Sciweavers

89 search results - page 14 / 18
» A New Logarithmic Normalization Method in Games Theory
Sort
View
HICSS
1999
IEEE
110views Biometrics» more  HICSS 1999»
13 years 11 months ago
Voting before Discussing: Computer Voting as Social Communication
This paper presents a case study on the use of an alternative method of computer support to that normally used, one that uses voting as a tool for social rather than rational choi...
Brian Whitworth, Robert J. McQueen
STOC
2009
ACM
99views Algorithms» more  STOC 2009»
14 years 8 months ago
Testing juntas nearly optimally
A function on n variables is called a k-junta if it depends on at most k of its variables. In this article, we show that it is possible to test whether a function is a k-junta or ...
Eric Blais
OZCHI
2005
ACM
14 years 28 days ago
Do physiological data relate to traditional usability indexes?
Task performance data and subjective assessment data are widely used as usability measures in the human-computer interaction (HCI) field. Recently, physiology has also been explor...
Tao Lin, Masaki Omata, Wanhua Hu, Atsumi Imamiya
VVS
1996
IEEE
202views Visualization» more  VVS 1996»
13 years 11 months ago
Direct Volume Rendering with Shading via Three-Dimensional Textures
A new and easy-to-implement method for direct volume rendering that uses 3D texture maps for acceleration, and incorporates directional lighting, is described. The implementation,...
Allen Van Gelder, Kwansik Kim
INFOSCALE
2007
ACM
13 years 9 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü