Sciweavers

1728 search results - page 252 / 346
» Social Computing: Fundamentals and applications
Sort
View
CHI
2010
ACM
14 years 4 months ago
Using reinforcement to strengthen users' secure behaviors
Users have a strong tendency toward dismissing security dialogs unthinkingly. Prior research has shown that users' responses to security dialogs become significantly more tho...
Ricardo Villamarín-Salomón, Jos&eacu...
MHCI
2009
Springer
14 years 4 months ago
Studying multi-user settings for pervasive games
Whenever a pervasive game has to be developed for a group of children an appropriate multi-user setting has to be found. If the pervasive game does not support the children with a...
Karin Leichtenstern, Elisabeth André
SIGECOM
2009
ACM
114views ECommerce» more  SIGECOM 2009»
14 years 4 months ago
Policy teaching through reward function learning
Policy teaching considers a Markov Decision Process setting in which an interested party aims to influence an agent’s decisions by providing limited incentives. In this paper, ...
Haoqi Zhang, David C. Parkes, Yiling Chen
ISPAN
2008
IEEE
14 years 4 months ago
Product Line Sigraphs
Intuitively, a signed graph is a graph in which every edge is labeled with a + or − sign. For each edge, its sign represents the mode of the relationship between the vertices it...
Daniela Ferrero
ICDCS
2007
IEEE
14 years 4 months ago
EnviroMic: Towards Cooperative Storage and Retrieval in Audio Sensor Networks
This paper presents the design, implementation, and evaluation of EnviroMic, a novel distributed acoustic monitoring, storage, and trace retrieval system. Audio represents one of ...
Liqian Luo, Qing Cao, Chengdu Huang, Tarek F. Abde...