Reputation systems facilitate cooperation in open environments. Centrality-based reputation systems use centrality measures to rank individuals, i.e., compute their reputation bas...
Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who abuse their privileges, and given their famil...
The milestones of the history of software development are paradigm shifts. Each paradigm brought its own features and new ways of composing them to assemble software systems. Unde...
Sports exercises are beneficial for general health and fitness. Some exercises such as weight lifting are particularly errorprone and using incorrect techniques can result in seri...
With the increasing number of prototypes and market applications of interactive storytelling, the understanding and optimization of how end users respond to computer-mediated inter...
Ivar E. Vermeulen, Christian Roth, Peter Vorderer,...