Sciweavers

1653 search results - page 180 / 331
» Computer science and game theory
Sort
View
97
Voted
PKC
2010
Springer
161views Cryptology» more  PKC 2010»
15 years 20 days ago
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
ded abstract of this paper appears in 13th International Conference on Practice and Theory in Public Key Cryptography (PKC) 2010, Lecture Notes in Computer Science Vol. ?, P. Nguye...
Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Vi...
DSS
2002
231views more  DSS 2002»
14 years 10 months ago
Computational aspects of the FLBC framework
Recent research has sought to develop formal languages for business communication as more expressive, flexible and powerful alternatives to current electronic data interchange (ED...
Aspassia Daskalopulu, Marek J. Sergot
DIGRA
2005
Springer
15 years 4 months ago
Liberal Sims?: Simulated Difference and the Commodity of Social Diversity
This paper outlines how representations of gender, sexuality, race and ethnicity intersect with strategies of late capitalism in The Sims, arguably the most popular video game of ...
A. Brady Curlew
IJBC
2008
112views more  IJBC 2008»
14 years 10 months ago
Computation and Visualization of bifurcation Surfaces
The localization of critical parameter sets called bifurcations is often a central task of the analysis of a nonlinear dynamical system. Bifurcations of codimension 1 that can be ...
Dirk Stiefs, Thilo Gross, Ralf Steuer, Ulrike Feud...
LICS
2009
IEEE
15 years 5 months ago
On the Computational Complexity of Verifying One-Counter Processes
—One-counter processes are pushdown systems over a singleton stack alphabet (plus a stack-bottom symbol). We study the complexity of two closely related verification problems ov...
Stefan Göller, Richard Mayr, Anthony Widjaja ...