Sciweavers

303 search results - page 53 / 61
» Interfaces as Games, Programs as Strategies
Sort
View
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
14 years 1 months ago
Stochastic Model for Power Grid Dynamics
We introduce a stochastic model that describes the quasistatic dynamics of an electric transmission network under perturbations introduced by random load fluctuations, random rem...
Marian Anghel, Kenneth A. Werley, Adilson E. Motte...
CHI
2002
ACM
14 years 7 months ago
What makes people trust online gambling sites?
A validated model of trust was used as a framework for an empirical study to identify on- and offline factors that influence gamblers' perception of an online casino's t...
Bhiru Shelat, Florian N. Egger
TEI
2012
ACM
285views Hardware» more  TEI 2012»
12 years 3 months ago
Sketch-a-TUI: low cost prototyping of tangible interactions using cardboard and conductive ink
Graspable tangibles are now being explored on the current generation of capacitive touch surfaces, such as the iPad and the Android tablet. Because the size and form factor is rel...
Alexander Wiethoff, Hanna Schneider, Michael Rohs,...
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
14 years 7 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...