Sciweavers

471 search results - page 74 / 95
» Social applications: exploring a more secure framework
Sort
View
CCS
2010
ACM
13 years 9 months ago
Attacks and design of image recognition CAPTCHAs
We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all IRCs schemes known to us and evaluate each scheme against th...
Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Li...
GECCO
2006
Springer
172views Optimization» more  GECCO 2006»
14 years 19 days ago
Multi-objective optimisation of the protein-ligand docking problem in drug discovery
The pharmaceutical industry is facing an ever-increasing demand to discover novel drugs that are more effective and safer than existing ones. The industry faces huge problem in im...
A. Oduguwa, A. Tiwari, S. Fiorentino, R. Roy
EOR
2007
158views more  EOR 2007»
13 years 9 months ago
A graph-based hyper-heuristic for educational timetabling problems
This paper presents an investigation of a simple generic hyper-heuristic approach upon a set of widely used constructive heuristics (graph coloring heuristics) in timetabling. Wit...
Edmund K. Burke, Barry McCollum, Amnon Meisels, Sa...
CIM
2011
171views Hardware» more  CIM 2011»
13 years 4 months ago
Towards Cognitively Plausible Game Playing Systems
We propose to return to the roots of Artificial/Computational Intelligence applicability to board games domain by attempting to mimic human way of playing (or human intelligence ...
Jacek Mandziuk
CHI
1999
ACM
14 years 1 months ago
A Better Mythology for System Design
The past decades have seen huge improvements in computer systems but these have proved difficult to translate into comparable improvements in the usability and social integration)...
Jed Harris, D. Austin Henderson Jr.