Sciweavers

1300 search results - page 50 / 260
» Association Schemoids and Their Categories
Sort
View
ECRIME
2007
15 years 2 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
CODES
2004
IEEE
15 years 2 months ago
Tuning SoC platforms for multimedia processing: identifying limits and tradeoffs
We present a analytical framework to identify the tradeoffs and performance impacts associated with different SoC platform configurations in the specific context of implementing m...
Alexander Maxiaguine, Yongxin Zhu, Samarjit Chakra...
GECCO
2006
Springer
175views Optimization» more  GECCO 2006»
15 years 2 months ago
A computational theory of adaptive behavior based on an evolutionary reinforcement mechanism
Two mathematical and two computational theories from the field of human and animal learning are combined to produce a more general theory of adaptive behavior. The cornerstone of ...
J. J. McDowell, Paul L. Soto, Jesse Dallery, Saule...
VISSYM
2007
15 years 1 months ago
Grouse: Feature-Based, Steerable Graph Hierarchy Exploration
Grouse is a feature-based approach to steerable exploration of a graph and an associated hierarchy. Steerability allows exploration to begin immediately, rather than requiring a c...
Daniel Archambault, Tamara Munzner, David Auber
81
Voted
ATAL
2008
Springer
15 years 1 months ago
Specifying and enforcing norms in artificial institutions
In this paper we investigate two related aspects of the formalization of open interaction systems: how to specify norms, and how to enforce them by means of sanctions. The problem...
Nicoletta Fornara, Marco Colombetti