Sciweavers

2648 search results - page 81 / 530
» Human Factors In Computer Security
Sort
View
DATE
2007
IEEE
73views Hardware» more  DATE 2007»
15 years 4 months ago
Design methods for security and trust
The design of ubiquitous and embedded computers focuses on cost factors such as area, power-consumption, and performance. Security and trust properties, on the other hand, are oft...
Ingrid Verbauwhede, Patrick Schaumont
COLCOM
2008
IEEE
15 years 4 months ago
Security through Collaboration in MANETs
It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security sc...
Wenjia Li, James Parker, Anupam Joshi
ATAL
2010
Springer
14 years 11 months ago
Modeling recursive reasoning by humans using empirically informed interactive POMDPs
Recursive reasoning of the form what do I think that you think that I think (and so on) arises often while acting rationally in multiagent settings. Several multiagent decision-ma...
Prashant Doshi, Xia Qu, Adam Goodie, Diana Young
ICRA
2010
IEEE
301views Robotics» more  ICRA 2010»
14 years 8 months ago
People tracking with human motion predictions from social forces
Abstract— For many tasks in populated environments, robots need to keep track of present and future motion states of people. Most approaches to people tracking make weak assumpti...
Matthias Luber, Johannes Andreas Stork, Gian Diego...
ATAL
2011
Springer
13 years 10 months ago
A computational model of achievement motivation for artificial agents
Computational models of motivation are tools that artificial agents can use to autonomously identify, prioritize, and select the goals they will pursue. Previous research has focu...
Kathryn Elizabeth Merrick