Sciweavers

1098 search results - page 140 / 220
» Experimental economics and experimental computer science: a ...
Sort
View
FC
2007
Springer
122views Cryptology» more  FC 2007»
14 years 3 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp
SDM
2009
SIAM
144views Data Mining» more  SDM 2009»
14 years 6 months ago
CORE: Nonparametric Clustering of Large Numeric Databases.
Current clustering techniques are able to identify arbitrarily shaped clusters in the presence of noise, but depend on carefully chosen model parameters. The choice of model param...
Andrej Taliun, Arturas Mazeika, Michael H. Bö...
ICDCS
2009
IEEE
14 years 6 months ago
CAP: A Context-Aware Privacy Protection System for Location-Based Services
We address issues related to privacy protection in location-based services (LBS). Most existing research in this field either requires a trusted third-party (anonymizer) or uses ...
Aniket Pingley, Wei Yu, Nan Zhang 0004, Xinwen Fu,...
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
14 years 4 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto
GRID
2007
Springer
14 years 3 months ago
Integrating multi-level molecular simulations across heterogeneous resources
— Biomolecular simulations play a key role in the study of complex biological processes at microscopic levels in which macromolecules such as proteins are involved. The simulatio...
Yudong Sun, Steve McKeever, Kia Balali-Mood, Mark ...