Sciweavers

680 search results - page 92 / 136
» Intrinsically Motivated Machines
Sort
View
ICDS
2009
IEEE
14 years 3 months ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton
TEI
2009
ACM
127views Hardware» more  TEI 2009»
14 years 2 months ago
Living interfaces: the impatient toaster
This paper introduces the Impatient Toaster, a kitchen appliance designed to motivate its owners to eat more often and in regular intervals: After not using it for a while, it sig...
Eva Burneleit, Fabian Hemmert, Reto Wettach
AIRWEB
2009
Springer
14 years 2 months ago
Social spam detection
The popularity of social bookmarking sites has made them prime targets for spammers. Many of these systems require an administrator’s time and energy to manually filter or remo...
Benjamin Markines, Ciro Cattuto, Filippo Menczer
IH
2009
Springer
14 years 2 months ago
Microphone Classification Using Fourier Coefficients
Media forensics tries to determine the originating device of a signal. We apply this paradigm to microphone forensics, determining the microphone model used to record a given audio...
Robert Buchholz, Christian Krätzer, Jana Ditt...
MFCS
2009
Springer
14 years 2 months ago
Private Capacities in Mechanism Design
Algorithmic mechanism design considers distributed settings where the participants, termed agents, cannot be assumed to follow the protocol but rather their own interests. The pro...
Vincenzo Auletta, Paolo Penna, Giuseppe Persiano