Sciweavers

1151 search results - page 152 / 231
» The role of game theory in human computation systems
Sort
View
MOZ
2004
Springer
14 years 1 months ago
The Structure of Authority: Why Security Is Not a Separable Concern
Common programming practice grants excess authority for the sake of functionality; programming principles require least authority for the sake of security. If we practice our princ...
Mark S. Miller, Bill Tulloh, Jonathan S. Shapiro
CHI
2011
ACM
12 years 12 months ago
Fit4life: the design of a persuasive technology promoting healthy behavior and ideal weight
This is a critical design paper offering a possible scenario of use intended to provoke reflection about values and politics of design in persuasive computing. We describe the des...
Stephen Purpura, Victoria Schwanda, Kaiton William...
CHI
2008
ACM
14 years 8 months ago
Emotion rating from short blog texts
Being able to automatically perceive a variety of emotions from text alone has potentially important applications in CMC and HCI that range from identifying mood from online posts...
Alastair J. Gill, Darren Gergle, Robert M. French,...
ACMDIS
2008
ACM
13 years 10 months ago
Cognitive partnerships on the bench top: designing to support scientific researchers
There has been a growing interest to develop technologies for laboratory environments. However, existing systems are underdeployed in real research labs. In order to create more s...
Ellie Harmon, Nancy J. Nersessian
SACMAT
2004
ACM
14 years 1 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...