Sciweavers

1792 search results - page 323 / 359
» What Are We Arguing About
Sort
View
IEEECIT
2010
IEEE
13 years 6 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
CHI
2006
ACM
14 years 8 months ago
Sashay: designing for wonderment
No longer confined to our offices, schools, and homes, technology is expanding at an astonishing rate across our everyday public urban landscapes. From the visible (mobile phones,...
Eric Paulos, Chris Beckmann
NIPS
2004
13 years 9 months ago
Heuristics for Ordering Cue Search in Decision Making
Simple lexicographic decision heuristics that consider cues one at a time in a particular order and stop searching for cues as soon as a decision can be made have been shown to be...
Peter M. Todd, Anja Dieckmann
ALGORITHMICA
2010
152views more  ALGORITHMICA 2010»
13 years 7 months ago
Gaming Prediction Markets: Equilibrium Strategies with a Market Maker
We study the equilibrium behavior of informed traders interacting with market scoring rule (MSR) market makers. One attractive feature of MSR is that it is myopically incentive com...
Yiling Chen, Stanko Dimitrov, Rahul Sami, Daniel M...
ICSOC
2010
Springer
13 years 6 months ago
Incorporating Expectations as a Basis for Business Service Selection
Abstract. The collaborative creation of value is the central tenet of services science. In particular, then, the quality of a service encounter would depend on the mutual expectati...
Adel M. ElMessiry, Xibin Gao, Munindar P. Singh