Journal

Mouse Sensitivity in First-Person Targeting Tasks

Mouse sensitivity in first-person targeting tasks is a highly debated issue. Recommendations within a single game can vary by a factor of 10× or more and are an active topic of experimentation in both competitive and recreational esports communities. …

Generating Interpretable Play-Style Descriptions Through Deep Unsupervised Clustering of Trajectories

In any game, play style is a concept that describes the technique and strategy employed by a player to achieve a goal. Identifying a player's style is desirable as it can enlighten players on which approaches work better or worse in different …

Creating Pro-Level AI for a Real-Time Fighting Game Using Deep Reinforcement Learning

Reinforcement learning (RL) combined with deep neural networks has performed remarkably well in many genres of games recently. It has surpassed human-level performance in fixed game environments and turn-based two-player board games. However, to the …

Optimizing Hearthstone agents using an evolutionary algorithm

Digital collectible card games are not only a growing part of the video game industry, but also an interesting research area for the field of computational intelligence. This game genre allows researchers to deal with hidden information, uncertainty …

2D-VSR-Sim: a Simulation Tool for the Optimization of 2-D Voxel-based Soft Robots

Voxel-based soft robots (VSRs) are robots composed of many small, cubic blocks of a soft material with mechanical properties similar to those of living tissues and that can change their volume based on signals emitted by the robot controller, i.e., …

Interactive Example-Based Finding of Text Items

We consider the problem of identifying within a given document all text items which follow a certain pattern to be specified by a user. In particular, we focus on scenarios in which the task is to be completed very quickly and the user is not able to …

On the Impact of the Rules on Autonomous Drive Learning

Autonomous vehicles raise many ethical and moral issues that are not easy to deal with and that, if not addressed correctly, might be an obstacle to the advent of such a technological revolution. These issues are critical because autonomous vehicles …

Visualizing the Outcome of Dynamic Analysis of Android Malware with VizMal

Malware detection techniques based on signature extraction require security analysts to manually inspect samples to find evidences of malicious behavior. This time-consuming task received little attention by researchers and practitioners, as most of …

Automatic Search-and-Replace from Examples with Coevolutionary Genetic Programming

We describe the design and implementation of a system for executing search-and-replace text processing tasks automatically, based only on examples of the desired behavior. The examples consist of pairs describing the original string and the desired …

Enterprise Wi-Fi: we need devices that are secure by default

Wireless networks have become an essential component of virtually every enterprise. The security technology for these networks (WPA2 Enterprise) has been designed for a world that is very different from today’s world. Basic assumptions for secure …