Sciweavers

792 search results - page 152 / 159
» Mixed-initiative security agents
Sort
View
CORR
2008
Springer
102views Education» more  CORR 2008»
13 years 7 months ago
Game Theory with Costly Computation
We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic resul...
Joseph Y. Halpern, Rafael Pass
CSDA
2008
147views more  CSDA 2008»
13 years 7 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach
JFP
2010
142views more  JFP 2010»
13 years 6 months ago
Linear type theory for asynchronous session types
Session types support a type-theoretic formulation of structured patterns of communication, so that the communication behaviour of agents in a distributed system can be verified ...
Simon J. Gay, Vasco Thudichum Vasconcelos
WWW
2005
ACM
14 years 8 months ago
Improving understanding of website privacy policies with fine-grained policy anchors
Website privacy policies state the ways that a site will use personal identifiable information (PII) that is collected from fields and forms in web-based transactions. Since these...
Stephen E. Levy, Carl Gutwin
CHI
2009
ACM
14 years 8 months ago
The effect of affective iconic realism on anonymous interactants' self-disclosure
In this paper, we describe progress in research designed to explore the effect of the combination of avatars' visual fidelity and users' anticipated future interaction o...
Sin-Hwa Kang, Jonathan Gratch, James H. Watt