Ajax loader
By using our website, you agree to our use of cookies as described in Cookie Policy
 For more images, please select "images" in the filters.
Hybrid communication: a structurational analysis of computer gaming teams
PDF
Pdf
Computational model of human behavior in security games with varying number of targets
The effect of presenting worked examples for problem solving in a computer game
PDF
Computational aspects of optimal information revelation
PDF
Towards addressing spatio-temporal aspects in security games
PDF
Game theoretic deception and threat screening for cyber security
PDF
Not a Lone Ranger: unleashing defender teamwork in security games
PDF
Human adversaries in security games: integrating models of bounded rationality and fast algorithms
PDF
Thwarting adversaries with unpredictability: massive-scale game-theoretic algorithms for real-world security deployments
PDF
Reducing unproductive learning activities in serious games for second language acquisition
PDF
Topics in algorithms for new classes of non-cooperative games
PDF
Combiform: a console for the new communal casual game genre
PDF
Game theoretical models in supply chain management
PDF
Addressing uncertainty in Stackelberg games for security: models and algorithms
PDF
The emotional and therapeutic impact of video games for health: Is motivation to improve more important than expectations for improvement?
PDF
Pdf
Effects of a computer game designed for stress management education
Emotion control of player characters: creating an emotionally responsive game
PDF
Toward a theory of gesture design
PDF
Reality ends here: environmental game design and participatory spectacle
PDF
Modeling human bounded rationality in opportunistic security games
PDF
Females' video game playing motivation and performance: examining gender stereotypes and competence goals
PDF
Designing an optimal software intensive system acquisition: a game theoretic approach
PDF
Discounted robust stochastic games with applications to homeland security and flow control
PDF
When AI helps wildlife conservation: learning adversary behavior in green security games
PDF
Protecting networks against diffusive attacks: game-theoretic resource allocation for contagion mitigation
PDF
of 22