Search Results

You are looking at 1 - 5 of 5 items for :

  • Computer Sciences x
Clear All
Open access

Milena Dobreva, Galia Angelova and Gennady Agre

Lead a Horse to Water. - In: Proc. of Joint Conference on Digital Libraries, ACM, New York, 2005, pp. 1-7. 14. Deegan, M., S. Tanner. Digital Futures: Strategies for the Information Age. London, Library Association Publishing, 2002. 15. Rasmussen G. K., G. Petersen. Personas. - In: M. Dobreva, O’Dwyer, A. P. Feliciati, Eds. User Studies in Digital Library Development. London, Facet Publishing, 2012, pp. 105-114. 16. Fox, R. Dramatis Personae. - OCLC Systems & Services: International Digital Library Perspectives, Vol. 30

Open access

Ewa Drabik


The game theory was created on the basis of social as well as gambling games, such as chess, poker, baccarat, hex, or one-armed bandit. The aforementioned games lay solid foundations for analogous mathematical models (e.g., hex), artificial intelligence algorithms (hex), theoretical analysis of computational complexity attributable to various numerical problems (baccarat), as well as illustration of several economic dilemmas - particularly in the case where the winner takes everything (e.g., noughts and crosses). A certain gambling games, such as a horse racing, may be successfully applied to verify a wide spectrum of market mechanism, for example, market effectiveness or customer behavior in light of incoming information regarding a specific product. One of a lot applications of the slot machine (one-armed bandit) is asymptotically efficient allocation rule, which was assigned by T.L. Lai and H. Robbins (1985). In the next years, the rule was developed by another and was named a multi-armed. The aim of the paper is to discuss these social games along with their potential mathematical models, which are governed by the rules predominantly applicable to the social and natural sciences.

Open access

Cyril Okpoli and Raphael Tijani

and Geological data in Dam site Investigation. The Case of Opa Dam. Jour. Min. Geol., 13(1), pp. 1–6. [13] Artsybashev, V.A. and Azeeze, L.O. (1977): Geophysical Investigation of Oyile dam site, Ilesha. Journal of Mining and geology, 14(2), 44–46. [14] Kilty, K.T., Norris, R.A., McLamore, W.R., Hennon, K.P. and Euge, K. (1986): Seismic Refraction at Horse Mesa dam: An application of the generalized reciprocal method. Geophysics ; 51(2), pp. 266–275. [15] Annor, E.A., Olasehinde, P.L. and Pal, P.C. (1989): A geological evaluation of a

Open access

Olgierd Swiatkiewicz

Business and non-Governmental Organizations to Promote Sustainable Development. Journal of Cleaner Production, 89, pp.18-31. [35] Heugens, P., Dentchev, N., 2007. Taming Trojan horses: Identifying and Mitigating Social Responsibility Risks. Journal of Business Ethics, 75, pp.151-170. [36] Husted, B.W., Allen, D.B., 2000. Is it Ethical to use Ethics as Strategy? Journal of Business Ethics, 27, pp.21-31. [37] IPCC, 2014. Climate Change 2014. Synthesis report. [online] Available at: (9

Open access

Chad Spensky, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick Housley and Robert K. Cunningham

investigations into the alleged hacking of sim card encryption keys by britain’s government communications headquarters and the U.S. National Security Agency,” 2 2015. [49] J. Zhang, F. Yuan, and Q. Xu, “DeTrust: Defeating hardware trust verification with stealthy implicitly-triggered hardware trojans,” in CCS 2014. [50] S. Wei and M. Potkonjak, “The undetectable and unprovable hardware trojan horse,” in DAC 2013. [51] T. Bray, “Exercising our remote application removal feature,”