Sciweavers

11345 search results - page 2096 / 2269
» Foundations of Computer Science
Sort
View
WWW
2008
ACM
16 years 3 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
CHI
2009
ACM
16 years 3 months ago
Synchronized communication and coordinated views: qualitative data discovery for team game user studies
We present a tool for qualitative data discovery that aids researchers in analyzing synchronized log data with audio collected from multiple computers. The tool was originally dev...
William A. Hamilton, Zachary O. Toups, Andruid Ker...
COORDINATION
2009
Springer
16 years 3 months ago
Enhanced Coordination in Sensor Networks through Flexible Service Provisioning
: Heterogeneous wireless sensor networks represent a challenging programming environment. Servilla addresses this by offering a new middleware framework that provides service provi...
Chien-Liang Fok, Gruia-Catalin Roman, Chenyang Lu
CHI
2008
ACM
16 years 3 months ago
CareLog: a selective archiving tool for behavior management in schools
Identifying the function of problem behavior can lead to the development of more effective interventions. One way to identify the function is through functional behavior assessmen...
Gillian R. Hayes, Lamar M. Gardere, Gregory D. Abo...
CHI
2007
ACM
16 years 3 months ago
Noticing notice: a large-scale experiment on the timing of software license agreements
Spyware is an increasing problem. Interestingly, many programs carrying spyware honestly disclose the activities of the software, but users install the software anyway. We report ...
Nathaniel Good, Jens Grossklags, Deirdre K. Mullig...
« Prev « First page 2096 / 2269 Last » Next »