Sciweavers

1151 search results - page 57 / 231
» The role of game theory in human computation systems
Sort
View
NSPW
2004
ACM
14 years 1 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
CHI
2009
ACM
14 years 8 months ago
Intentions: a game for classifying search query intent
Knowing the intent of a search query allows for more intelligent ways of retrieving relevant search results. Most of the recent work on automatic detection of query intent uses su...
Edith Law, Anton Mityagin, David Maxwell Chickerin...
MICRO
2008
IEEE
136views Hardware» more  MICRO 2008»
14 years 2 months ago
Power to the people: Leveraging human physiological traits to control microprocessor frequency
Any architectural optimization aims at satisfying the end user. However, modern architectures execute with little to no knowledge about the individual user. If architectures could...
Alex Shye, Yan Pan, Benjamin Scholbrock, J. Scott ...
ACMACE
2005
ACM
14 years 1 months ago
Designing a narrative-based audio only 3D game engine
Immersing players in believable and engaging virtual environments is a common goal for many interactive computer games. While PC-based audio only games set in virtual worlds have ...
Timothy Roden, Ian Parberry
ISMAR
2005
IEEE
14 years 1 months ago
Face to Face Collaborative AR on Mobile Phones
Mobile phones are an ideal platform for augmented reality. In this paper we describe how they can also be used to support face to face collaborative AR gaming. We have created a c...
Anders Henrysson, Mark Billinghurst, Mark Ollila