Sciweavers

19174 search results - page 3561 / 3835
» Computer Animation Techniques
Sort
View
175
Voted
W4A
2005
ACM
15 years 10 months ago
Designing learning systems to provide accessible services
The need for providing learners with web-based learning content that match their accessibility needs and preferences, as well as providing ways to match learning content to userā€...
Pythagoras Karampiperis, Demetrios G. Sampson
176
Voted
CCS
2005
ACM
15 years 10 months ago
Tracking anonymous peer-to-peer VoIP calls on the internet
Peer-to-peer VoIP calls are becoming increasingly popular due to their advantages in cost and convenience. When these calls are encrypted from end to end and anonymized by low lat...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
CRYPTO
2005
Springer
97views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Generic Transformation for Scalable Broadcast Encryption Schemes
Broadcast encryption schemes allow a message sender to broadcast an encrypted data so that only legitimate receivers decrypt it. Because of the intrinsic nature of one-to-many comm...
Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
CVBIA
2005
Springer
15 years 10 months ago
Local or Global Minima: Flexible Dual-Front Active Contours
Most variational active contour models are designed to find the ā€œdesirableā€ local minima of data-dependent energy functionals with the hope of avoiding undesirable configurat...
Hua Li, Anthony J. Yezzi
DIGRA
2005
Springer
15 years 10 months ago
Fictive affinities in Final Fantasy XI: complicit and critical play in fantastic nations.
Like many massively-multiplayer role-playing games, Final Fantasy XI is a persistent world with a heroic fantasy setting. This paper discusses fictive player identities, and descr...
William Huber
« Prev « First page 3561 / 3835 Last » Next »