|
[1] 外掛的歷史資訊 http://game.tzinfo.net/news_info.asp?id=10194 [2] Samuel Johnson, BOTKNOWLEDGE http://www.botknowledge.com/ [3] School of Computer Science, Carnegie Mellon, HIPs Project http://www.aladdin.cs.cmu.edu/hips/ [4] A. M. Turing ,”Computing Machinery and Intelligence”. Mind 49: 433-460,1950 [5] School of Computer Science, Carnegie Mellon, CAPTCHA Project http://www.captcha.net/ [6] Eric Wan, Xin Xu and Zhengqian Zhou.”2006 Online Game Report”, Pacific Epoch Red Innovation Report Series. [7] Pinkas, B. and Sander, T. “Securing passwords against dictionary attacks”. Proceedings of the ACM Computer and Security Conference 2002 [8] Rachna Dhamija and J.D. Tygar. “Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks”. Second International Workshop (HIPs 2005) [9] Amalia Rusu and Venu Govindaraju. “Handwritten CAPTCHA: Using the difference in the abilities of humans and machines in reading handwritten words”. Proceedings of the 9th Int’l Workshop on Frontiers in Handwriting Recognition (IWFHR-9 2004) [10] Allison L. Coates, Henry S. Baird and Richard J. Fateman. “Pessimal Print: A Reverse Turing Test”. ICDAR 2001 [11] JOCR Project , Joerg Schulenburg http://jocr.sourceforge.net/download.html [12] Yong Rui and Zicheg Liu. “ARTiFACIAL: Automated Reverse Turing Test Using FACIAL Features”, Proceedings of ACM Multimedia 2003 [13]Tsz-Yan Chan. “Using a Text-to-Speech Synthesizer to generate a reverse Turing Test”. Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence (ICTAI’03) [14]Leo Breiman [et al.]. “Classification and Regression Tree”. Wadsworth International Group, 1984. [15]Philippe Golle and Nicolas Ducheneaut. “Preventing Bots from Playing Online Games”. ACM Computers in Entertainment,Vol.3 No.3 July 2005 [16]Wenfeng Yang and Xing Li.”Chinese Keyword Extraction Based on Max-duplicated Strings of the Documents”.ACM Research and Development in Information Retrieval, 2002. [17]David Goldberg, Christopher Malon and Marshall Bern. “A Global Approach to Automatic Solution of Jigsaw Puzzles”. ACM Proceedings of the 1st conference on Computing frontiers. April 2004. [18]Computer Vision and Artificial Intelligence http://www.acm.org/crossroads/xrds3-1/vision.html
|