Sciweavers

1240 search results - page 190 / 248
» Computational Structure of coordinate transformations: A gen...
Sort
View
CSCW
2006
ACM
15 years 1 months ago
Strangers and friends: collaborative play in world of warcraft
We analyze collaborative play in an online video game, World of Warcraft, the most popular personal computer game in the United States, with significant markets in Asia and Europe...
Bonnie A. Nardi, Justin Harris
AAAI
2007
15 years 3 days ago
Strongly Decomposable Voting Rules on Multiattribute Domains
Sequential composition of voting rules, by making use of structural properties of the voters’ preferences, provide computationally economical ways for making a common decision o...
Lirong Xia, Jérôme Lang, Mingsheng Yi...
DAGSTUHL
2004
14 years 11 months ago
The Priority R-Tree: A Practically Efficient and Worst-Case-Optimal R-Tree
We present the Priority R-tree, or PR-tree, which is the first R-tree variant that always answers a window query using O((N/B)1-1/d + T/B) I/Os, where N is the number of ddimensio...
Lars Arge, Mark de Berg, Herman J. Haverkort, Ke Y...
PPNA
2011
14 years 4 months ago
Security and privacy issues in P2P streaming systems: A survey
Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the...
Gabriela Gheorghe, Renato Lo Cigno, Alberto Montre...
CCS
2004
ACM
15 years 3 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...