<--- Back to Details
First PageDocument Content
Computational neuroscience / Human-based computation / Complexity classes / CAPTCHA / Computer security / Computer vision / Internet bot / Turing test / Artificial general intelligence / Luis von Ahn / Artificial intelligence / NP
Date: 2003-09-18 19:47:10
Computational neuroscience
Human-based computation
Complexity classes
CAPTCHA
Computer security
Computer vision
Internet bot
Turing test
Artificial general intelligence
Luis von Ahn
Artificial intelligence
NP

CAPTCHA: Using Hard AI Problems For Security Luis von Ahn1 , Manuel Blum1 , Nicholas J. Hopper1 , and John Langford2 1 Computer Science Dept., Carnegie Mellon University, Pittsburgh PA 15213, USA

Add to Reading List

Source URL: hunch.net

Download Document from Source Website

File Size: 180,55 KB

Share Document on Facebook

Similar Documents

Chapter 1 An Introduction to SA Sentiment Analysis (SA) refers to a broad field of study in Natural Language Processing (NLP) and Artificial Intelligence (AI). In general, Sentiment Analysis is the task of identifying th

Chapter 1 An Introduction to SA Sentiment Analysis (SA) refers to a broad field of study in Natural Language Processing (NLP) and Artificial Intelligence (AI). In general, Sentiment Analysis is the task of identifying th

DocID: 1vjUA - View Document

Journal of Artificial General IntelligenceSubmittedWhat Must a World Be That a Humanlike Intelligence May Develop In It?

Journal of Artificial General IntelligenceSubmittedWhat Must a World Be That a Humanlike Intelligence May Develop In It?

DocID: 1tgPr - View Document

Risks of general artificial intelligence

Risks of general artificial intelligence

DocID: 1rCpC - View Document

Microsoft Word - Genesereth-Proof.docx

Microsoft Word - Genesereth-Proof.docx

DocID: 1rosN - View Document

1  FACE-GRAB: Face Recognition with General Region Assigned to Binary Operator Archana Sapkota1 , Brian Parks1 , Walter Scheirer1,2 , Terrance Boult1,2 1

1 FACE-GRAB: Face Recognition with General Region Assigned to Binary Operator Archana Sapkota1 , Brian Parks1 , Walter Scheirer1,2 , Terrance Boult1,2 1

DocID: 1rgKz - View Document