Sciweavers

185 search results - page 29 / 37
» A Representationalist Theory of Intention
Sort
View
FC
2009
Springer
104views Cryptology» more  FC 2009»
14 years 2 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp
OOPSLA
2009
Springer
14 years 2 months ago
Reimagining literate programming
In this paper we describe Ginger, a new language with first class support for literate programming. Literate programming refers to a philosophy that argues computer programs shou...
James Dean Palmer, Eddie Hillenbrand
IWCIA
2004
Springer
14 years 1 months ago
A Comparison of Property Estimators in Stereology and Digital Geometry
We consider selected geometric properties of 2D or 3D sets, given in form of binary digital pictures, and discuss their estimation. The properties examined are perimeter and area i...
Yuman Huang, Reinhard Klette
ALS
2003
Springer
14 years 26 days ago
Not Everything We Know We Learned
This is foremost a methodological contribution. It focuses on the foundation of anticipation and the pertinent implications that anticipation has on learning (theory and experiment...
Mihai Nadin
SIGECOM
2010
ACM
125views ECommerce» more  SIGECOM 2010»
14 years 13 days ago
Information asymmetries in pay-per-bid auctions
Recently, some mainstream e-commerce web sites have begun using “pay-per-bid” auctions to sell items, from video games to bars of gold. In these auctions, bidders incur a cost...
John W. Byers, Michael Mitzenmacher, Georgios Zerv...