Sciweavers

7395 search results - page 22 / 1479
» Social Modeling and i*
Sort
View
ATAL
2010
Springer
14 years 11 months ago
Internal implementation
We introduce a constrained mechanism design setting called internal implementation, in which the mechanism designer is explicitly modeled as a player in the game of interest. This...
Ashton Anderson, Yoav Shoham, Alon Altman
IJNVO
2011
47views more  IJNVO 2011»
14 years 4 months ago
Harvesting covert networks: a case study of the iMiner database
: Data collection of covert networks is an inherently difficult task because of the very nature of these networks. Researchers find it difficult to locate and access data relating ...
Nasrullah Memon, Uffe Kock Wiil, Reda Alhajj, Clau...
CSDA
2011
14 years 4 months ago
Inferences on Weibull parameters with conventional type-I censoring
In this article we consider the statistical inferences of the unknown parameters of a Weibull distribution when the data are Type-I censored. It is well known that the maximum lik...
Avijit Joarder, Hare Krishna, Debasis Kundu
CHI
2011
ACM
14 years 1 months ago
Oops, I did it again: mitigating repeated access control errors on facebook
We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create ...
Serge Egelman, Andrew Oates, Shriram Krishnamurthi
CCR
2010
104views more  CCR 2010»
14 years 7 months ago
I know what you will do next summer
This is a brief journey across the Internet privacy landscape. After trying to convince you about the importance of the problem I will try to present questions of interest and how...
Balachander Krishnamurthy