Sciweavers

14348 search results - page 2607 / 2870
» Active Database Systems
Sort
View
FC
2004
Springer
89views Cryptology» more  FC 2004»
15 years 10 months ago
Electronic National Lotteries
We describe the design and implementation of secure and robust protocol and system for a national electronic lottery. Electronic lotteries at a national level are a viable cost eļ¬...
Elisavet Konstantinou, Vasiliki Liagkou, Paul G. S...
GI
2004
Springer
15 years 10 months ago
Towards Using the Full Human Potential in Games and Virtual Environments
: Humans have complex sensory and control capabilities. Only a few are used in standard games and virtual environments. Examples of games using interfaces beyond mouse, keyboard an...
Steffi Beckhaus
148
Voted
ETRA
2010
ACM
178views Biometrics» more  ETRA 2010»
15 years 10 months ago
Biometric identification via an oculomotor plant mathematical model
There has been increased interest in reliable, non-intrusive methods of biometric identification due to the growing emphasis on security and increasing prevalence of identity thef...
Oleg V. Komogortsev, Sampath Jayarathna, Cecilia R...
WWW
2010
ACM
15 years 10 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
141
Voted
IEEEPACT
2003
IEEE
15 years 10 months ago
Constraint Graph Analysis of Multithreaded Programs
This paper presents a framework for analyzing the performance of multithreaded programs using a model called a constraint graph. We review previous constraint graph definitions fo...
Harold W. Cain, Mikko H. Lipasti, Ravi Nair
« Prev « First page 2607 / 2870 Last » Next »