Search Results - open game
Suggested Topics within your search.
Suggested Topics within your search.
- Computational Intelligence 7
- Computational intelligence 7
- Artificial Intelligence 6
- Artificial intelligence 6
- Applied Dynamical Systems 4
- Dynamics 4
- Nonlinear theories 4
- Data and Information Security 3
- Data protection 3
- Application software 2
- Communications Engineering, Networks 2
- Computer and Information Systems Applications 2
- Computer science 2
- Computers & Technology 2
- Control engineering 2
- Data Mining and Knowledge Discovery 2
- Data mining 2
- Education 2
- Educational technology 2
- Language and languages 2
- Signal processing 2
- Signal, Speech and Image Processing 2
- Sociology 2
- Study and teaching 2
- System theory 2
- Telecommunication 2
- Applied Linguistics 1
- Applied linguistics 1
- Arts 1
- Automation 1
Search alternatives:
- game »
-
1
Games, Rhymes, and Wordplay of London Children
Published Springer International Publishing : Imprint: Palgrave Macmillan, 2019.Full-text access
e-Book -
2
Gameful Second and Foreign Language Teaching and Learning Theory, Research, and Practice /
Published Springer International Publishing : Imprint: Palgrave Macmillan, 2019.Full-text access
e-Book -
3
Increasing student engagement and retention using immersive interfaces virtual worlds, gaming, and simulation /
Published Emerald, 2012.Table of Contents: “…Innovative approaches in higher education : an introduction to using immersive interfaces / Patrick Blessinger, Charles Wanke -- Learner engagement in the use of individual and collaborative serious games / Margarida Romero -- Strategies for designing engaging e-learning instructions : know your learners' need / Wei Lian Tan -- Game mechanics for classroom engagement / Stayc DuBravac -- Increasing student engagement using client-based peer assessment in multi-role, whole-enterprise simulations / Steve Gove -- Bringing the classroom to life : using virtual worlds to develop teacher candidate skills / Danielle Mirliss, Grace May, Mary Zedeck -- Engaging Chinese students and enhancing leadership development through virtual simulation : a cross-cultural perspective / Scott A. …”
Full-text access
e-Book -
4
Watermarking Security
Published Springer Nature Singapore : Imprint: Springer, 2016.Full-text access
e-Book -
5
The Hackable City Digital Media and Collaborative City-Making in the Network Society /
Published Springer Nature Singapore : Imprint: Springer, 2019.Table of Contents: “…The Hacker, the City and Their Institutions: From Grassroots Urbanism to Systemic Change -- Part I: Design Practices in the Hackable City -- Power to the People: Hacking the City with Plug-In Interfaces for Community Engagement -- Rapid Street Game Design: Prototyping Lab for Urban Change -- The City as Perpetual Beta: Fostering Systemic Urban Acupuncture -- Part II: Changing Roles -- Transforming Cities by Designing with Communities -- Economic Resilience Through Community-driven (Real Estate) Development in Amsterdam-Noord -- This is Our City! …”
Full-text access
e-Book -
6
The disruptive power of online education : challenges, opportunities, responses /
Published Emerald Publishing Limited, 2018.Full-text access
e-Book -
7
The M in CITAMS@30 : media sociology /
Published Emerald Publishing Limited, 2018.Table of Contents: “…Prelims -- Introduction to volume 18: The M in CITAMS@30: media sociology -- Part 1 Inequalities and media -- Closing the digital divide: a justification for government intervention -- Public knowledge and digital divide: the role and impact of China's media -- Changing politics of tribalism and morality in I Am Legend and its remakes -- A niagara of intemperance and vice: newspaper reports on immigrant New York, 18001900 -- Part 2 Cultural production and consumption -- Everyone's a critic? openness as a means to closure in cultural journalism -- The attractions of "recoil" tv: the story-world of Game of Thrones -- From the raja to the desi romance: a sociological discourse on family, class, and gender in Bollywood -- Liberalism without a press: eighteenth-century Minas Geraes and the roots of Brazilian development -- Affective (im)mediations and the communication process -- Afterword: Reflections on my path to CITASA/CITAMS and the future of our section -- Index.…”
Full-text access
e-Book -
8
Multi-agent and Complex Systems
Published Springer Nature Singapore : Imprint: Springer, 2017.Table of Contents: “…1.Adaptive Forwarder Selection for Distributed Wireless Sensor Networks -- 2.Trust Transference on Social Exchanges among Triads of Agents Based on Dependence Relations and Reputation -- 3.A Multiagent-Based Domain Transportation Approach for Optimal Resource Allocation in Emergency Management -- 4.A proto-type of a portable ad hoc simple water gauge and real world evaluation -- 5.Exploiting Vagueness for Multi-Agent Consensus 6.Selecting Robust Strategies Based on Abstracted Game Models -- 7.Simulating and Modeling Dual Market Segmentation Using PSA Framework -- 8.CORPNET: Towards a Decision Support System for Organizational Network Analysis using Multiplex Interpersonal Relations -- 9.Membership Function Based Matching Approach of Buyers and Sellers Through a Broker in Open E-Marketplace -- 10.The Effect of Assertiveness and Empathy on Heider's Balance Theory for Friendship Network Models information on submission -- 11.Associative Memory-based Approach to Multi-task Reinforcement Learning under Stochastic Environments -- 12.Preliminary Estimating Method of Opponent's Preferences using Simple Weighted Functions for Multi-lateral Closed Multi-issue Negotiations -- 13.Multi-Objective Nurse Rerostering Problem -- 14.Preference Aware Influence Maximization -- 15.Norm Emergence through Collective Learning and Information Diffusion in Complex Relationship Networks -- 16.Agent-Based Computation of Decomposition Games with Application in Software Requirements Decomposition.…”
Full-text access
e-Book -
9
Constructing Roma Migrants European Narratives and Local Governance /
Published Springer International Publishing : Imprint: Springer, 2019.Full-text access
e-Book -
10
Cyber Security: Power and Technology
Published Springer International Publishing : Imprint: Springer, 2018.Full-text access
e-Book -
11
Mathematical Progress in Expressive Image Synthesis III Selected and Extended Results from the Symposium MEIS2015 /
Published Springer Nature Singapore : Imprint: Springer, 2016.Full-text access
e-Book -
12
Intelligent Methods and Big Data in Industrial Applications
Published Springer International Publishing : Imprint: Springer, 2019.Table of Contents: “…- Modelling OpenStreepMap data for determination of the fastest route under varying driving conditions -- Evolution algorithm for community detection in social networks using node centrality -- High Performance Computing By The Crowd -- Zero-overhead monitoring of remote terminal devices -- Asynchronous Specication of Production Cell Benchmark in Integrated Model of Distributed Systems -- Implementing the Bus Protocol of a Microprocessor in a Software-Dened Computer -- ISMIS 2017 Data Mining Competition: TradingBased on Recommendations - XGBoost approach with feature engineering -- Fast Discovery of Generalized Sequential Patterns -- Seismic attributes similarity in facies classication -- Ecient Discovery of Sequential Patterns from Event-Based Spatio-Temporal Data by Applying Microclustering Approach -- Unsupervised machine learning in classication of neurobiological data -- Incorporating Fuzzy Logic in Object-Relational Mapping Layer for Flexible Medical Screenings -- Multimodal learning determines rules of disease development in longitudinal course with Parkinson's patients -- Comparison of Methods for Real and Imaginary Motion Classication from EEG Signals -- Procedural Generation of Multilevel Dungeons for Application in Computer Games using Schematic Maps and L-system -- An HMM-Based Framework for Supporting Accurate Classication of Music Datasets -- Classication of musical genres by means of listening tests and decision algorithms -- Handwritten signature verication system employing wireless biometric pen -- Towards Entity Timeline Analysis in Polish Political News -- Automatic Legal Document Analysis: Improving the Results of Information Extraction Processes using an Ontology -- To improve, or not to improve; how changes in corpora inuence the results of machine learning tasks on the example of datasets used for paraphrase identication -- Context Sensitive Sentiment Analysis of Financial Tweets: A New Dictionary.…”
Full-text access
e-Book -
13
Towards Digital Enlightenment Essays on the Dark and Light Sides of the Digital Revolution /
Published Springer International Publishing : Imprint: Springer, 2019.Full-text access
e-Book -
14
Disciplinary Convergence in Systems Engineering Research
Published Springer International Publishing : Imprint: Springer, 2018.Table of Contents: “…An Empirical Study of Technical Debt in Open-Source Software Systems -- Part 2: System-of-Systems Integration -- Chapter10. …”
Full-text access
e-Book -
15
Shortest Path Solvers. From Software to Wetware
Published Springer International Publishing : Imprint: Springer, 2018.Full-text access
e-Book -
16
Advances in Soft and Hard Computing
Published Springer International Publishing : Imprint: Springer, 2019.Table of Contents: “…Quality Control and Interaction Procedure of Service Subsystems -- Validation of Safety-Like Properties for Entity-Based Access Control Policies -- Randomness Evaluation of PP-1 and PP-2 Block Ciphers Round Keys Generators -- New Results in Direct SAT-based Cryptanalysis of DES-like Ciphers -- Secure Generators of q-valued Pseudo-random Sequences on Arithmetic Polynomials -- A Hybrid Approach to Fault Detection in One Round of PP-1 Cipher -- Protection of Information from Imitation on the Basis of Crypt-code -- On a New Intangible Reward for Card-Linked Loyalty Programs -- KaoChow Protocol Timed Analysis -- Electronic Document Interoperability in Transactions Executions -- L-system Application to Procedural Generation of Room Shapes for 3D Dungeon Creation in Computer Games -- Hardware-Efficient Algorithm for 3D Spatial Rotation -- Driver Drowsiness Estimation by Means of Face Depth Map Analysis -- Vehicle Passengers Detection for Onboard eCall-Compliant Devices -- An Algorithm for Computing the True Discrete Fractional Fourier Transform -- Region Based Approach for Binarization of Degraded Document Images -- Partial Face Images Classification Using Geometrical Features -- A Method of Feature Vector Modification in Keystroke Dynamics -- Do-It-Yourself Multi-material 3D Printer for Rapid Manufacturing of Complex Luminaries -- Multichannel Spatial Filters for Enhancing SSVEP Detection.…”
Full-text access
e-Book -
17
Software Engineering Perspectives and Application in Intelligent Systems Proceedings of the 5th Computer Science On-line Conference 2016 (CSOC2016), Vol 2 /
Published Springer International Publishing : Imprint: Springer, 2016.Table of Contents: “…-Software usability Evaluation Based on the User Pinpoint Activity Heat Map -- Inflated Power Iteration Clustering Algorithm to Optimize Convergence Using Lagrangian Constraint -- Virtualization of Operating System Using Type-2 Hypervisor -- A New Game-Theoretical Approach in Network Routing: Algorithms and Their Performance Analysis in OMNeT++ -- Using Analytical Programming for Software Effort Estimation -- Intra-Frame Prediction Mode Decision for Efficient Compression and Signal Quality -- Multidimensional Design of OLAP System for Context-Aware Analysis in the Ambient Intelligence Environment -- A Process for Creating the Elicitation Guide of Non-Functional Requirements -- A Data-Centric Algorithm for Identifying Use Cases -- Algorithm to Balance Compression and Signal Quality using Novel Compressive Sensing in Medical Images -- Application of Virtualization Technology for Implementing Smart House Control Systems -- Utilization of Motion Animation for Analysis of Basic Self-defense Techniques -- EMG Analysis for Basic Self-defense Techniques -- Proposal of the Web Application for Selection Of Suitable Job Applicants Using Expert System -- The technique of Selecting Multiversion Software System Structure with Minimum Simultaneous Module Version Usage -- Expressing Pre- and Post-conditions, Attributesand Business Constraints in Artifact-Centric Business Processes Using Object Role Modeling -- Spam Detection: Naive Bayesian Classification and Rpn Expression-Based Lgp Approaches Compared -- An Agile Approach to Improve Process-Oriented Software Development -- Ad-hoc Routing Protocols Comparison Using Open-Source Simulation Tool -- Discrete Event Simulation of Loading Unloading Operations in a Specific Intermodal Transportation Context -- Parallelization of Fuzzy Logic Analysis for Pattern Recognition -- Performance Management Using Autonomous Control-Based Distributed Coordination Approach in a Volunteer Grid Computing Environment.…”
Full-text access
e-Book -
18
Information Technology - New Generations 15th International Conference on Information Technology /
Published Springer International Publishing : Imprint: Springer, 2018.Table of Contents: “…Part I Cybersecurity -- Safeguarding Personal Health Information: Case Study -- Cybersecurity as People Powered Perpetual Innovation -- Performance Study of the Impact of Security on 802.11ac Networks -- Training Neural Tensor Networks with the Never Ending Language Learner -- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework -- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan -- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network -- A Virtual Animated Commentator Architecture for Cybersecurity Competitions -- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features -- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach) -- A Self Proxy Signature Scheme over NTRU Lattices -- Towards an Ontology of Security Assessment: a core model proposal -- Integration of Mobile Forensic Tool Capabilities -- Deep Packet Inspection: A Key Issue for Network Security -- What Petya/NotPetya Ransomware is and What its Remidiations are -- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform -- New Techniques for Public Key Encryption with Sender Recovery -- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa -- Protecting Personal Data with Blockchain Technology -- The Role of CAE-CDE in Cybersecurity Education for Workforce Development -- Software Optimizations for DES -- Part II Networking and Wireless Communications -- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment -- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks -- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges -- A Dual canister medicine IoT Dispenser -- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks -- Denial of service attacks inwireless sensor networks with proposed countermeasures -- Part III Education and Technology -- Internet-Based Education: A New Milestone for Formal Language and Automata Courses -- Teaching Communication Management in Software Projects through Serious Educational Games -- Gamification applied in the teaching of agile Scrum methodology -- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework -- Part IV Agile Software Testing and Development -- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects -- Alignment of Requirements and Testing in Agile: an Industrial Experience -- Health Care Information Systems: A Crisis Approach -- Using Correct-by-Construction Software Agile Development -- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services -- Improving Agile Software Development with Domain Ontologies -- A Stratified Sampling Algorithmfor Artificial Neural Networks -- Part V Data Mining/Machine Learning -- Mining ENADE Data from the Ulbra Network Institution -- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA) -- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise -- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets -- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series -- DeRis: Information system supporting the prediction of default risk in companies -- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm -- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics -- A model for hour-wise prediction of mobile device energy availability -- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model -- A Traffic Light Recognition Device -- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment -- Reproducible Research in Document Analysis and Recognition -- Music Genre Classification using Data Mining and Machine Learning -- Improving word representations using Paraphrase dataset -- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions -- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning -- Business Intelligence Dashboard Application for Insurance Cross Selling -- Speech Features Analysis for Tone Language Speaker Discrimination Systems -- Selection of Transformations of Continuous Predictors in Logistic Regression -- Part VI Software Engineering -- A Generic Approach to Efficiently Parallelize Legacy Sequential Software -- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications -- A Timed Petri NetModel to Specify Scenarios of Video Games -- Survey of Biometric Techniques for Automotive Applications -- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations -- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application -- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules -- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games -- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies -- Increasing the prediction quality of software defective modules with automatic feature engineering -- Part VII High Performance Computing Architectures -- NSF Noyce Recruitment and Mentorship -- Mining Associations between Two Categories using Unstructured Text Data in Cloud -- A Note on Computational Science Curriculum -- Development of a Local Cloud-Based Bioinformatics Architecture -- Part VIII Computer Vision, Image Processing/Analysis -- AComputer Vision Based Algorithm for Obstacle Avoidance -- The ST-Vis tool for SpatioTemporal Visualization -- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima -- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network -- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation -- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries -- Part IX Health, Bioinformatics, Pattern Detection and Optimization -- Benefits of Establishing Makerspaces in Distributed Development Environment -- Semantic Description of Healthcare Devices to Enable Data Integration -- Applying transfer learning to QSAR regression models -- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine -- A Complete Diabetes Management and Care System -- On the use of van der PauwTechnique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring -- Part X Potpourri -- Smart Lighting Controlling System: Case Study of Yarmouk University Museum -- Incremental Topology Generated for ANN A Case Study on a Helicopter's Flight Simulation -- Degree Aware Triangulation of Annular Regions -- Heuristic Approaches for the Open-Shop Scheduling Problem -- Continuous State Power-down Systems for Renewable Energy Management -- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems -- Part XI Short Papers -- Customer services management and satisfaction of Internet-related banking of First National Bank -- BIG IoT - Interconnecting IoT Platforms from different domains - First success story -- Cross-Cultural Perspective of E-Commerce -- Website Usability Requirements: Through the Lens of Individual's Perception -- Methods of Ensuring the Reliability and Fault Tolerance of Information Systems -- Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise -- Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly -- A Classifier Evaluation for Payments' Default Predictions in a Brazilian Retail Company -- Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review -- Operating System Security Management and…”
Full-text access
e-Book -
19
Applied Physics, System Science and Computers II Proceedings of the 2nd International Conference on Applied Physics, System Science and Computers (APSAC2017), September 27-29, 2017...
Published Springer International Publishing : Imprint: Springer, 2019.Table of Contents: “…Noticing of Volume Fraction Limiting -- Simulation of the Inflow to a Well Equipped with a Vertical Slot Filter -- Errors of Approximation with Polynomial Splines of the Fifth Order -- Classical Potential Barrier of Liquid Phase Radical Reactions and Its Simulation Based on the Experimental Kinetic and Thermochemical Data Using Fuzzy Neural Networks -- Type of Substance as a New Physical Quantity -- Spectroscopy of Colorants for Fine Art in Visual and Near Infrared Spectrum -- From Quantum Sensing to SWEME Interaction Modeling -- An Ultrasound Technique for the Characterization of the Acoustic Emission of Reinforced Concrete Beam -- Prediction of Airport Acoustical Noise by Deterministic Decomposition and Seasonal ARIMA Techniques -- Express Registration of Partial Discharges in Gas-insulated Switchgear -- Risk Factors for the Occurrence of Traumatic Vacuum Phenomenon After Chest Compression for Patients with Cardiac Arrest -- A System for Big Attributed Hierarchical Graph Visualization -- A System of Functional Programming for Supporting Cloud Supercomputing -- Security and Performance of a Textual Substitution Compression Method Applied to Images -- A Solution of the Mastermind Board Game in Scratch Suitable for Algorithmic Thinking Development -- The Development of KarelNXT Robot as a Simulation of xKarel Programming Language -- Development of Polytechnic Creativity of Primary School Pupils -- Distribution and Validation of Meteorological Data for the Air Traffic Management Systems -- HLA Simulation of Customer Flow in a Polyclinic -- Steganographic Principle for Transfer Hidden Pictures within Pictures -- Assets as Part of Tertiary Technical Education -- Using of the Tablets for Amplyopia Treatment -- Neural Interface: The potential of Using Cheap EEG Devices for Scientific Purposes -- Optimal Information Paths in Social Media: Personalized Consumption of Tweets -- Solving Sparse Matrices: a Comparative Analysis between FPGA and GPU -- Making a Shift from Believing to Knowing by the Help of RDF CFL Formal Representation -- Deformation Analysis in Image Sequences by Physics-Inspired Virtual Current Interaction -- Utilization of NFV in Cloud Data Center -- Autonomic Machine Learning for Intelligent Databases -- Recommender System for Post-editing of Machine Translation -- Neural Network methods for Image Segmentation -- An HPC-Data Center Case Study on the Power Consumption of Workload -- Identifying Problematic e-Courses Content Based on Students Behaviour -- Dyscalculia: A Behavioural Vision -- Enhancing the Development of Interaction between Authorities in Maritime Surveillance -- Electricity Peak Demand Classification with Machine Learning Techniques -- Theϵ-Complexity of Finite-Dimensional Continuous Maps -- Characterisation of the Vibration of an Ultrasonic Transducer for Guided Waves Applications -- Asymptotic Stability of Partial Difference Equations Systems with Singular Matrix -- Chaos and Stability of the Financial System -- A Simple Econophysics Model of the Stock Market as a Nonequilibrium Open System -- Mathematical Modeling and Simulation of Selected Multipulse Rectifiers, Used in "Conventional" Airplanes and Aircrafts Consistent with the Trend of "MEA/AEA" -- A Sufficient Asymptotic Stability Condition in Generalised Model Predictive Control to Avoid Input Saturation -- Minimization of Dynamic Loads in the Reciprocating Motion of the Executive Links of a Large Mass -- Harmonic Analysis in a Node Where Exist a Deformed Regime -- Human Upper Limb Motions Video Analysis Used for Rehabilitation Robotics -- Interactive Control System Proposal for High Switching Frequency Resonant Converters -- PWM Controlled Single-Phase Induction Motor Supplied from Single-Leg MxC -- Forward and Inverse Kinematics Using Transposition Method for Robotic Arm DOBOT -- Integral Assessment of Power Network Equipment Operational Risks: Special Aspects.…”
Full-text access
e-Book -
20
Information and Decision Sciences Proceedings of the 6th International Conference on FICTA /
Published Springer Nature Singapore : Imprint: Springer, 2018.Table of Contents: “…Smart Fire Safety: Serious Game for Fire Safety Awareness -- 6. An OpenMP based algorithmic optimization for Congestion Control of Network Traffic -- 7. …”
Full-text access
e-Book