|
Showing 1 - 7 of
7 matches in All Departments
This book describes the development of an intrusion detection
system for online poker, which uses player's game strategy as the
behavioral profile. The system is improved by modifications to the
similarity measure functions and different ways of representing
behavioral signatures. The system is further enhanced by inclusion
of spatial, temporal and contextual information about the
environment alongside the user's behavior. Possibility of creation
of artificial behavioral profiles and use of such profiles for
spoofing of behavior-based security systems is investigated and
promising results are achieved. In a somewhat related research,
recognizing importance of games in our experiments, it is proven
that poker is a game of skill. Finally, a number of games are
analyzed in terms of their spatial ontologies.
Since the 1950's character recognition has been an active field of
research for computer scientists worldwide. The main reason is that
character recognition is not only an interesting area of
theoretical research with relevance to many pattern recognition
sub-fields, but also a very needed and useful real life
application. Making computers able to read would allow for
substantial savings in terms of the costs for data entry, mail
processing, form processing and many other similar situations.
Every realistic character recognition system requires a feature
extraction step in order to properly operate. This book is a
large-scale review of the feature extraction approaches for
character recognition based on literature review and experimental
results. An original classification system is described, which
groups feature extraction methods depending on their theoretical
approach. The developed classification system aids in comparison
and analysis of the feature extraction methods.
This volume contains a selection of authoritative essays exploring
the central questions raised by the conjectured technological
singularity. In informed yet jargon-free contributions written by
active research scientists, philosophers and sociologists, it goes
beyond philosophical discussion to provide a detailed account of
the risks that the singularity poses to human society and, perhaps
most usefully, the possible actions that society and technologists
can take to manage the journey to any singularity in a way that
ensures a positive rather than a negative impact on society. The
discussions provide perspectives that cover technological,
political and business issues. The aim is to bring clarity and
rigor to the debate in a way that will inform and stimulate both
experts and interested general readers.
This volume contains a selection of authoritative essays exploring
the central questions raised by the conjectured technological
singularity. In informed yet jargon-free contributions written by
active research scientists, philosophers and sociologists, it goes
beyond philosophical discussion to provide a detailed account of
the risks that the singularity poses to human society and, perhaps
most usefully, the possible actions that society and technologists
can take to manage the journey to any singularity in a way that
ensures a positive rather than a negative impact on society. The
discussions provide perspectives that cover technological,
political and business issues. The aim is to bring clarity and
rigor to the debate in a way that will inform and stimulate both
experts and interested general readers.
|
Artificial General Intelligence - 13th International Conference, AGI 2020, St. Petersburg, Russia, September 16-19, 2020, Proceedings (Paperback, 1st ed. 2020)
Ben Goertzel, Aleksandr I. Panov, Alexey Potapov, Roman Yampolskiy
|
R2,701
Discovery Miles 27 010
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 13th
International Conference on Artificial General Intelligence, AGI
2020, held in St. Petersburg, Russia, in September 2020.The 30 full
papers and 8 short papers presented in this book were carefully
reviewed and selected from 60 submissions. The papers cover topics
such as AGI architectures, artificial creativity and AI safety,
transfer learning, AI unification and benchmarks for AGI.
Welcome to the obsession known as Sudoku. This book will provide
you with hours of fun as it contains 576 never before published
computer generated Sudoku puzzles. Puzzles range in difficulty from
easy to medium, hard and very hard. You get a nice equal mix of all
types grouped by difficulty or if you are feeling adventurous
randomized for your pleasure. Each puzzle comes with a difficulty
rating (on a 100 point scale) established by a sophisticated
computer algorithm and a complete solution just in case you get
stuck.
This book is a review of published research in computer security,
user authentication, intrusion detection, game security and
behavioral biometrics. We analyze previous studies and point out
trends and propose taxonomies which make understanding and
improvement on previous work easier. In particular the majority of
contributions in this book is to the field of behavioral
biometrics. Research in biometric technologies offers one of the
most promising approaches to providing user friendly and reliable
control methodology for access to computer systems, networks and
workplaces. Majority of such research is aimed at studying well
established physical biometrics such as fingerprint or iris
recognition. Behavioral biometrics are usually only briefly
mentioned and only those which are in large part based on muscle
control such as keystrokes, gait or signature are well
investigated. This book was written to fill the coverage gap with
respect to this promising technology.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|