Crowds

Results: 572



#Item
341Science / Multi-armed bandit / Stochastic optimization / Game theory / Reinforcement learning / Determinacy / Structure / Statistics / Mathematics / Machine learning

Wisdom of the Crowds vs. Groupthink: Learning in Groups and in Isolation Conor Mayo-Wilson, Kevin Zollman, and David Danks November 30, 2010 Technical Report No. CMU-PHIL-188 Philosophy

Add to Reading List

Source URL: www.hss.cmu.edu

Language: English - Date: 2010-11-30 14:12:58
342Anonymity / Pseudonymity / Cryptographic software / Pseudonym / Crowds / Digital identity / Tor / Public-key cryptography / Identity management / Cryptography / Identity / Internet privacy

- 16 - Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-22 03:49:28
343Pseudonymity / Cryptographic software / Pseudonym / Crowds / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Anonymity

- 10 - Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 02:52:12
344Anonymity / Pseudonymity / Crowds / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Anonymous P2P / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-21 08:15:52
345Dynamic programming / Partially observable Markov decision process / Stochastic control / Computer security / Advantage / Crowds / Control theory / Computer network security / Statistics / Security

C o m p u t i n g p r a c t i c e s Cybersecurity Strategies: The QuERIES Methodology

Add to Reading List

Source URL: www.dartmouth.edu

Language: English - Date: 2011-02-03 16:21:07
346Internet privacy / Anonymity / Pseudonymity / Cryptographic software / Privacy-enhancing technologies / Pseudonym / Crowds / Digital identity / Academi / Cryptography / Security / Identity management

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2005-12-13 05:57:14
347Internet privacy / Anonymity / Pseudonymity / Cryptographic software / Privacy-enhancing technologies / Crowds / Pseudonym / Public-key cryptography / Digital identity / Cryptography / Security / Identity management

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2005-08-25 02:26:06
348Internet privacy / Anonymity / Pseudonymity / Cryptographic software / Privacy-enhancing technologies / Crowds / Pseudonym / Public-key cryptography / Digital identity / Cryptography / Security / Identity management

DOC Document

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2005-11-21 04:37:48
349Computer graphics / Computer animation / Rendering / MASSIVE / Spring / Force / Simple harmonic motion / Crowd simulation / Dynamical simulation / Physics / Classical mechanics / 3D computer graphics

Virtual Populace Brain Springs: Fast Physics for Large Crowds in WALL•E Paul Kanyuk ■ Pixar Animation Studios

Add to Reading List

Source URL: www.computer.org

Language: English - Date: 2015-01-06 12:15:47
350Cyberwarfare / Internet / Internet privacy / Multi-agent systems / Denial-of-service attack / Internet Relay Chat / SYN cookies / Botnet / SYN flood / Computer network security / Computing / Denial-of-service attacks

Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds Srikanth Kandula Dina Katabi MIT {kandula,dina}@csail.mit.edu

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2006-09-21 21:38:54
UPDATE