Sciweavers

2061 search results - page 276 / 413
» Authorization for Metacomputing Applications
Sort
View
136
Voted
RTCSA
2005
IEEE
15 years 10 months ago
FPGA-Based Content Protection System for Embedded Consumer Electronics
We propose a new architecture for a content protection system that conceals confidential data and algorithms in an FPGA as electrical circuits. This architecture is designed for a...
Hiroyuki Yokoyama, Kenji Toda
ACMACE
2005
ACM
15 years 10 months ago
Designing a narrative-based audio only 3D game engine
Immersing players in believable and engaging virtual environments is a common goal for many interactive computer games. While PC-based audio only games set in virtual worlds have ...
Timothy Roden, Ian Parberry
MM
2005
ACM
142views Multimedia» more  MM 2005»
15 years 10 months ago
Organum: individual presence through collaborative play
Organum Playtest is an interactive installation in which three players collaboratively navigate through a model of the human voice box, using their voices as a joystick. By asking...
Greg Niemeyer, Dan Perkel, Ryan Shaw, Jane McGonig...
SC
2005
ACM
15 years 10 months ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain
SIGITE
2005
ACM
15 years 10 months ago
Towards using online portfolios in computing courses
The direct experience we had with teaching a summer pre-college computing course in which we adopted an online portfolio approach has led us to consider the use of online portfoli...
Bryan Higgs, Mihaela Sabin