Sciweavers

298 search results - page 13 / 60
» Forgetting and Update -- an exploration
Sort
View
CHI
2008
ACM
14 years 7 months ago
Memorability of persuasive passwords
Text passwords are the primary authentication method used for most online services. Many online users select weak passwords. Regrettably, most proposed methods of strengthening pa...
Alain Forget, Robert Biddle
SARA
2009
Springer
14 years 1 months ago
A Practical Use of Imperfect Recall
Perfect recall is the common and natural assumption that an agent never forgets. As a consequence, the agent can always condition its choice of action on any prior observations. I...
Kevin Waugh, Martin Zinkevich, Michael Johanson, M...
HCI
2007
13 years 8 months ago
New Type of Auditory Progress Bar: Exploration, Design and Evaluation
In this paper, we focus on the method to explore a different type of auditory progress bar by analyzing the characteristics of the visual progress bar and contexts of auditory appl...
Shuo Hsiu Hsu, Cécile Le Prado, Stép...
ICRA
2010
IEEE
101views Robotics» more  ICRA 2010»
13 years 5 months ago
Distributed pursuit-evasion with limited-visibility sensors via frontier-based exploration
— This paper addresses a novel visibility-based pursuit-evasion problem in which a team of searchers with limited range sensors must coordinate to clear any evaders from an unkno...
Joseph W. Durham, Antonio Franchi, Francesco Bullo
IICAI
2007
13 years 8 months ago
Logics for Action
Logics of action, for reasoning about the effects of state change, and logics of belief, accounting for belief revision and update, have much in common. Furthermore, we may underta...
Michael P. Fourman