Search Results

You are looking at 1 - 10 of 15 items for :

  • Computer Sciences x
Clear All
Open access

Ke Xinsheng and Qi Sun

Before Making any Decisions. - China Computer Users, Vol. 21, 2002, No 10, 8-12. 10. Tong, X. J. Information and Digital Tactics of City. Liaoning, Northeastern University Publication, 2008, 7-9. 11. Wang, P. Innovate Between Urban Information and Governance Model. Shanghai, Xuelin Press, 2005, 13-15. 12. Wu, S. W., G. Q. Ya n. Wisdom City Technology Leading Harmony. Hangzhou, Zhejiang University Press, 2010, 7-10. 13. Zhang, N. G. The China City Informatization Promotion Conference Held in Wuxi. - UPS

Open access

Peter C. R. Lane and Fernand Gobet

mechanisms in human learning. Trends in Cognitive Sciences 5:236-243. Goldberg, D. E. 1989. Genetic Algorithms in Search Optimization and Machine Learning. Reading, MA: Addison-Wesley. Grant, D. A. 1962. Testing the null hypothesis and the strategy and tactics of investigating theoretical models. Psychological Review 69:54-61. Gunzelmann, G. 2008. Strategy generalization across orientation tasks: Testing a computational cognitive model. Cognitive Science 32:835-861. Holland, J. H. 1975. Adaptation in natural

Open access

Boyan Bontchev

Game Play. - Foundations of Augmented Cognition, 2006, pp. 134-139. 93. Oum, K., H. Ayaz, P. Shewokis, P. Diefenbach. Mind Tactics: A Brain Computer Interface Gaming Platform. - In: Proc. of ICE-GIC, Int. IEEE Consumer Electronics Society’s, December 2010, pp. 1-5. 94. Emmen, D. H. G., G. Lampropoulos. Bio Pong: Adaptive Gaming Using Biofeedback. - In: Proc. of Chi Sparks 2014 Conf., Hague, Netherlands, 3 April 2014, pp. 100-103. 95. Braithwaite, J. J., D. G. Watson, R. Jones, M. Rowe. A Guide for Analysing EDA

Open access

Muhammad Haris Mughees, Zhiyun Qian and Zubair Shafiq

Abstract

The rise of ad-blockers is viewed as an economic threat by online publishers who primarily rely on online advertising to monetize their services. To address this threat, publishers have started to retaliate by employing anti ad-blockers, which scout for ad-block users and react to them by pushing users to whitelist the website or disable ad-blockers altogether. The clash between ad-blockers and anti ad-blockers has resulted in a new arms race on the Web. In this paper, we present an automated machine learning based approach to identify anti ad-blockers that detect and react to ad-block users. The approach is promising with precision of 94.8% and recall of 93.1%. Our automated approach allows us to conduct a large-scale measurement study of anti ad-blockers on Alexa top-100K websites. We identify 686 websites that make visible changes to their page content in response to ad-block detection. We characterize the spectrum of different strategies used by anti ad-blockers. We find that a majority of publishers use fairly simple first-party anti ad-block scripts. However, we also note the use of third-party anti ad-block services that use more sophisticated tactics to detect and respond to ad-blockers.

Open access

Lucy Simko, Luke Zettlemoyer and Tadayoshi Kohno

Abstract

Source code attribution classifiers have recently become powerful. We consider the possibility that an adversary could craft code with the intention of causing a misclassification, i.e., creating a forgery of another author’s programming style in order to hide the forger’s own identity or blame the other author. We find that it is possible for a non-expert adversary to defeat such a system. In order to inform the design of adversarially resistant source code attribution classifiers, we conduct two studies with C/C++ programmers to explore the potential tactics and capabilities both of such adversaries and, conversely, of human analysts doing source code authorship attribution. Through the quantitative and qualitative analysis of these studies, we (1) evaluate a state-of-the-art machine classifier against forgeries, (2) evaluate programmers as human analysts/forgery detectors, and (3) compile a set of modifications made to create forgeries. Based on our analyses, we then suggest features that future source code attribution systems might incorporate in order to be adversarially resistant.

Open access

J. Perl and D. Memmert

Performance Indikatoren [Big Data in professional football. Analysis of position data from the German Fußball-Bundesliga with new innovative Key Performance Indicators.]. Leistungssport [High Performance Sport], 1-13. Memmert, D., Raabe, D., Knyazev, A., Franzen, A., Zekas, L., Rein, R., Perl, J. & Weber, H. (2016b). Innovative Leistungsindikatoren im Profifußball auf Basis von Positionsdaten [Innovative performance indicators in professional football based on position data.]. Impulse [impulse], 2 , 14-21. Perl, J., Grunz, A. & Memmert, D. (2013). Tactics in

Open access

Justin Brookman, Phoebe Rouge, Aaron Alva and Christina Yeung

://www.ftc.gov/news-events/press-releases/2012/12/ftc-settlement-puts-end-history-sniffing-online-advertising , Dec. 2012. [5] Fed. Trade Comm’n, “Online Advertiser Settles FTC Charges ScanScout Deceptively Used Flash Cookies to Track Consumers Online,” https://www.ftc.gov/news-events/press-releases/2011/11/online-advertiser-settles-ftc-charges-scanscout-deceptively-used , Nov. 2011. [6] Fed. Trade Comm’n, “FTC Puts an End to Tactics of Online Advertising Company That Deceived Consumers Who Wanted to ’Opt Out’ from Targeted Ads,” https://www.ftc.gov/news-events/press-releases/2011/03/ftc-puts-end-tactics

Open access

Mishelle Doorasamy and Kiran Baldavaloo

5 References [1] Ambe, M.C., 2007. Environmental Management Accounting in South Africa. Status, challenges and implementation framework . D. Tech. Tshwane University of Technology. [2] Azizi, P.G.M., Layeghi, M., 2008. A Strategic Model for Cleaner Production Implementation In Paper Making Mill . [3] Bennett, M., Schaltegger, S., Zvezdov, D., 2011. Environmental management accounting. Review of Management Accounting Research , pp.53-84. [4] Despeisse, M., Oates, R. M., Ball, D.P., 2013. Sustainable manufacturing tactics and cross

Open access

F. M. Clemente and F. M. L. Martins

://doi.org/10.1080/02640414.2014.898852 Scoulding, A., James, N., & Taylor, J. (2004). Passing in the Soccer World Cup 2002. International Journal of Performance Analysis in Sport , 4 (2), 36–41. Tenga, A., Holme, I., Ronglan, L. T., & Bahr, R. (2010). Effect of playing tactics on achieving score-box possessions in a random series of team possessions from Norwegian professional soccer matches. Journal of Sports Sciences , 28 (3), 245–255. http://doi.org/10.1080/02640410903502766 Tenga, A., & Sigmundstad, E. (2011). Characteristics of goal

Open access

L. Yaldo and L. Shamir

prozone3 r player tracking system: A preliminary report. International Journal of Computer Science in Sport , 8 (1), 37–53. Orejan, J. (2011). Football/Soccer: History and tactics . McFarland. Jefferson, NC, USA. Prasetio, D. (2016). Predicting football match results with logistic regression. In International Conference on Advanced Informatics: Concepts, Theory And Application , 1–5. Robnik-Sikonja, M. & Kononenko, I. (1997). An adaptation of relief for attribute estimation in regression. In Machine Learning: Proceedings of the Fourteenth