Sciweavers

5275 search results - page 984 / 1055
» Computing by observing
Sort
View
118
Voted
CRYPTO
2009
Springer
122views Cryptology» more  CRYPTO 2009»
15 years 9 months ago
Utility Dependence in Correct and Fair Rational Secret Sharing
The problem of carrying out cryptographic computations when the participating parties are rational in a game-theoretic sense has recently gained much attention. One problem that h...
Gilad Asharov, Yehuda Lindell
SSD
2009
Springer
149views Database» more  SSD 2009»
15 years 9 months ago
Analyzing Trajectories Using Uncertainty and Background Information
A key issue in clustering data, regardless the algorithm used, is the definition of a distance function. In the case of trajectory data, different distance functions have been pro...
Bart Kuijpers, Bart Moelans, Walied Othman, Alejan...
IMC
2009
ACM
15 years 9 months ago
TCP revisited: a fresh look at TCP in the wild
Since the last in-depth studies of measured TCP traffic some 68 years ago, the Internet has experienced significant changes, including the rapid deployment of backbone links wit...
Feng Qian, Alexandre Gerber, Zhuoqing Morley Mao, ...
MM
2009
ACM
172views Multimedia» more  MM 2009»
15 years 9 months ago
Concept, content and the convict
This paper describes the concepts behind and implementation of the multimedia art work Alan01 / AlanOnline, which wakes up the 1952 criminally convicted Alan Turing as a piece of ...
Mika Luma Tuomola, Teemu Korpilahti, Jaakko Pesone...
MOBILITY
2009
ACM
15 years 9 months ago
Feasibility evaluation of a communication-oriented P2P system in mobile environments
We present the feasibility evaluation of a structured communication-oriented Peer-to-Peer (P2P) system being used in mobile environments in this paper. The different levels of chu...
Zhonghong Ou, Erkki Harjula, Otso Kassinen, Mika Y...