Sciweavers

152 search results - page 14 / 31
» Improved computational models of human behavior in security ...
Sort
View
CVPR
2007
IEEE
15 years 11 months ago
Beyond bottom-up: Incorporating task-dependent influences into a computational model of spatial attention
A critical function in both machine vision and biological vision systems is attentional selection of scene regions worthy of further analysis by higher-level processes such as obj...
Robert J. Peters, Laurent Itti
EXPCS
2007
15 years 1 months ago
Experimental economics and experimental computer science: a survey
In surprisingly many computer science research projects, system outcomes may be influenced by computerized or human agents with different economic incentives. Such studies include...
Jens Grossklags
ACSAC
2009
IEEE
15 years 1 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
ACG
2009
Springer
15 years 4 months ago
Performance and Prediction: Bayesian Modelling of Fallible Choice in Chess
Evaluating agents in decision-making applications requires assessing their skill and predicting their behaviour. Both are well developed in Poker-like situations, but less so in mo...
Guy Haworth, Kenneth W. Regan, Giuseppe Di Fatta
CHI
2008
ACM
15 years 10 months ago
Security practitioners in context: their activities and interactions
This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine ...
Rodrigo Werlinger, Kirstie Hawkey, Konstantin Bezn...