Email has come to play a central role in task management, yet email tool features have remained relatively static in recent years, lagging behind users' evolving practices. T...
Victoria Bellotti, Nicolas Ducheneaut, Mark Howard...
Often, we wish to design incentive-compatible algorithms for settings in which the players' private information is drawn from discrete domains (e.g., integer values). Our mai...
There has been a growing interest to develop technologies for laboratory environments. However, existing systems are underdeployed in real research labs. In order to create more s...
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Designing agents whose behavior challenges human players adequately is a key issue in computer games development. This work presents a novel technique, based on reinforcement lear...
Gustavo Andrade, Geber Ramalho, Hugo Santana, Vinc...