11 papers:
- DUXU-IXD-2015-EliasFC #game studies #interactive
- Ads-on Games and Fake Brands: Interactions, Commercials and Playful Branding (HE, EF, BJAdC), pp. 251–262.
- SAC-2015-OkkaliogluKP #on the
- On the discovery of fake binary ratings (MO, MK, HP), pp. 901–907.
- ASE-2014-TillmannHX #automation #generative #testing
- Transferring an automated test generation tool to practice: from pex to fakes and code digger (NT, JdH, TX), pp. 385–396.
- HT-2014-Saez-Trumper #identification #twitter
- Fake tweet buster: a webtool to identify users promoting fake news ontwitter (DST), pp. 316–317.
- AMT-2014-PoskittDPR #bidirectional #model transformation #towards
- Towards Rigorously Faking Bidirectional Model Transformations (CMP, MD, RFP, AR), pp. 70–75.
- CHI-2013-LucaZPH #using
- Using fake cursors to secure on-screen password entry (ADL, EvZ, LP, HH), pp. 2399–2402.
- TOOLS-EUROPE-2012-LangrTDD #c++ #runtime
- Fake Run-Time Selection of Template Arguments in C++ (DL, PT, TD, JPD), pp. 140–154.
- CHI-2011-BlythePC #how
- F for fake: four studies on how we fall for phish (MB, HP, JAC), pp. 3469–3478.
- ICPR-2008-GalballyCLMF #generative
- Fake fingertip generation from a minutiae template (JG, RC, AL, DM, JFA), pp. 1–4.
- SAC-2007-LinL #mining #privacy #transaction
- Privacy preserving itemset mining through fake transactions (JLL, JYCL), pp. 375–379.
- ICALP-1999-Cucker
- Real Computations with Fake Numbers (FC), pp. 55–73.