Sciweavers

821 search results - page 103 / 165
» The Ethics of Computer Game Design
Sort
View
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
15 years 5 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
119
Voted
WWW
2008
ACM
16 years 4 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
138
Voted
ATAL
2010
Springer
15 years 4 months ago
Planning against fictitious players in repeated normal form games
Planning how to interact against bounded memory and unbounded memory learning opponents needs different treatment. Thus far, however, work in this area has shown how to design pla...
Enrique Munoz de Cote, Nicholas R. Jennings
JIIS
2008
104views more  JIIS 2008»
15 years 3 months ago
A framework for checking proofs naturally
We propose a natural framework, called NF, which supports development of formal proofs on a computer. NF is based on a theory of Judgments and Derivations. NF is designed by observ...
Masahiko Sato
164
Voted
HUC
2010
Springer
15 years 1 months ago
EnergyLife: pervasive energy awareness for households
We present Energy Life a system utilizing wireless sensors, mobile and ambient interfaces that turn energy consumers into active players. Energy Life participants play through dif...
Christoffer Björkskog, Giulio Jacucci, Lucian...