, and Gini coefficient decrease (equality increase). In a synergic process, the wealth adjustment based on sugarscape model underwent some experiments by implying communication and cooperation, and the mechanism of receiving and utilizing the assets. The results show that the population increase and the Gini coefficient decrease play an important role in wealth adjustment.
Arash Rahman (Corresponding author)Email:
Saeed SetayeshiEmail:
Mojtaba Shamsaei ZafarghandiEmail:
  相似文献   

14.
Ohne Zusammenfassung
Albert EndresEmail:
  相似文献   

15.
The quality of software systems are determined in part by their optimal configurations. Optimal configurations are desired when the software is being deployed and during its lifetime. However, initial deployment and subsequent dynamic reconfiguration of a software system is difficult because of the interplay of many interdependent factors, including cost, time, application state, and system resources. As the size and complexity of software systems increases, procedures (manual or automated) that assume a static software architecture and environment are becoming untenable. We have developed a novel technique for carrying out the deployment and reconfiguration planning processes that leverages recent advances in the field of temporal planning. We describe a tool called Planit, which manages the deployment and reconfiguration of a software system utilizing a temporal planner. Given a model of the structure of a software system, the network upon which the system should be hosted, and a goal configuration, Planit will use the temporal planner to devise possible deployments of the system. Given information about changes in the state of the system, network and a revised goal, Planit will use the temporal planner to devise possible reconfigurations of the system. We present the results of a case study in which Planit is applied to a system consisting of various components that communicate across an application-level overlay network. An earlier version of this paper was presented at ICTAI’03.
Naveed Arshad (Corresponding author)Email:
Dennis HeimbignerEmail:
Alexander L. WolfURL: http://www.doc.ic.ac.uk/~alw/
  相似文献   

16.
17.
18.
In this article we present an engineering approach for the integration of social group dynamics in the behavior modeling of multiagent systems. To this end, a toolbox was created that brings together several theories from the social sciences, each focusing on different aspects of group dynamics. Due to its modular approach, the toolbox can either be used as a central control component of an application or it can be employed temporarily to rapidly test the feasibility of the incorporated theories for a given application domain. This is exemplified by applying the toolbox to different applications.
Matthias Rehm (Corresponding author)Email:
Birgit EndrassEmail:
  相似文献   

19.
One of the tropes of the age of ubiquitous computing is the migration of computation into new spaces. Domestic environments have been a particular focus of attention for many. However, these spaces are neither empty nor neutral. They are already populated by people and practices which shape both their physical form and cultural meaning. We want to consider here some questions of technology and domesticity. In order to give some critical perspective, we want to approach domestic space from the edge, and in particular, from the shed.
Genevieve Bell (Corresponding author)Email:
Paul DourishEmail:
  相似文献   

20.
The effect of Internet use as a mediating variable on self-efficacy as it relates to the cognition of network-changing possibility (i.e., connecting people or groups with different social backgrounds) was examined. The results showed that Internet use (i.e., the frequency of sending e-mail, friends made on the Internet) had a positive effect on the cognition of network-changing possibility. The cognition that it is possible to connect people with different social backgrounds by using the Internet also had a positive effect on self-efficacy. On the other hand, the cognition that it is possible to find people or groups who share beliefs and interests by using the Internet negatively affected self-efficacy. Hence, it was found that the effect of Internet use on self-efficacy was different as a function of cognition of network-changing possibility. Research for this study was supported by grants from the Japan Society for the Promotion of Science, KAKANHI15330137.
Kaichiro Furutani (Corresponding author)Email:
Tetsuro KobayashiEmail:
Mitsuhiro UraEmail:
  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号