Sciweavers

1754 search results - page 146 / 351
» Games with Incomplete Information
Sort
View
DSN
2011
IEEE
14 years 4 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...
CHI
2010
ACM
15 years 9 months ago
Early explorations of CAT: canine amusement and training
Cross-species computer applications have a history of blended science and humor, despite the real potential for improving the canine-human bond. New activities available to humans...
Chadwick A. Wingrave, Jeremy Rose, Todd Langston, ...
115
Voted
EUROMICRO
2004
IEEE
15 years 8 months ago
Melisa - A Distributed Multimedia System for Multi-Platform Interactive Sports Content Broadcasting
The new generation of television viewers is currently being confronted and becoming acquainted with a series of technological developments in the realm of consumer electronics and...
Emmanuel Papaioannou, Vasilis Karagianis, Kostas K...
142
Voted
FPLAY
2008
15 years 6 months ago
Lessons from Brain Age on password memorability
User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
Alain Forget, Sonia Chiasson, Robert Biddle
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
15 years 5 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar