Sciweavers

547 search results - page 95 / 110
» Alternate reality gaming
Sort
View
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
15 years 2 months ago
Applying a Layered Policy Model to IP Based Voice Services
Traditionally, specific telecommunications services were essentially confined to certain types of networks; e.g., television over broadcast networks or cable and voice service ove...
Douglas C. Sicker
DATE
1998
IEEE
153views Hardware» more  DATE 1998»
15 years 1 months ago
An Energy-Conscious Exploration Methodology for Reconfigurable DSPs
As the "system-on-a-chip" concept is rapidly becoming a reality, time-to-market and product complexity push the reuse of complex macromodules. Circuits combining a varie...
Jan M. Rabaey, Marlene Wan
85
Voted
CCS
2010
ACM
14 years 6 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
15 years 4 months ago
Adaptive-ID Secure Revocable Identity-Based Encryption
Abstract. Identity-Based Encryption (IBE) offers an interesting alternative to PKI-enabled encryption as it eliminates the need for digital certificates. While revocation has bee...
Benoît Libert, Damien Vergnaud
ATAL
2009
Springer
15 years 4 months ago
Altruism and agents: an argumentation based approach to designing agent decision mechanisms
We present an argument-based qualitative decision-making framework in which the social values promoted or demoted by alternative action-options are explicitly represented. We show...
Trevor J. M. Bench-Capon, Katie Atkinson, Peter Mc...