12,138 Hits in 4.6 sec

Seamful Design for Location-Based Mobile Games [chapter]

Gregor Broll, Steve Benford
2005 Lecture Notes in Computer Science  
We introduce our own seamful trading-game called "Tycoon" to explore seams on this platform and show how to incorporate them into the design of mobile games.  ...  In this paper we want to introduce its general ideas and apply them to the design of location-aware games for mobile phones.  ...  We would like to thank Leif Oppermann (MRL, University of Nottingham) for providing us with a map of cell coverage and propagation based on GSM-samples and their GPS-positions taken during a workshop in  ... 
doi:10.1007/11558651_16 fatcat:r26ygmfqejbixb7enjkv5khvyq

An interactive coal mine museum visit: Prototyping the user experience

Mieke Haesen, Joan De Boeck, Karin Coninx, Chris Raymaekers
2009 2009 2nd Conference on Human System Interactions  
In particular, we concentrated on a mobile location-based educational game allowing young visitors to gain insight in the life of the miner, and on an interactive virtual environment (VE) giving the visitor  ...  In this paper we share our experiences with several prototyping techniques in the context of user-centred design (UCD).  ...  We decided to use the VE of the mine site, stereo-projected on a large screen, as a playground for the high-fidelity prototype of the mobile game.  ... 
doi:10.1109/hsi.2009.5091037 fatcat:3hwniu4rpzehxahopvt55a4k2m

Usage Analysis of Smartphone with Hierarchical Clustering

2019 International Journal of Engineering and Advanced Technology  
Classify all the functional and non-functional attributes of the smartphone using the latest data mining algorithms using WEKA (Waikato Environment for Knowledge Analysis) open-source software to analyze  ...  data.  ...  • Current mobile phone: Blackberry, Samsung, Motorola, • The primary usage of your phone: Business, Social, Gaming • Satisfactory level of the overall design of your mobile phone: Very Satisfactory  ... 
doi:10.35940/ijeat.a1041.1091s19 fatcat:3m4pscpcavfzfnzjydwovpgv4y

Developing and Validating Personas in e-Commerce: A Heuristic Approach [chapter]

Volker Thoma, Bryn Williams
2009 Lecture Notes in Computer Science  
The heuristic approach of using these data sources conjointly allowed for an early validation of relevant persona dimensions.  ...  In the current project persona attributes were derived from various data sources, such as stakeholder interviews, user tests and interviews, data mining, customer surveys, and ethnographic (direct observation  ...  Quantitative patterns (clusters) emerged on volume of product use (e.g., sports betting, games, casino, etc.) and channels (online, mobile).  ... 
doi:10.1007/978-3-642-03658-3_56 fatcat:inny3e6xfrbhrd5m63sp5yb2dm

A Digital Environment Approach: Four Technologies That Will Disrupt Social Work Practice

L. Goldkind, L. Wolf
2014 Social work  
It speaks to the use of game design techniques, game thinking, and game mechanics (competition systems that integrate points, badges, rewards, and punishments [Rao, 2013] ) in nongame contexts, such as  ...  Mobile Technologies The use of mobile technologies has exploded. Of the world's estimated 7 billion people, 6 billion have access to mobile phones.  ... 
doi:10.1093/sw/swu045 pmid:25643579 fatcat:ivy3cpsrwndrdj2khgrc4iaz7i

Feedback, latency, accuracy

Kieran Mansley, David Scott, Alastair Tse, Anil Madhavapeddy
2004 Proceedings of ACM SIGCOMM 2004 workshops on NetGames '04 Network and system support for games - SIGCOMM 2004 Workshops  
In this paper we describe a location-aware, fast-paced, close quarters action game and use it to experiment with three key components of future location-aware gaming platforms: (i) the location system,  ...  We investigate the tradeoffs that are possible between these components, the effect of the feedback channel and the suitability of Bluetooth as a network for mobile game devices.  ...  Alastair Beresford, Marcelo Pias, Jon Crowcroft, and Richard Sharp for their valuable feedback, and all those members of the LCE who put up with their normally peaceful working environment becoming a gaming  ... 
doi:10.1145/1016540.1016544 dblp:conf/netgames/MansleySTM04 fatcat:fzxvi6bzgraa7btk5qo7xl2afi

Optimization Analysis of Tennis Players' Physical Fitness Index Based on Data Mining and Mobile Computing

Shoudong Zhang, Huaqing Mao, Wenqing Wu
2021 Wireless Communications and Mobile Computing  
Therefore, this paper proposes a mobile processor performance data mining framework MobilePerfMiner, which uses hardware counters and iteratively uses the XGBoost algorithm to build a performance model  ...  , ranks the importance of the microarchitecture events of the big data task, and reduces the performance big data dimension, so as to optimize the big data algorithm according to the performance characteristics  ...  The research goal of this work is to monitor mobile processor microarchitecture events when running big data tasks and use data mining methods to analyze event values and then characterize the performance  ... 
doi:10.1155/2021/9838477 fatcat:5eln2pvphzgvlloclmbqumetxa

Randomizing Smartphone Malware Profiles against Statistical Mining Techniques [chapter]

Abhijith Shastry, Murat Kantarcioglu, Yan Zhou, Bhavani Thuraisingham
2012 Lecture Notes in Computer Science  
2) Are data mining algorithms robust against malware with random profiles?  ...  Statistical data mining techniques have been shown to be applicable to detect smartphone malware.  ...  Malware detection techniques developed for general-purpose use and those designed specifically for mobile phones are discussed in this section.  ... 
doi:10.1007/978-3-642-31540-4_18 fatcat:rvsk53ki6nclxagi4jjrxbwfum

The Social Hourglass: An Infrastructure for Socially Aware Applications and Services

Adriana Iamnitchi, Jeremy Blackburn, Nicolas Kourtellis
2012 IEEE Internet Computing  
G iven the abundance of interpersonal data exposed by Web 2.0 applications, we have a tremendous opportunity to exploit social information for myriad applications that can truly enhance our well being.  ...  This system uses social sensors as the user-controlled collectors of already available or recordable social interactions between people.  ...  Acknowledgments The US National Science Foundation supported this research under grants CNS 0952420 and CNS 0831785.  ... 
doi:10.1109/mic.2012.42 fatcat:gcdmdahzmraqhjtfotgepkq7aq

Memory-span concepts and the synthesis of sequential machines in feedback shift-register form

Robert L. Martin
1967 8th Annual Symposium on Switching and Automata Theory (SWAT 1967)  
Applications Data mining applications; Data mining system products and research prototypes; Additional themes on Data mining; Social impact of Data mining; Trends in Data mining.  ...  Further Topics in Data Mining Multidimensional analysis and descriptive mining of complex data objects; Spatial data mining; Multimedia data mining; Text mining; Mining the WWW. Outlier analysis.  ...  Mobile Operating Systems Operating System, PalmOS, Windows CE, Symbian OS, Linux for Mobile Devices.  ... 
doi:10.1109/focs.1967.19 dblp:conf/focs/Martin67 fatcat:fwn5xjv7mbcsja5xrhcmdo6ipe

Report of HotMobile 2010

Bo Han, Ahmad Rahmati, Bhojan Anand
2010 IEEE pervasive computing  
Konva also includes a transport protocol, which supports the framework's power management features and is in tune with multiplayer mobile games' traffic patterns.  ...  SocialFusion's challenges include mining diverse input data streams to provide recommendations to individuals or groups, and preserving security and privacy.  ... 
doi:10.1109/mprv.2010.64 fatcat:fxftutjbybbtjnjbvmgsohj6ou

The Carrot Approach: Encouraging Use of Location Systems [chapter]

Kieran Mansley, Alastair R. Beresford, David Scott
2004 Lecture Notes in Computer Science  
to use them.  ...  In this paper we provide a retrospective analysis of Bat system usage grounded in game theory.  ...  Finally, a big thank you to all those AT&T Labs Cambridge employees who designed and built the Active Bat system and associated SPIRIT middleware.  ... 
doi:10.1007/978-3-540-30119-6_22 fatcat:pgzsnpalybdwjclh3leaawdglu

Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks

R. Nakkeeran, T. Aruldoss Albert, R. Ezumalai
2010 International Journal of Engineering and Technology  
Home agents present in each system collects the data from its own system and using data mining techniques to observed the local anomalies.  ...  This paper incorporates agents and data mining techniques to prevent anomaly intrusion in mobile adhoc networks.  ...  Then demonstrate that nodes' moving speed, a commonly used parameter in tuning IDS performances, is not an effective metric to tune IDS performances under different mobility models.  ... 
doi:10.7763/ijet.2010.v2.99 fatcat:qjhhjws5vrf4vgtpss6kbaujia

Special Issue on Artificial-Intelligence-Powered Edge Computing for Internet of Things

Lei Yang, Xu Chen, Samir M. Perlaza, Junshan Zhang
2020 IEEE Internet of Things Journal  
Two types of Byzantine attacks are considered, and "off-chain sample mining" and "on-chain mining" schemes are designed to protect the security of the proposed system.  ...  A new system is introduced for global hard mining to: 1) efficiently mine hard samples from the entire training set and 2) effectively use them in training.  ... 
doi:10.1109/jiot.2020.3019948 fatcat:mogalqnhnnaqpbxb7zivzdhvry

Aggregating customer review attributes for online reputation generation

Abdessamad Benlahbib, El Habib Nfaoui
2020 IEEE Access  
First, we design two equations to compute review helpfulness and review time scores, and we fine-tune Bidirectional Encoder Representations from Transformers (BERT) model to predict the review sentiment  ...  Second, we design a formula to assign a numerical score to each review.  ...  With the use of a web scraping tool, we have been able to collect raw data from some real data suppliers like Amazon, TripAdvisor and IMDb.  ... 
doi:10.1109/access.2020.2996805 fatcat:jbiqmq6n5nakzid4de73ve6oai
« Previous Showing results 1 — 15 out of 12,138 results