Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   19  
      PsychologyEmotionComputer ScienceTechnology
    • by 
    •   20  
      Computer ScienceComputer ArchitectureTechnologyTelecommunications
    • by  and +2
    • computer science Artificial intelligence
    • by 
    • computer science Artificial intelligence
    • by  and +2
    • computer science Artificial intelligence
ABSTRACT Recently, electroencephalography (EEG) is considered as a new potential type of user authentication with many security advantages of being difficult to fake, impossible to observe or intercept, unique, and alive person recording... more
    • by 
    •   10  
      Computer ScienceTechnologySecurityPattern Recognition
    • by 
    •   20  
      Computer ScienceComputer ArchitectureTechnologyTelecommunications
    • by 
    • computer science Artificial intelligence
    • by 
    •   3  
      Human Computer Interactioncomputer science Artificial intelligenceTabla
    • by 
    •   12  
      RoboticsComputer ScienceRobotics (Computer Science)Human Computer Interaction
Nowadays, there are a lot of people using social media opinions to make their decision on buying products or services. Opinion spam detection is a hard problem because fake reviews can be made by organizations as well as individuals for... more
    • by 
    •   4  
      Computer ScienceSentiment Analysiscomputer science Artificial intelligencearXiv
In this paper, we elucidate the equivalence between inference in game theory and machine learning. Our aim in so doing is to establish an equivalent vocabulary between the two domains so as to facilitate developments at the intersection... more
    • by 
    •   20  
      Cognitive ScienceMathematicsApplied MathematicsComputer Science
    • by 
    •   14  
      MathematicsComputer ScienceTechnologyMachine Learning
    • by 
    • computer science Artificial intelligence
    • by 
    • computer science Artificial intelligence