Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 2
- Internet in public administration 2
- Moral and ethical aspects 2
- Public administration 2
- Communication policy 1
- Government policy 1
- Internet 1
- Photography 1
- Prevention 1
- Psychological aspects 1
- Psychology 1
- Social aspects 1
- Technological innovations 1
- Telecommunication policy 1
- Terrorism 1
- Terrorists 1
- Visual communication 1
-
221
Using Noninvasive Brain Measurement to Explore the Psychological Effects of Computer Malfunctions on Users during Human-Computer Interactions
Published 2014-01-01“…In today’s technologically driven world, there is a need to better understand the ways that common computer malfunctions affect computer users. These malfunctions may have measurable influences on computer user’s cognitive, emotional, and behavioral responses. …”
Get full text
Article -
222
YOLO-CBD: Classroom Behavior Detection Method Based on Behavior Feature Extraction and Aggregation
Published 2025-05-01Get full text
Article -
223
-
224
Survey of video behavior recognition
Published 2018-06-01“…Behavior recognition is developing rapidly,and a number of behavior recognition algorithms based on deep network automatic learning features have been proposed.The deep learning method requires a large number of data to train,and requires higher computer storage and computing power.After a brief review of the current popular behavior recognition method based on deep network,it focused on the traditional behavior recognition methods.Traditional behavior recognition methods usually followed the processes of video feature extraction,modeling of features and classification.Following the basic process,the recognition process was overviewed according to the following steps,feature sampling,feature descriptors,feature processing,descriptor aggregation and vector coding.At the same time,the benchmark data set commonly used for evaluating the algorithm performance was also summarized.…”
Get full text
Article -
225
-
226
-
227
Dissociated neuronal cultures as model systems for self-organized prediction
Published 2025-06-01Subjects: Get full text
Article -
228
Behavioral economics: science or exoticism?
Published 2018-04-01“…Actually it is engaged and behavioral economics, the main provisions of which are considered in this article.…”
Get full text
Article -
229
-
230
On Activation, Connection, and Behavior in Dynamic Architectures
Published 2016-12-01“…With the emergence of mobile computing, dynamic architectures became increasingly important. …”
Get full text
Article -
231
Cloud computing based smartphone social authentication system
Published 2012-09-01“…Cloud computation provided the capabilities to store and compute infinitely,which can filled the gap of resource constrain.So a cloud-computation based social authentication system for smartphones aimed at the problem that the present authentication methods require a long period of validity of the authentication tokens and make the terminals consume large resources was proposed.The system took three types of social networking features into considered,which were different certification authority between the friends,behavior differences between individual and trust level carried by each interactive event.The results of experiments show that the system can effectively solve the problem that system performance will sharply decline when the expiry date of authentication tokens is short.…”
Get full text
Article -
232
Cloud computing based smartphone social authentication system
Published 2012-09-01“…Cloud computation provided the capabilities to store and compute infinitely,which can filled the gap of resource constrain.So a cloud-computation based social authentication system for smartphones aimed at the problem that the present authentication methods require a long period of validity of the authentication tokens and make the terminals consume large resources was proposed.The system took three types of social networking features into considered,which were different certification authority between the friends,behavior differences between individual and trust level carried by each interactive event.The results of experiments show that the system can effectively solve the problem that system performance will sharply decline when the expiry date of authentication tokens is short.…”
Get full text
Article -
233
pyAutonomousAgent: An Academic Tool for Modeling Autonomous Agent Behaviors Using Behavior Trees
Published 2024-12-01“…Results of the drone behavior modeling process are presented.Computer simulations have been applied in several areas. …”
Get full text
Article -
234
AFFECTIVE COMPUTING AND AUGMENTED REALITY FOR CAR DRIVING SIMULATORS
Published 2017-12-01“…Car simulators are essential for training and for analyzing the behavior, the responses and the performance of the driver. …”
Get full text
Article -
235
Bridging behavioral theory and household energy decisions: enhancing agent-based models with behavioral analysis
Published 2025-07-01“…By bridging behavioral science with computational modeling, ABMs' decision-support power to policymakers can be improved, ultimately accelerating the energy transition.…”
Get full text
Article -
236
Internet of Things and Distributed Computing Systems in Business Models
Published 2024-10-01“…The integration of the Internet of Things (IoT) and Distributed Computing Systems (DCS) is transforming business models across industries. …”
Get full text
Article -
237
No-Regret Learning and Equilibrium Computation in Quantum Games
Published 2024-12-01“…In the case of general multi-player quantum games, our work leads to a novel solution concept, that of the separable quantum coarse correlated equilibria (QCCE), as the convergent outcome of the time-averaged behavior no-regret algorithms, offering a natural solution concept for decentralized quantum systems. …”
Get full text
Article -
238
Magic-Induced Computational Separation in Entanglement Theory
Published 2025-05-01“…This separation induces a computational phase transition: entanglement-related tasks are efficiently solvable in the ED phase, but become intractable in the MD phase. …”
Get full text
Article -
239
Internal Clock Drift Estimation in Computer Clusters
Published 2008-01-01“…In order to properly understand the global system behavior and performance, as reported by the events recorded on each computer, it is important to estimate precisely the clock differences and drift between the different computers in the system. …”
Get full text
Article -
240
Does neural computation feel like something?
Published 2025-05-01“…Artificial neural networks are becoming more advanced and human-like in detail and behavior. The notion that machines mimicking human brain computations might be conscious has recently caused growing unease. …”
Get full text
Article