共查询到20条相似文献,搜索用时 453 毫秒
1.
This paper describes the simulated car racing competition that was arranged as part of the 2007 IEEE Congress on Evolutionary
Computation. Both the game that was used as the domain for the competition, the controllers submitted as entries to the competition
and its results are presented. With this paper, we hope to provide some insight into the efficacy of various computational
intelligence methods on a well-defined game task, as well as an example of one way of running a competition. In the process,
we provide a set of reference results for those who wish to use the simplerace game to benchmark their own algorithms. The paper is co-authored by the organizers and participants of the competition.
相似文献
2.
Everyone agrees that reliable empirical “facts” must be derived from a series of investigations. However, the question of
what is an appropriate framework for this series is an unresolved issue. Other articles in this issue present replication
as the basis for this framework (Shull FJ, Carver JC, Vegas S, Juristo N (2008) The role of replications in Empirical Software
Engineering, J Empir Softw Eng (in press)); however, alternatives exist! This brief note argues triangulation should be considered
as the basis for this knowledge discovery (from empirical evaluation) strategy.
相似文献
3.
We present a study of using camera-phones and visual-tags to access mobile services. Firstly, a user-experience study is described in which participants were both observed learning to interact with a prototype mobile service and interviewed
about their experiences. Secondly, a pointing-device task is presented in which quantitative data was gathered regarding the speed and accuracy with which participants aimed and clicked
on visual-tags using camera-phones. We found that participants’ attitudes to visual-tag-based applications were broadly positive,
although they had several important reservations about camera-phone technology more generally. Data from our pointing-device
task demonstrated that novice users were able to aim and click on visual-tags quickly (well under 3 s per pointing-device
trial on average) and accurately (almost all meeting our defined speed/accuracy tradeoff of 6% error-rate). Based on our findings,
design lessons for camera-phone and visual-tag applications are presented.
相似文献
4.
There are only a few ethical regulations that deal explicitly with robots, in contrast to a vast number of regulations, which
may be applied. We will focus on ethical issues with regard to “responsibility and autonomous robots”, “machines as a replacement
for humans”, and “tele-presence”. Furthermore we will examine examples from special fields of application (medicine and healthcare,
armed forces, and entertainment). We do not claim to present a complete list of ethical issue nor of regulations in the field
of robotics, but we will demonstrate that there are legal challenges with regard to these issues.
相似文献
5.
We provide the complete record of methodology that let us evolve BrilliAnt, the winner of the Ant Wars contest. Ant Wars contestants are virtual ants collecting food on a grid board in the presence
of a competing ant. BrilliAnt has been evolved through a competitive one-population coevolution using genetic programming
and fitnessless selection. In this paper, we detail the evolutionary setup that lead to BrilliAnt’s emergence, assess its
direct and indirect human-competitiveness, and describe the behavioral patterns observed in its strategy.
相似文献
6.
Quantitative usability requirements are a critical but challenging, and hence an often neglected aspect of a usability engineering process. A case study is described where quantitative usability requirements played a key role in the development of a new user interface of a mobile phone. Within the practical constraints of the project, existing methods for determining usability requirements and evaluating the extent to which these are met, could not be applied as such, therefore tailored methods had to be developed. These methods and their applications are discussed. 相似文献
7.
The complexity of group dynamics occurring in small group interactions often hinders the performance of teams. The availability
of rich multimodal information about what is going on during the meeting makes it possible to explore the possibility of providing
support to dysfunctional teams from facilitation to training sessions addressing both the individuals and the group as a whole.
A necessary step in this direction is that of capturing and understanding group dynamics. In this paper, we discuss a particular
scenario, in which meeting participants receive multimedia feedback on their relational behaviour, as a first step towards
increasing self-awareness. We describe the background and the motivation for a coding scheme for annotating meeting recordings
partially inspired by the Bales’ Interaction Process Analysis. This coding scheme was aimed at identifying suitable observable
behavioural sequences. The study is complemented with an experimental investigation on the acceptability of such a service.
相似文献
8.
Support vector machines (SVMs) have been promising methods for classification and regression analysis due to their solid mathematical
foundations, which include two desirable properties: margin maximization and nonlinear classification using kernels. However,
despite these prominent properties, SVMs are usually not chosen for large-scale data mining problems because their training
complexity is highly dependent on the data set size. Unlike traditional pattern recognition and machine learning, real-world
data mining applications often involve huge numbers of data records. Thus it is too expensive to perform multiple scans on
the entire data set, and it is also infeasible to put the data set in memory. This paper presents a method, Clustering-Based SVM (CB-SVM), that maximizes the SVM performance for very large data sets given a limited amount of resource, e.g., memory. CB-SVM applies
a hierarchical micro-clustering algorithm that scans the entire data set only once to provide an SVM with high quality samples.
These samples carry statistical summaries of the data and maximize the benefit of learning. Our analyses show that the training
complexity of CB-SVM is quadratically dependent on the number of support vectors, which is usually much less than that of
the entire data set. Our experiments on synthetic and real-world data sets show that CB-SVM is highly scalable for very large
data sets and very accurate in terms of classification.
A preliminary version of the paper, “ Classifying Large Data Sets Using SVM with Hierarchical Clusters”, by H. Yu, J. Yang, and J. Han, appeared in Proc. 2003 Int. Conf. on Knowledge Discovery in Databases (KDD'03), Washington, DC, August 2003. However, this submission has substantially extended the previous paper and contains new and
major-value added technical contribution in comparison with the conference publication.
相似文献
9.
We introduce a new type of lexical structure called lexical system, an interoperable model that can feed both monolingual and multilingual language resources. We begin with a formal characterization
of lexical systems as simple directed graphs, solely made up of nodes corresponding to lexical entities and links. To illustrate
our approach, we present data borrowed from a lexical system that has been generated from the French DiCo database. We later
explain how the compilation of the original dictionary-like database into a net-like one has been made possible. Finally,
we discuss the potential of the proposed lexical structure for designing multilingual lexical resources.
相似文献
10.
Listening to music on personal, digital devices whilst mobile is an enjoyable, everyday activity. We explore a scheme for
exploiting this practice to immerse listeners in navigation cues. Our prototype, ONTRACK, continuously adapts audio, modifying
the spatial balance and volume to lead listeners to their target destination. First we report on an initial lab-based evaluation
that demonstrated the approach’s efficacy: users were able to complete tasks within a reasonable time and their subjective
feedback was positive. Encouraged by these results we constructed a handheld prototype. Here, we discuss this implementation
and the results of field-trials. These indicate that even with a low-fidelity realisation of the concept, users can quite
effectively navigate complicated routes.
相似文献
11.
The paper reflects on the unique experience of social and technological development in Lithuania since the regaining of independence
as a newly reshaped society constructing a distinctive competitive IST-based model at global level. This has presented Lithuanian
pattern of how to integrate different experiences and relations between generations in implementing complex information society
approaches. The resulting programme in general is linked to the Lisbon objectives of the European Union. The experience of
transitional countries in Europe, each different but facing some common problems, may be useful to developing countries in
Africa.
相似文献
12.
Awareness systems have attracted significant research interest for their potential to support interpersonal relationships.
Investigations of awareness systems for the domestic environment have suggested that such systems can help individuals stay
in touch with dear friends or family and provide affective benefits to their users. Our research provides empirical evidence
to refine and substantiate such suggestions. We report our experience with designing and evaluating the ASTRA awareness system,
for connecting households and mobile family members. We introduce the concept of connectedness and its measurement through
the Affective Benefits and Costs of communication questionnaire (ABC-Q). We inform results that testify the benefits of sharing
experiences at the moment they happen without interrupting potential receivers. Finally, we document the role that lightweight,
picture-based communication can play in the range of communication media available.
相似文献
13.
The Stanford Event Heap has been shown to provide appropriate support for constructing interactive workspace applications.
Given this success it is natural to consider the Event Heap as a platform to support other classes of Ubiquitous Computing
applications. In this paper we argue that the distributed, spontaneous nature of these applications places additional demands
on the Event Heap that require extensions to both the engineering and API. Suitable extensions are described and their use
to support a typical Ubicomp application is discussed.
相似文献
14.
Ohne Zusammenfassung
相似文献
15.
To get the maximum benefit from ambient intelligence (AmI), we need to anticipate and react to possible drawbacks and threats
emerging from the new technologies in order to devise appropriate safeguards. The SWAMI project took a precautionary approach
in its exploration of the privacy risks in AmI and sought ways to reduce them. It constructed four “dark scenarios” showing
possible negative implications of AmI, notably for privacy protection. Legal analysis of the depicted futures showed the shortcomings
of the current legal framework in being able to provide adequate privacy protection in the AmI environment. In this paper,
the authors, building upon their involvement in SWAMI research as well as the further advancement of EU privacy analysis,
identify various outstanding issues regarding the legal framework that still need to be resolved in order to deal with AmI
in an equitable and efficacious way. This article points out some of the lacunae in the legal framework and postulates several
privacy-specific safeguards aimed at overcoming them.
相似文献
16.
Research on hybrid bionic systems (HBSs) is still in its infancy but promising results have already been achieved in laboratories.
Experiments on humans and animals show that artificial devices can be controlled by neural signals. These results suggest
that HBS technologies can be employed to restore sensorimotor functionalities in disabled and elderly people. At the same
time, HBS research raises ethical concerns related to possible exogenous and endogenous limitations to human autonomy and
freedom. The analysis of these concerns requires reflecting on the availability of scientific models accounting for key aspects
of sensorimotor coordination and plastic adaptation mechanisms in the brain.
相似文献
17.
This paper is concerned with the elimination of unnecessary states in discrete-event system control agents. Several approaches
to supervisor reduction are studied and a new relation between agents, comparability, is defined to encapsulate most of the concepts found in the aforementioned methods. This relation is also proven to be preserved
under conjunction, which is commonly employed to determine the centralized representation of two decentralized DES supervisors.
相似文献
18.
3D computer graphics have been an important feature in games development since it was first introduced in the early 80s and
there is no doubt that 3D based content is often viewed as more attractive in games than the more abstract 2D graphics. Many
games publishers are keen to leverage their success in the console market into the mobile phone platform. However, the resource
constraints of mobile phones and the fragmented nature of the environment present considerable challenges for games developers.
In this paper we consider some of the current constraints together with current and, probable, future developments both in
the software and hardware of mobile phones. As part of this process we benchmark some of the latest and most prevalent software
and hardware devices to ascertain both the quality of the graphics produced and the effects upon battery life. Whilst our
test results highlight that the current market does indeed present challenges, our research into the future developments highlights
the fact we are approaching greater standardization, which will be an important factor for the successful development of 3D
mobile games.
相似文献
19.
A number of mobile applications have emerged that allow users to locate one another. However, people have expressed concerns
about the privacy implications associated with this class of software, suggesting that broad adoption may only happen to the
extent that these concerns are adequately addressed. In this article, we report on our work on P eopleF inder, an application that enables cell phone and laptop users to selectively share their locations with others (e.g. friends,
family, and colleagues). The objective of our work has been to better understand people’s attitudes and behaviors towards
privacy as they interact with such an application, and to explore technologies that empower users to more effectively and
efficiently specify their privacy preferences (or “policies”). These technologies include user interfaces for specifying rules
and auditing disclosures, as well as machine learning techniques to refine user policies based on their feedback. We present
evaluations of these technologies in the context of one laboratory study and three field studies.
相似文献
20.
We propose a new conceptual model for understanding technology evolution that highlights dynamic and highly interdependent
relationships among multiple technologies. We argue that, instead of considering technologies in isolation, technology evolution
is best viewed as a dynamic system or ecosystem that includes a variety of interrelated technologies. By considering the interdependent nature of technology evolution, we
identify three roles that technologies play within a technology ecosystem. These roles are components, products and applications, and support and infrastructure. Technologies within an ecosystem interact through these roles and impact each others’ evolution. We also classify types
of interactions between technology roles, which we term paths of influence. We demonstrate the use of our proposed model through examples of wireless networking (Wi-Fi) technologies and a business
mini-case on the digital music industry.
相似文献
|