Sciweavers

1653 search results - page 245 / 331
» Computer science and game theory
Sort
View
193
Voted

Lecture Notes
404views
16 years 9 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
CHI
2006
ACM
15 years 11 months ago
Urbanhermes: social signaling with electronic fashion
Fashion signals are displayed to indicate access to information. Consistent, timely, and meaningful signal displays are only made possible if one is well-connected. While fashion ...
Christine M. Liu, Judith S. Donath
SIGECOM
2009
ACM
114views ECommerce» more  SIGECOM 2009»
15 years 5 months ago
Policy teaching through reward function learning
Policy teaching considers a Markov Decision Process setting in which an interested party aims to influence an agent’s decisions by providing limited incentives. In this paper, ...
Haoqi Zhang, David C. Parkes, Yiling Chen
SIGECOM
2009
ACM
112views ECommerce» more  SIGECOM 2009»
15 years 5 months ago
Network bargaining: algorithms and structural results
We consider models for bargaining in social networks, in which players are represented by vertices and edges represent bilateral opportunities for deals between pairs of players. ...
Tanmoy Chakraborty, Michael Kearns, Sanjeev Khanna
HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
15 years 5 months ago
Paper versus Electronic: Challenges Associated with Physicians' Usage of Electronic Medical Records
This study builds on the theory of planned behavior, institutional and diffusion theories to investigate physicians’ attitudes and usage behaviors of electronic medical records ...
Virginia Ilie, James F. Courtney, Craig Van Slyke