Sciweavers

1653 search results - page 221 / 331
» Computer science and game theory
Sort
View
IACR
2011
87views more  IACR 2011»
13 years 10 months ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao
WWW
2008
ACM
15 years 11 months ago
Trust-based recommendation systems: an axiomatic approach
High-quality, personalized recommendations are a key feature in many online systems. Since these systems often have explicit knowledge of social network structures, the recommenda...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...
CSCW
2004
ACM
15 years 4 months ago
Six degrees of jonathan grudin: a social network analysis of the evolution and impact of CSCW research
In this paper, we describe the evolution and impact of computersupported cooperative work (CSCW) research through social network analysis of coauthorship data. A network of author...
Daniel B. Horn, Thomas A. Finholt, Jeremy P. Birnh...
FUNGAMES
2010
15 years 2 days ago
Recognizing self in puppet controlled virtual avatars
Recent work in neuroscience suggests that there is a common coding in the brain between perception, imagination and execution of movement. Further, this common coding is considere...
Ali Mazalek, Michael Nitsche, Sanjay Chandrasekhar...
93
Voted
GECCO
2008
Springer
143views Optimization» more  GECCO 2008»
15 years 1 days ago
How social structure and institutional order co-evolve beyond instrumental rationality
This study proposes an agent-based model where adaptively learning agents with local vision who are situated in the Prisoner’s Dilemma game change their strategy and location as...
Jae-Woo Kim