Sciweavers

1653 search results - page 192 / 331
» Computer science and game theory
Sort
View
STACS
2007
Springer
15 years 5 months ago
On the Automatic Analysis of Recursive Security Protocols with XOR
Abstract. In many security protocols, such as group protocols, principals have to perform iterative or recursive computations. We call such protocols recursive protocols. Recently,...
Ralf Küsters, Tomasz Truderung
DIS
2008
Springer
15 years 18 days ago
Constructing Iceberg Lattices from Frequent Closures Using Generators
Frequent closures (FCIs) and generators (FGs) as well as the precedence relation on FCIs are key components in the definition of a variety of association rule bases. Although their...
Laszlo Szathmary, Petko Valtchev, Amedeo Napoli, R...
CHI
2010
ACM
15 years 3 months ago
Where is my team: supporting situation awareness with tactile displays
A group of friends visiting a crowded and noisy music festival is an example of a situation where knowing the location of other people is important, but where external factors, su...
Martin Pielot, Oliver Krull, Susanne Boll
BCSHCI
2008
15 years 9 days ago
From immersion to addiction in videogames
Immersion is commonly described by gamers and gamereviewers as an important aspect of a videogame. In this paper, we investigate the relationship between the immersive experience ...
May-li Seah, Paul A. Cairns
CHI
2010
ACM
15 years 5 months ago
Tagliatelle: social tagging to encourage healthier eating
This paper describes the design and initial evaluation of Tag-liatelle, a collaborative tagging application for encouraging healthier eating. Users photograph their own meals and ...
Conor Linehan, Mark Doughty, Shaun Lawson, Ben Kir...