Wolves among us: some brief reflections on the bona fides of gendered violence in computer game art [PDF]
The classification of computer games in Australia is a subject of expert discourse, but is not, itself, an expert function. It is carried out by community representatives (the classifiers), speaking for the community of reasonable people and applying ...
Jardine, Adam
core +3 more sources
Automatic annotation of tennis games: An integration of audio, vision, and learning [PDF]
Fully automatic annotation of tennis game using broadcast video is a task with a great potential but with enormous challenges. In this paper we describe our approach to this task, which integrates computer vision, machine listening, and machine learning.
Fei Yan +27 more
core +1 more source
Predictors of metabolic energy expenditure from body acceleration and mechanical energies in new generation active computer games [PDF]
The following paper is an original research project which uses state of the art sport science physiological and biomechanical approaches to gain information about active computer games.
, Hartmann, Matthias
core +1 more source
Audio Interaction in Computer Mediated Games
The use of sound in an interactive media environment has not been advanced, as a technology, as far as graphics or artificial intelligence. This discussion will explore the use of sound as a way to influence the player of a computer game, will show ways ...
J. R. Parker, John Heerema
doaj +1 more source
This paper describes a virtual field trip application as a new type of immersive, multimodal, interactive, data visualization of a virtual arboretum. Deployed in a game engine, it is a large, open-world simulation, representing 100 hectares and ideal for
Maria C. R. Harrington +4 more
doaj +1 more source
Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey
Exploitable vulnerabilities in software have attracted tremendous attention in recent years because of their potentially high severity impact on computer security and information safety. Many vulnerability detection methods have been proposed to aid code
Peng Zeng +4 more
doaj +1 more source
Assessing the Believability of Computer Players in Video Games: A New Protocol and Computer Tool
In this paper, we address the challenge of believability in multiplayer video games. Our contribution is a system for assessing the believability of computer players.
Cindy Even +2 more
doaj +1 more source
Laser Emission, Krabstadt and Geography—Krabstadt as “Gray Humor”
The text is a multilayered reading of the feminist transmedia project Krabstadt. Starting as a review of Krabstadt’s (counter) computer game, “Arrabbiata Wants a Raise,” the text unfolds through cross-cultural references weaving through game spaces, the ...
Seewon Hyun
doaj
Visualization Methods of Information Regarding Academic Publications, Research Topics, and Authors
Displaying search results in a vertical list, existing academic search engines do not reveal deeper insight into searched topics such as their connections with other topics.
Hojung (Ashley) Kwon
doaj +1 more source
A Survey of Monte Carlo Tree Search Methods [PDF]
Monte Carlo tree search (MCTS) is a recently proposed search method that combines the precision of tree search with the generality of random sampling.
Browne, Cameron B +9 more
core +2 more sources

