Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
Articles 1 - 5 of 5
Full-Text Articles in Physical Sciences and Mathematics
The History Of The Enigma Machine, Jenna Siobhan Parkinson
The History Of The Enigma Machine, Jenna Siobhan Parkinson
History Publications
The history of the Enigma machine begins with the invention of the rotor-based cipher machine in 1915. Various models for rotor-based cipher machines were developed somewhat simultaneously in different parts of the world. However, the first documented rotor machine was developed by Dutch naval officers in 1915. Nonetheless, the Enigma machine was officially invented following the end of World War I by Arthur Scherbius in 1918 (Faint, 2016).
Lost At Sea: The Nintendo Gamecube’S Failure And The Transformation Of An Industry 1996-2006, Izsak Kayne Barnette
Lost At Sea: The Nintendo Gamecube’S Failure And The Transformation Of An Industry 1996-2006, Izsak Kayne Barnette
Doctoral Dissertations and Projects
The history of video games is critically underdeveloped. Long simmering under a veil of academic neglect, video games have long been denied the sort of academic relevance of their sister industries: books, film, music, and TV. It is long-past time that such neglect was addressed. Most historical analyses of games begin with their origins in the 1950s, discuss their ubiquity during the heyday of Atari or Nintendo, or rope in modern views of games as tools of diversity and inclusion. Very few studies pay attention to the rather ugly adolescent years of the game industry, its motorcycle-jacket wearing, rebellious teenage …
Topic-Guided Conversational Recommender In Multiple Domains, Lizi Liao, Ryuichi Takanobu, Yunshan Ma, Xun Yang, Minlie Huang, Tat-Seng Chua
Topic-Guided Conversational Recommender In Multiple Domains, Lizi Liao, Ryuichi Takanobu, Yunshan Ma, Xun Yang, Minlie Huang, Tat-Seng Chua
Research Collection School Of Computing and Information Systems
Conversational systems have recently attracted significant attention. Both the research community and industry believe that it will exert huge impact on human-computer interaction, and specifically, the IR/RecSys community has begun to explore Conversational Recommendation. In real-life scenarios, such systems are often urgently needed in helping users accomplishing different tasks under various situations. However, existing works still face several shortcomings: (1) Most efforts are largely confined in single task setting. They fall short of hands in handling tasks across domains. (2) Aside from soliciting user preference from dialogue history, a conversational recommender naturally has access to the back-end data structure which …
Understanding Intention For Machine Theory Of Mind: A Position Paper, Casey Kennington
Understanding Intention For Machine Theory Of Mind: A Position Paper, Casey Kennington
Computer Science Faculty Publications and Presentations
Theory of Mind is often characterized as the ability to recognize desires, beliefs, and intentions of others. In this position paper, I look at the literature on modeling Theory of Mind in machines and find that, to date, intention is not usually a focus. I define what I mean by intention—choice with commitment—following prior work. Intention has a long history of research in some communities, and I offer one theoretical framework for modeling intention as a starting point. I take inspiration from how children learn intention through joint attention with others and how that leads to Theory of Mind. I …
Just-In-Time Defect Identification And Localization: A Two-Phase Framework, Meng Yan, Xin Xia, Yuanrui Fan, Ahmed E. Hassan, David Lo, Shanping Li
Just-In-Time Defect Identification And Localization: A Two-Phase Framework, Meng Yan, Xin Xia, Yuanrui Fan, Ahmed E. Hassan, David Lo, Shanping Li
Research Collection School Of Computing and Information Systems
Defect localization aims to locate buggy program elements (e.g., buggy files, methods or lines of code) based on defect symptoms, e.g., bug reports or program spectrum. However, when we receive the defect symptoms, the defect has been exposed and negative impacts have been introduced. Thus, one challenging task is: whether we can locate buggy program prior to appearance of the defect symptom at an early time (e.g., when buggy program elements are being checked-in). We refer to this type of defect localization as “Just-In-Time (JIT) Defect localization”. Although many prior studies have proposed various JIT defect identification methods to identify …