Login / Signup
Security Design in Human Computation Games (Transcript of Discussion).
Jeff Yan
Published in:
Security Protocols Workshop (2010)
Keyphrases
</>
human computation
functional requirements
design process
machine learning
database
information systems
acm sigkdd
databases
image database
multi dimensional
information security
query formulation