Abstract. We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on...
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wan...
Content fingerprinting provides a compact representation of multimedia objects for copy identification. This paper analyzes the impact of the ordinal-ranking based feature encodin...
Web applications that are highly dynamic and interactive on the client side are becoming increasingly popular. As with any other type of applications, reuse offers considerable ben...
— We present adaptive admittance control of a robotic manipulator, with uncertain dynamic parameters, operating in a constrained task space. To provide compliance to external for...
In this paper, we use computational intelligence techniques to built quantitative models of player experience for a platform game. The models accurately predict certain key affecti...
Christopher Pedersen, Julian Togelius, Georgios N....