Sciweavers

1401 search results - page 135 / 281
» Cost-Sensitive Test Strategies
Sort
View
ITICSE
2006
ACM
15 years 4 months ago
Don't be a phish: steps in user education
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced i...
Stefan A. Robila, James W. Ragucci
CIG
2005
IEEE
15 years 3 months ago
A Generic Approach for Generating Interesting Interactive Pac-Man Opponents
This paper follows on from our previous work focused on formulating an efficient generic measure of user’s satisfaction (‘interest’) when playing predator/prey games. Viewin...
Georgios N. Yannakakis, John Hallam
HICSS
2005
IEEE
110views Biometrics» more  HICSS 2005»
15 years 3 months ago
A Trust-based Negotiation Mechanism for Decentralized Economic Scheduling
Abstract— This paper presents a decentralized negotiation protocol for cooperative economic scheduling in a supply chain environment. For this purpose we designed autonomous agen...
Tim Stockheim, Oliver Wendt, Michael Schwind
NETGAMES
2005
ACM
15 years 3 months ago
Framework for evaluation of networked mobile games
In this position paper we propose an evaluation framework for networked mobile gaming, consisting of user, group, communication, and environment models. Each of these components a...
Leo Petrak, Olaf Landsiedel, Klaus Wehrle
DEXA
2005
Springer
80views Database» more  DEXA 2005»
15 years 3 months ago
Optimizing I/O Costs of Multi-dimensional Queries Using Bitmap Indices
Bitmap indices are efficient data structures for processing complex, multi-dimensional queries in data warehouse applications and scientific data analysis. For high-cardinality at...
Doron Rotem, Kurt Stockinger, Kesheng Wu