The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Advanced statistics have proved to be a crucial tool for basketball coaches in order to improve training skills. Indeed, the performance of the team can be further optimized by studying the behaviour of players under certain conditions. In the United States of America, companies such as STATS or Second Spectrum use a complex multi-camera setup to deliver advanced statistics to all NBA teams, but the...
Encryption is often not sufficient to secure communication, since it does not hide that communication takes place or who is communicating with whom. Covert channels hide the very existence of communication enabling individuals to communicate secretly. Previous work proposed a covert channel hidden inside multi-player first person shooter online game traffic (FPSCC). FPSCC has a low bit rate, but it...
A program at Iowa State University, Make to Innovate (M:2:I), allows students to work on real world engineering problems through a problem-based learning framework. Over the five years this program has been operating, observational data and student feedback have been collected identifying a potential issue with students' success in their projects. In most cases, this was not due to a lack of technical...
Soft skills are increasingly important to the engineering profession and course modifications are often needed to ensure students have opportunities to practice them prior to graduation. This suggests that engineering programs need to go beyond simply offering industry-based capstone courses and internships. Role-play has a long history as a tool for learning. It can be used to simulate real world...
In task allocation problems one usually only considers a single round in which players participate. In practice, many allocation problems are of repeated nature, in which players can decide to keep participating or leave. Players' participation, or behavior, influences the outcome, or social welfare, of these problems. In this paper, we use a fuzzy connective to model agents' behavior in regard to...
In this practical experience report we discuss a court case in which one of the authors was expert witness. This UK civil case considered possible fraud in an online product promotion competition, with participants being denied prizes because they were considered to have cheated. The discussion in this paper aims to provide a practice-led perspective on the link between technology and legal issues...
It is said by a famous Chinese entrepreneur Jack Ma that which understands yourself the most is not your own but the computer. It is not difficult to find that the computers will always automatically recommend something for you. How do these things come from? It is the computer system which does the statistical analysis to your Internet habits, sorts out the content you may want to browse, and finally...
According to the textbook [23], Scrum exists only in its entirety, where every component is essential to Scrum's success. However, in many organizational environments some of the components are omitted or modified in a way that is not aligned with the Scrum guidelines. Usually, such deviations result in missing the full benefits of Scrum [24]. Thereby, a Scrum process should be frequently inspected...
Gaming is an approach to increase the attractiveness of engineering education. However, it is emphasized that also the educational games have to be constantly upgraded. This paper focuses on demonstrating the evolution of the power exchange game in electrical engineering at Lappeenranta University of Technology. The approach is based on design science, the primary target being to reflect upon the...
This work describes a preparation strategy for first year Computer Science students at the Universidad Nacional de Nordeste. This work consisted of the development of a set of activities aimed at stimulating computational thinking through the use of playful tools with the goal of motivating students and also providing them with problem-solving skills that will facilitate the understanding of the basic...
Advancements in game design, mobile technologies and game play have made researching into Massively Multiplayer Online Games a completely different genre altogether demanding interdisciplinary methodology and integration of different perspectives. The current study uses definitions borrowed from the MDA framework and combines it with active user perspectives and components of formal analysis to explore...
With the continued growth of the mobile game market, many game companies aim to make money through mobile games. In this situation, knowing the tendency of gamers and predicting the churn in advance can maximize profit through effective game services. For this reason, much study has been conducted for the purpose of gamer analysis and churn prediction. However, the study was mainly conducted using...
Considering the different types of equipment manufacturing industries, consumers' differentiated preferences for Chinese domestic equipment manufacturers and multinational equipment manufacturers, as well as the uncertainty of technological level and dependence on production factor in reality, this paper introduces the interval grey number into the Stackelberg game model, and analyzes the market share...
Cyber Threat Hunting is an emerging cyber security activity. Recent studies show that, although similar actions like threat hunting are being actively practiced in some organization, security administrator and policy makers are far from being satisfied with their effectiveness. Most security professionals lack expertise in data analytics while most people with data analytics skills lack security knowledge...
There is no doubt that security issues are on the rise and defense mechanisms are becoming one of the leading subjects for academic and industry experts. In this paper, we focus on the security domain and envision a new way of looking at the security life cycle. We utilize our vision to propose an asset-based approach to countermeasure zero day attacks. To evaluate our proposal, we built a prototype...
This paper proposes a route-planning method for an environment in which self-driving vehicles are widely used. Such vehicles will plan their route based on the passenger's condition, which is recognized using a biological sensor. Various carmakers and IT companies have recently developed various technologies for self-driving vehicles, Google, Inc. being one. In this paper, we focus on a technique...
Automated decision-making techniques are useful to support engineers when performing requirements engineering tasks. However, to be effectively used in practice they need to be integrated into the organisational context, in which stakeholder engagement becomes a critical adoption factor. In this paper, we propose a tool-supported collaborative requirements prioritisation process, called GRP, which...
The purpose of this study is to understand the recognition of gambling industry through the semantic analysis of news data on lottery, sports betting, horse racing and casino that was reported between 1990 to 2015 in South Korea. This paper revealed the difference between journalists' intention and public's perception about news by analyzing the frequency and connectivity of news with framing and...
As item trading becomes more popular, users can change their game items or money into real money more easily. At the same time, hackers turn their eyes on stealing other users game items or money because it is much easier to earn money than traditional gold-farming by running game bots. Game companies provide various security measures to block accounttheft attempts, but many security measures on the...
Due to significant economies of scale, the capital-intensive involved and government regulations that still don't rule a perfect competition environment, the power generation industry is usually organized as a market with oligopolistic competition. In this type of market structure, participating agents implement different strategies or games to exercise market power in order to increase their profits...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.