Sciweavers

1727 search results - page 243 / 346
» A Technique for Large Automated Mechanism Design Problems
Sort
View
91
Voted
CCS
2010
ACM
14 years 10 months ago
Detecting and characterizing social spam campaigns
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective...
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Ya...
76
Voted
CCS
2009
ACM
15 years 5 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
DAC
2006
ACM
15 years 11 months ago
Games are up for DVFS
Graphics-intensive computer games are no longer restricted to highperformance desktops, but are also available on a variety of portable devices ranging from notebooks to PDAs and ...
Yan Gu, Samarjit Chakraborty, Wei Tsang Ooi
107
Voted
ATAL
2011
Springer
13 years 10 months ago
The effect of expression of anger and happiness in computer agents on negotiations with humans
There is now considerable evidence in social psychology, economics, and related disciplines that emotion plays an important role in negotiation. For example, humans make greater c...
Celso M. de Melo, Peter Carnevale, Jonathan Gratch
IPPS
2008
IEEE
15 years 4 months ago
On utilization of contributory storage in desktop grids
Modern desktop grid environments and shared computing platforms have popularized the use of contributory resources, such as desktop computers, as computing substrates for a variet...
Chreston Miller, Ali Raza Butt, Patrick Butler