نتایج جستجو برای: assurance game

تعداد نتایج: 125002  

2015
Fredrik Jansson Kimmo Eriksson Rui-Wu Wang

Determinants of cooperation include ingroup vs. outgroup membership, and individual traits, such as prosociality and trust. We investigated whether these factors can be overridden by beliefs about people's trust. We manipulated the information players received about each other's level of general trust, "high" or "low". These levels were either measured (Experiment 1) or just arbitrarily assigne...

Journal: :Computers & Security 2007
Benjamin D. Cone Cynthia E. Irvine Michael F. Thompson Thuy D. Nguyen

Although many of the concepts included in cyber security awareness training are universal, such training often must be tailored to address the policies and requirements of a particular organization. In addition, many forms of training fail because they are rote and do not require users to think about and apply security concepts. A flexible, highly interactive video game, CyberCIEGE, is describe...

2013
Karthik Panchanathan Willem E. Frankenhuis Joan B. Silk

Dozens of studies show that bystanders are less likely to help victims as bystander number increases. However, these studies model one particular situation, in which victims need only one helper. Using a multi-player dictator game, we study a different but common situation, in which a recipient’s welfare increases with the amount of help, and donors can share the burden of helping. We find that...

2013
Ross Light

Amethyst is a point-and-click science fiction adventure game for tablets, developed over two quarters to demonstrate applied principles of computer graphics and software engineering discipline. Using a novel interaction system, players can engage in environmental puzzles. Development of Amethyst required non-trivial quality assurance measures and workflow enhancements. The end result is a funct...

2001
Joseph Kabara Prashant Krishnamurthy David Tipper

Overview: Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and adhoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security mea...

2008
Atin Basu Samuel Allen

Are individuals within modern societies more short-sighted than in previous generations? If so, what are the plausible changes in the environment and composition of society that could yield such a result? The model begins by assuming the population consists of two types (phenotypes) of individuals, (shortsighted/aggressive and foresighted/docile). These phenotypes interact with each other. Thes...

Journal: :JCM 2012
Charles A. Kamhoua Kevin A. Kwiat Joon S. Park

As information systems become ever more complex and the interdependence of these systems increases, a mission-critical system should have the fightthrough ability to sustain damage yet survive with mission assurance in cyberspace. To satisfy this requirement, in this paper we propose a game theoretic approach to binary voting with a weighted majority to aggregate observations among replicated n...

Journal: :BJET 2013
Robyn Smyth

The Commonwealth of Learning (COL) is an intergovernmental organisation created by Commonwealth Heads of Government to encourage the development and sharing of open learning and distance education knowledge, resources and technologies. For the avoidance of doubt, by applying this licence the Commonwealth of Learning does not waive any privileges or immunities from claims that it may be entitled...

Journal: :IOP conference series 2021

Abstract Playing guitar is one of the activities that can hone brain’s ability and emotions. Learning to play be done directly or indirectly. indirectly using several media. One them by a game application on mobile device. The purpose this study build an android based chord basic learning application. methodology used Digital Game Base Learning-Instructional Design, which consists four stages: ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید