Sciweavers

524 search results - page 69 / 105
» Why phishing works
Sort
View
HICSS
2002
IEEE
85views Biometrics» more  HICSS 2002»
15 years 4 months ago
Just What Do the Youth of Today Want? Technology Appropriation by Young People
What do young people want from information and communication technology? Why do they adopt some technologies but reject others? What roles do mobile technologies play in their liv...
Jenny M. Carroll, Steve Howard, Frank Vetere, Jane...
GECCO
2010
Springer
167views Optimization» more  GECCO 2010»
15 years 4 months ago
Evolving CPPNs to grow three-dimensional physical structures
The majority of work in the field of evolutionary robotics concerns itself with evolving control strategies for human designed or bio-mimicked robot morphologies. However, there ...
Joshua E. Auerbach, Josh C. Bongard
HUC
2009
Springer
15 years 4 months ago
Assessing demand for intelligibility in context-aware applications
Intelligibility can help expose the inner workings and inputs of context-aware applications that tend to be opaque to users due to their implicit sensing and actions. However, use...
Brian Y. Lim, Anind K. Dey
RT
2001
Springer
15 years 4 months ago
Measuring the Perception of Visual Realism in Images
One of the main goals in realistic rendering is to generate images that are indistinguishable from photographs – but how do observers decide whether an image is photographic or c...
Paul Rademacher, Jed Lengyel, Edward Cutrell, Turn...
FOCS
2000
IEEE
15 years 4 months ago
Fairness Measures for Resource Allocation
In many optimization problems, one seeks to allocate a limited set of resources to a set of individuals with demands. Thus, such allocations can naturally be viewed as vectors, wi...
Amit Kumar, Jon M. Kleinberg