Search results for: game with a purpose - Bridge of Knowledge

Search

Search results for: game with a purpose

Filters

total: 103

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: game with a purpose

  • Playing the Sprint Retrospective

    In agile software development, where great emphasis is put on effective informal communication, success depends heavily on human and social factors. However, Scrum does not specify any techniques that aid the human side of software development. In this paper we investigate the use of 6 collaborative games for the Sprint Retrospective. Each game was implemented twice in a Scrum team in Intel Technology Poland. The received feedback...

    Full text available to download

  • Possible uses of crisis situation aiding system in virtual world simulation

    Many of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover, it shows how this kind of system can be taught during subsequent games with a large number of players. As an example...

  • Adaptive Algorithm for Interactive Question-based Search

    Publication

    - Year 2012

    Popular web search engines tend to improve the relevanceof their result pages, but the search is still keyword-oriented and far from "understanding" the queries' meaning. In the article we propose an interactive question-based search algorithm that might come up helpful for identifying users' intents. We describe the algorithm implemented in a form of a questions game. The stress is put mainly on the most critical aspect of this...

  • Information retrieval with semantic memory model

    Publication

    Psycholinguistic theories of semantic memory form the basis of understanding of natural language concepts. These theories are used here as an inspiration for implementing a computational model of semantic memory in the form of semantic network. Combining this network with a vector-based object-relation-feature value representation of concepts that includes also weights for confidence and support, allows for recognition of concepts...

    Full text to download in external service

  • A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks

    Publication

    - Year 2018

    In wireless networks, stations can improve their received quality of service (QoS) by handling packets of source flows with higher priority. Additionally, in cooperative relay networks, the relays can handle transit flows with lower priority. We use game theory to model a two-hop relay network where each of the two involved stations can commit such selfish QoS manipulation. We design and evaluate a reputation-based incentive scheme...

    Full text available to download

  • Finding small-width connected path decompositions in polynomial time

    Publication

    A connected path decomposition of a simple graph $G$ is a path decomposition $(X_1,\ldots,X_l)$ such that the subgraph of $G$ induced by $X_1\cup\cdots\cup X_i$ is connected for each $i\in\{1,\ldots,l\}$. The connected pathwidth of $G$ is then the minimum width over all connected path decompositions of $G$. We prove that for each fixed $k$, the connected pathwidth of any input graph can be computed in polynomial-time. This answers...

    Full text available to download

  • Evolutionary Sets of Safe Ship Trajectories: Evaluation of Individuals

    The paper presents a description of the evaluation phase of the Evolutionary Sets of Safe Ship Trajectories method. In general, the Evolutionary Sets of Safe Ship Trajectories method combines some of the assumptions of game theory with evolutionary programming and finds an optimal set of cooperating trajectories of all ships involved in an encounter situation. While developing a new version of this method, the authors decided to...

    Full text available to download

  • Multiple access in ad-hoc wireless LANs with noncooperative stations

    Publication

    - Year 2002

    A class of contention-type MAC protocols (e.g., CSMA/CA) relies on random deferment of packet transmission, and subsumes a deferment selection strategy and a scheduling policy that determines the winner of each contention cycle. This paper examines contention-type protocols in a noncooperative an ad-hoc wireless LAN setting, where a number of stations self-optimise their strategies to obtain a more-than-fair bandwidth share. Two...

  • Evolutionary Sets of Safe Ship Trajectories: Evaluation of Individuals

    Publication

    The paper presents a description of the evaluation phase of the Evolutionary Sets of Safe Ship Trajectories method. In general, the Evolutionary Sets of Safe Ship Trajectories method combines some of the assumptions of game theory with evolutionary programming and finds an optimal set of cooperating trajectories of all ships involved in an encounter situation. While developing a new version of this method, the au-thors decided...

  • Bringing Common Sense to WordNet with a Word Game

    Publication

    We present a tool for common sense knowledge acquisition in form of a twenty questions game. The described approach uses WordNet dictionary, which rich taxonomy allows to keep cognitive economy and accelerate knowledge propagation, although sometimes inferences made on hierarchical relations result in noise. We extend the dictionary with common sense assertions acquired during the games played with humans. The facts added to the...

    Full text to download in external service

  • Customized crossover in evolutionary sets of safe ship trajectories

    The paper presents selected aspects of evolutionary sets of safe ship trajectories-a method which applies evolutionary algorithms and some of the assumptions of game theory to solving ship encounter situations. For given positions and motion parameters of the ships, the method finds a near optimal set of safe trajectories of all ships involved in an encounter. The method works in real time and the solutions must be returned within...

    Full text available to download

  • A socially responsible university - an attempt to approach the system

    It is the author's thesis that social responsibility of university is an integrated system of both knowledge management (KM), quality management (QM) and organizational development (OD) processes. The author determined that the university "bond" is an institutional culture (IC). An integrated system is the way to create university an open system co-operated and co-opetited with stakeholders. The stakes are high in game - both students...

    Full text available to download

  • Limitations of Emotion Recognition in Software User Experience Evaluation Context

    This paper concerns how an affective-behavioural- cognitive approach applies to the evaluation of the software user experience. Although it may seem that affect recognition solutions are accurate in determining the user experience, there are several challenges in practice. This paper aims to explore the limitations of the automatic affect recognition applied in the usability context as well as...

    Full text available to download

  • Playing the Sprint Retrospective: A Replication Study

    Publication

    - Year 2020

    The Sprint Retrospective is a vehicle for continuous process improvement. Even though it is a well established agile practice, running effective retrospective meetings is challenging. There have been a lot of identified problems that commonly occur during these meetings. To address them, Przybyłek & Kotecka [20] successfully revitalized retrospective meetings by adopting collaborative games, which represent a powerful tool in improving...

    Full text to download in external service

  • AUTOMATIC LEARNING OF STRATEGY AND RULES IN CARD GAMES USING IMAGE FROM CAMERA

    Publication

    Below work tries to answer a question: if it is possible to replace real human with computer system in social games. As a subject for experiments, card games were chosen, because they require a lot of player interaction (playing and taking cards), while their rules are easy to present in form of clear list of statements. Such a system, should allow real players to play without constant worrying about guiding or helping computer...

  • Evolutionary Sets Of Safe Ship Trajectories: A New Approach To Collision Avoidance

    Publication

    The paper introduces a new method of solving multi-ship encounter situations for both open waters and restricted water regions. The method, called evolutionary sets of safe trajectories combines some of the assumptions of game theory with evolutionary programming and aims to find optimal set of safe trajectories of all ships involved in an encounter situation. In a two-ship encounter situation it enables the operator of an on-board...

  • MARKETING STRATEGY - SPACE AS A PRODUCT.ARCHITECTURE AS A MARKETING DEVICE.

    Publication

    - Year 2012

    Space has its measurable financial value. From the economic point of view place can be treated as a product that fights for appearing in tourists' and investors' consciousnesses. Space - treated as the object of demand and supply - becomes an element in a marketing game. To reach its maximal value the given space should be competitive to other spaces, from which it wants to stand out. However, in the field of architecture - and...

  • Developing Game-Structure Sensitive Matchmaking System for Massive-Multiplayer Online Games

    Publication

    - Year 2015

    Providing a fair matchmaking system is an essential issue, while developing every online video game. In the article, we show that the currently existing matchmaking system in League of Legends, one of the most popular online video games currently existing, is built on a base of conditions which do not hold true in the presence of empirical data. This, in short, decreases the effectiveness of the ranking system, and negatively affects...

    Full text to download in external service

  • Fake VIP Attacks and Their Mitigation via Double-Blind Reputation

    Publication

    - Year 2017

    In a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...

    Full text available to download

  • Semantic Memory for Avatars in Cyberspace

    Publication

    - Year 2005

    Avatars that show intelligent behavior should have an access to general knowledge about the world, knowledge that humans store in their semantic memories. The simplest knowledge representation for semantic memory is based on the Concept Description Vectors (CDVs) that store, for each concept, an information whether a given property can be applied to this concept or not. Unfortunately large-scale semantic memories are not available....

  • A NOTE ON ON-LINE RAMSEY NUMBERS FOR QUADRILATERALS

    Publication

    - Opuscula Mathematica - Year 2014

    We consider on-line Ramsey numbers defined by a game played between two players, Builder and Painter. In each round Builder draws an the edge and Painter colors it either red or blue, as it appears. Builder’s goal is to force Painter to create a monochromatic copy of a fixed graph H in as few rounds as possible. The minimum number of rounds (assuming both players play perfectly) is the on-line Ramsey number \widetilde{r}(H) of...

    Full text available to download

  • A Centralized Reputation System for MANETs Based on Observed Path Performance

    Publication

    A reputation system for MANETs is described that attempts to deduce nodal trustworthiness (forwarding behaviour) from observed end-to-end path performance. The trustworthiness deduction algorithm produces interval estimates and works well if node misbehaviour is not selec-tive with respect to traversing paths. Nodal reputation levels are next calculated in the spirit of generous tit-for-tat so as to best reflect momentary nodal...

  • COLREGS compliance in Evolutionary Sets of Cooperating Ship Trajectories

    In general, Evolutionary Sets of Cooperating Ship Trajectories combine some of the assumptions of game theory with evolutionary programming and aim to find optimal set of cooperating trajectoriesof all ships involved in an encounter situation. In a two-ship encounter situation the method enables the operator of an on-board collision-avoidance system to predict the most probable behaviour of atarget and to plan the own manoeuvres...

    Full text available to download

  • TOPOLOGICAL CLUES FOR PREDICTING OUTCOMES OF MULTIPLAYER ONLINE BATTLE ARENA GAMES

    Publication

    - Year 2015

    With 27 million people playing League of Legends every day, e-sports became more and more important part of our everyday life. Rise of its popularity builds a demand for better understanding e-sports mechanics on a deeper level. In the article, we test a hypothesis that it is possible to predict an outcome of Multiplayer Online Battle Arena game based on topological clues only (such as area of polygon where vertices are players...

    Full text to download in external service

  • Automatic recognition of therapy progress among children with autism

    Publication

    - Scientific Reports - Year 2017

    The article presents a research study on recognizing therapy progress among children with autism spectrum disorder. The progress is recognized on the basis of behavioural data gathered via five specially designed tablet games. Over 180 distinct parameters are calculated on the basis of raw data delivered via the game flow and tablet sensors - i.e. touch screen, accelerometer and gyroscope. The results obtained confirm the possibility...

    Full text available to download

  • Searching by heterogeneous agents

    In this work we introduce and study a pursuit-evasion game in which the search is performed by heterogeneous entities. We incorporate heterogeneity into the classical edge search problem by considering edge-labeled graphs: once a search strategy initially assigns labels to the searchers, each searcher can be only present on an edge of its own label. We prove that this problem is not monotone even for trees and we give instances...

    Full text to download in external service

  • On evolutionary computing in multi-ship trajectory planning, Applied Intelligence

    The paper presents the updated version of Evolutionary Sets of Safe Ship Trajectories: a method which applies evolutionary algorithms and some of the assumptions of game theory to solving ship encounter situations. For given positions and motion parameters of the ships,the method finds a near optimal set of safe trajectories of all ships involved in an encounter. The method works in real time and the solutions must be returned...

    Full text available to download

  • STEROWANIE RAMIENIEM ROBOTA Z WYKORZYSTANIEM DANYCH Z KAMERY CYFROWEJ I MECHANIZMÓW SZTUCZNEJ INTELIGENCJI

    Pierwotnym zamysłem zespołu było stworzenie uniwersalnego systemu grającego w gry planszowe. Mierząc się z tym problemem, postanowiono zrobić jednak coś więcej - wywrócić dotychczasową koncepcję pracy użytkownika z komputerem „do góry nogami” i nie zmuszać użytkownika do nauki interfejsu, a zmusić system do współpracy z interfejsem, który rozumie użytkownik. Dokonane zostało więc przejście ze świata wirtualnego do świata rzeczywistego...

  • LEVEL OF DETAIL CATEGORIZATION FOR THE APPLICATION IN URBAN DESIGN

    Publication

    - Przestrzeń i Forma - Year 2023

    Urban planning and urban design involve complex processes that require detailed information about the visual information of a place at various scales. Different graphic tools, such as game engines, are evolving to use urban representation fields. The concept of "level of detail" (LOD) has been used to categorize the level of detail in AEC applications such as BIM and GML for urban representation models. However, there is a need...

    Full text available to download

  • Bilateral multi-issue negotiation of execution contexts by proactive document agents

    A proactive document can react to its actual environment by autonomously selecting and performing actions integrated into its body and interact with its user. When migrating over a network of execution devices it may encounter diverse execution contexts, each one set up according to temporal characteristics of a receiving device and preferences of its owner. A concept to augment proactive documents with negotiation capability is...

    Full text available to download

  • Searching by Heterogeneous Agents

    Publication

    - Year 2019

    In this work we introduce and study a pursuit-evasion game in which the search is performed by heterogeneous entities. We incorporate heterogeneity into the classical edge search problem by considering edge-labeled graphs. In such setting a searcher, once a search strategy initially decides on the label of the searcher, can be present on an edge only if the label of the searcher and the label of the edge are the same. We prove...

    Full text to download in external service

  • On-line Ramsey Numbers of Paths and Cycles

    Publication

    - ELECTRONIC JOURNAL OF COMBINATORICS - Year 2015

    Consider a game played on the edge set of the infinite clique by two players, Builder and Painter. In each round, Builder chooses an edge and Painter colours it red or blue. Builder wins by creating either a red copy of $G$ or a blue copy of $H$ for some fixed graphs $G$ and $H$. The minimum number of rounds within which Builder can win, assuming both players play perfectly, is the \emph{on-line Ramsey number} $\tilde{r}(G,H)$. In...

    Full text available to download

  • Comparison of the effectiveness of automatic EEG signal class separation algorithms

    In this paper, an algorithm for automatic brain activity class identification of EEG (electroencephalographic) signals is presented. EEG signals are gathered from seventeen subjects performing one of the three tasks: resting, watching a music video and playing a simple logic game. The methodology applied consists of several steps, namely: signal acquisition, signal processing utilizing z-score normalization, parametrization and...

    Full text available to download

  • Evolutionary Sets of Cooperating Ship Trajectories: COLREGS Compliance

    The paper presents a newly designed improvement to the method of solving multi-ship encounter situations. In general, the method combines some of the assumptions of game theory with evolutionary programming and aims to find optimal set of cooperating trajectories of all ships involved in an encounter situation. The improvement presented here is a new way of modelling some of the COLREGS rules. Due to this change, the method is...

  • Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks

    Publication

    Quality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...

    Full text available to download

  • Zróżnicowanie bakterioplanktonu w wodach fiordów Spitsbergenu

    Publication

    - Year 2015

    Podczas rejsu polarnego latem 2013 roku w ramach projektów naukowych GAME i FACE2FACE zebrano materiał badawczy w dwóch fiordach Spitsbergenu: południowym Hornsund i północnym Kongsfjord. Punkty poboru próbek zlokalizowane były wzdłuż osi fiordów oraz w trójkącie o boku około 1,5 km wyznaczonym przez stacje w głębi fiordów. W zależności od punktu pobrano wodę z od 6 do 10 głębokości: od powierzchni do dna fiordu. Za pomocą fluorescencyjnego...

  • Code development of a DSP-FPGA based control platform for power electronics applications

    Publication
    • V. Minambres-Marcos
    • I. Roasto
    • P. Szczepankowski
    • E. Romero-Cadaval
    • D. Vinnikov
    • F. Barrero-Gonzalez

    - Year 2015

    This paper focuses on the implementation of power electronics algorithms in control platforms based on DSP-FPGA. Today’s power electronics technology demands high power computation with high speed interfacing at the same time. The most popular configuration is a DSP for the former and a FPGA for the latter. The main goal of this work was to develop a generic control system for power electronics application, but it is explained...

    Full text to download in external service

  • Improving the prediction of biochar production from various biomass sources through the implementation of eXplainable machine learning approaches

    Publication
    • V. G. Nguyen
    • P. Sharma
    • Ü. Ağbulut
    • H. S. Le
    • D. N. Cao
    • M. Dzida
    • S. M. Osman
    • H. C. Le
    • V. D. Tran

    - International Journal of Green Energy - Year 2024

    Examining the game-changing possibilities of explainable machine learning techniques, this study explores the fast-growing area of biochar production prediction. The paper demonstrates how recent advances in sensitivity analysis methodology, optimization of training hyperparameters, and state-of-the-art ensemble techniques have greatly simplified and enhanced the forecasting of biochar output and composition from various biomass...

    Full text to download in external service

  • Adopting Collaborative Games into Agile Requirements Engineering

    Publication

    In agile software development, where great emphasis is put on effective informal communication involving diverse stakeholders, success depends on human and social factors. Not surprisingly, the Agile Manifesto advocates principles and values such as “individuals and interactions over processes and tools”, “focus on the customer”, “collaborate regularly”, “communicate face-to-face within the team” and “have regular team introspection”....

    Full text available to download

  • Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions

    Publication

    - Year 2018

    We consider a generic model of Client-Server interactions in the presence of Sender and Relay, conceptual agents acting on behalf of Client and Server, respectively, and modeling cloud service providers in the envisaged "QoS as a Service paradigm". Client generates objects which Sender tags with demanded QoS level, whereas Relay assigns the QoS level to be provided at Server. To verify an object's right to a QoS level, Relay detects...

    Full text available to download

  • A repeated game formulation of network embedded coding for multicast resilience in extreme conditions

    Publication
    • C. Esposito
    • A. Castiglione
    • F. Palmieri
    • F. Pop
    • J. Rak

    - Year 2017

    Computer networks and data sharing applications are vital for our current society and fundamental for any available ICT solution, so that networking is considered as one of the key critical infrastructures and its correct behavior should be always enforced, even in case of disasters or severe execution conditions. Resilience is a strongly demanding nonfunctional requirement for current computer networks, and one of the key factors...

    Full text to download in external service

  • Wykorzystanie metody DEA do pomiaru efektywności liceów ogólnokształcących w Szczecinie

    W artykule dokonano pomiaru efektywności 19 szczecińskich liceów ogólnokształcących w 2018 roku za pomocą dwóch modeli DEA (Data Envelopment Analysis) zorientowanych na wyniki. Wykorzystano model Cross Efficiency (CE) oraz Game Cross Efficiency (GCE) do oszacowania efektywności krzyżowej. Przeanalizowano efektywność techniczną szkół średnich pod względem ilości...

    Full text available to download

  • A construction for the hat problem on a directed graph

    Publication

    A team of n players plays the following game. After a strategy session, each player is randomly fitted with a blue or red hat. Then, without further communication, everybody can try to guess simultaneously his own hat color by looking at the hat colors of the other players. Visibility is defined by a directed graph; that is, vertices correspond to players, and a player can see each player to whom he is connected by an arc. The...

    Full text available to download

  • Cooperative control in production and logistics

    Publication
    • L. Monostori
    • P. Valckenaers
    • A. Dolgui
    • H. Panetto
    • M. Brdyś
    • B. Csáji

    - ANNUAL REVIEWS IN CONTROL - Year 2015

    Classical applications of control engineering and information and communication technology (ICT) in production and logistics are often done in a rigid, centralized and hierarchical way. These inflexible approaches are typically not able to cope with the complexities of the manufacturing environment, such as the instabilities, uncertainties and abrupt changes caused by internal and external disturbances, or a large number and variety...

    Full text to download in external service

  • Nanoparticles: Taking a Unique Position in Medicine

    Publication

    - Nanomaterials - Year 2023

    The human nature of curiosity, wonder, and ingenuity date back to the age of humankind. In parallel with our history of civilization, interest in scientific approaches to unravel mechanisms underlying natural phenomena has been developing. Recent years have witnessed unprecedented growth in research in the area of pharmaceuticals and medicine. The optimism that nanotechnology (NT) applied to medicine and drugs is taking serious...

    Full text to download in external service

  • Development of advanced machine learning for prognostic analysis of drying parameters for banana slices using indirect solar dryer

    Publication
    • N. Van
    • P. Paramasivam
    • M. Dzida
    • S. M. Osman
    • D. T. N. Le
    • D. N. Cao
    • T. H. Truong
    • V. D. Tran

    - Case Studies in Thermal Engineering - Year 2024

    In this study, eXtreme Gradient Boosting (XGBoost) and Light Gradient Boosting (LightGBM) algorithms were used to model-predict the drying characteristics of banana slices with an indirect solar drier. The relationships between independent variables (temperature, moisture, product type, water flow rate, and mass of product) and dependent variables (energy consumption and size reduction) were established. For energy consumption,...

    Full text available to download

  • VREA PROJECT - A DIGITAL CURATOR FOR ARCHITECTURE AND DIGITAL PERSPECTIVES FOR HERITAGE MANAGEMENT AND ENHANCEMENT

    Thinking about architectural education, one must face the challenges of the ever-changing and digital world and bear in mind the figure of the architect of the future - the curator of digital data. Nowadays the aim is to train specialists who know how to manage the production of digital products and are able to face the challenges of digital change in the field of architecture and architectural heritage management. Virtual Reality...

    Full text available to download

  • Evolutionary Sets of Safe Ship Trajectories: development of the method

    Publication

    The Evolutionary Sets of Safe Ship Trajectories is a method solving ship encounter situations. The method combines evolutionary approach to planning ship trajectory with some of the assumption of game theory. For given positions and motion parameters the method finds a near optimal set of safe trajectories of all ships involved in an encounter. The version presented here is an updated one and its authors have tested extensively...

  • City as a product. Architecture as an Economic Instrument. Are Global Cities People-Friendly Places?

    Publication

    - Year 2014

    While spending time in our everyday urban environment do we ever think how particular architecture influences the economic value of that space? Space has its measurable financial value. From the economic point of view a place can be treated as a product that fights for appearing in tourists’ and investors’ consciousnesses. Space - treated as an object of demand and supply - becomes an element in a marketing game. To reach its...

    Full text to download in external service

  • Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios

    Publication

    - IEEE Access - Year 2020

    During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...

    Full text available to download