Sciweavers

2648 search results - page 131 / 530
» Human Factors In Computer Security
Sort
View
NETGAMES
2006
ACM
15 years 11 months ago
Network game design: hints and implications of player interaction
While psychologists analyze network game-playing behavior in terms of players’ social interaction and experience, understanding user behavior is equally important to network res...
Kuan-Ta Chen, Chin-Laung Lei
ATAL
2005
Springer
15 years 10 months ago
Decentralized voting with unconditional privacy
The aggregation of conflicting preferences is a key issue in multiagent systems. Due to its universality, voting has a central role among preference aggregation mechanisms. Votin...
Felix Brandt, Tuomas Sandholm
178
Voted
HRI
2009
ACM
15 years 9 months ago
On using mixed-initiative control: a perspective for managing large-scale robotic teams
Prior work suggests that the potential benefits of mixed initiative management of multiple robots are mitigated by situational factors, including workload and operator expertise....
Benjamin Hardin, Michael A. Goodrich
157
Voted
GIS
2008
ACM
15 years 6 months ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray
153
Voted
SIGGRAPH
2010
ACM
15 years 9 months ago
Seeing is believing: body motion dominates in multisensory conversations
In many scenes with human characters, interacting groups are an important factor for maintaining a sense of realism. However, little is known about what makes these characters app...
Cathy Ennis, Rachel McDonnell, Carol O'Sullivan