Sciweavers

11580 search results - page 2155 / 2316
» Communication vs. Computation
Sort
View
WS
2005
ACM
15 years 9 months ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee
DIGRA
2005
Springer
15 years 9 months ago
Framing Virtual Law
Building on the work of games theorists and virtual world designers, this paper proposes a framework for understanding the real-virtual dichotomy in terms of a series of five fram...
Peter Edelmann
DIGRA
2005
Springer
15 years 9 months ago
socio-ec(h)o: Ambient Intelligence and Gameplay
This paper describes the preliminary research of an ambient intelligent system known as socioec(h)o. socio-ec(h)o explores the design and implementation of an ambient intelligent ...
Ron Wakkary, Marek Hatala, Robb Lovell, Milena Dro...
DNIS
2005
Springer
112views Database» more  DNIS 2005»
15 years 9 months ago
Modelling Peer-to-Peer Data Networks Under Complex System Theory
: A Peer-to-peer Data Network (PDN) is an open and evolving society of peer nodes that assemble into a network to share their data for mutual benefit. PDNs are enabled by distribu...
Cyrus Shahabi, Farnoush Banaei Kashani
EUROCRYPT
2005
Springer
15 years 9 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
« Prev « First page 2155 / 2316 Last » Next »