Home > Research > Publications & Outputs > Security design in human computation games (tra...

Links

Text available via DOI:

View graph of relations

Security design in human computation games (transcript of discussion)

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
Publication date2014
Host publicationSecurity Protocols XVIII: 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers
EditorsBruce Christianson, James Malcolm
Place of PublicationBerlin
PublisherSpringer Verlag
Pages154-160
Number of pages7
ISBN (electronic)9783662459218
ISBN (print)9783662459201
<mark>Original language</mark>English
Event18th International Workshop Security Protocols - Cambridge, United Kingdom
Duration: 24/03/201026/03/2010

Conference

Conference18th International Workshop Security Protocols
Country/TerritoryUnited Kingdom
CityCambridge
Period24/03/1026/03/10

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7061
ISSN (Print)0302-9743
ISSN (electronic)1611-3349

Conference

Conference18th International Workshop Security Protocols
Country/TerritoryUnited Kingdom
CityCambridge
Period24/03/1026/03/10

Abstract

This is a joint work with my student Su-Yang, he is actually in the audience just over there, and his research is sponsored by Microsoft Research here in Cambridge.
So what is human computation about? Basically it is about getting voluntary human efforts to solve some difficult computational problems where no known algorithms exist to solve those kind of problems efficiently. And human computation systems are typically designed as computer games, because games offer independence, this can actually use, these can be used as incentives to attract volunteers. And in turn, the volunteers’ game play collectively solves a computationally hard problem. That is the basic idea.