Sciweavers

539 search results - page 40 / 108
» On Modelling User Observations in the UTP
Sort
View
RAID
2010
Springer
13 years 6 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
HCI
2001
13 years 9 months ago
Configuring social agents
Social agents have recently been more frequently used in the user interface. However, so far not many studies have been conducted on what impact such interfaces have on users beha...
Charlotte Wiberg, Mikael Wiberg
ACMDIS
2000
ACM
13 years 12 months ago
Rapid Ethnography: Time Deepening Strategies for HCI Field Research
Field research methods are useful in the many aspects of HumanComputer Interaction research, including gathering user requirements, understanding and developing user models, and n...
David R. Millen
CORR
2008
Springer
189views Education» more  CORR 2008»
13 years 7 months ago
Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio
We study the problem of dynamic spectrum sensing and access in cognitive radio systems as a partially observed Markov decision process (POMDP). A group of cognitive users cooperati...
Jayakrishnan Unnikrishnan, Venugopal V. Veeravalli
CORR
2004
Springer
104views Education» more  CORR 2004»
13 years 7 months ago
Near Rationality and Competitive Equilibria in Networked Systems
A growing body of literature in networked systems research relies on game theory and mechanism design to model and address the potential lack of cooperation between self-intereste...
Nicolas Christin, Jens Grossklags, John Chuang