Sciweavers

26 search results - page 3 / 6
» Fighting Two Pirates
Sort
View
CW
2008
IEEE
14 years 29 days ago
Interactive Animation of Virtual Characters: Application to Virtual Kung-Fu Fighting
This paper aims at proposing a framework for animating virtual humans that can efficiently interact with real users in virtual reality (VR). If the user’s order can be modeled ...
Nicolas Pronost, Franck Multon, Qilei Li, Weidong ...
INFOCOM
2009
IEEE
14 years 1 months ago
Fighting Spam with the NeighborhoodWatch DHT
—In this paper, we present DHTBL, an anti-spam blacklist built upon a novel secure distributed hash table (DHT). We show how DHTBL can be used to replace existing DNS-based black...
Adam Bender, Rob Sherwood, Derek Monner, Nathan Go...
FLAIRS
2001
13 years 7 months ago
Using Hybrid Automata to Express Realtime Properties in VSE-II
In formallyanalyzinganddevelopingindustrialsizedsystems weare often confrontedwiththe problemof expressingrealtimeproperties.Especiallyin safetycritical applications as, for examp...
Andreas Nonnengart, Georg Rock, Werner Stephan
PKC
2007
Springer
117views Cryptology» more  PKC 2007»
14 years 18 days ago
Identity-Based Traitor Tracing
We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming the bilinear decision Diffie-Hellman (DBDH) is hard in...
Michel Abdalla, Alexander W. Dent, John Malone-Lee...
ICSE
1995
IEEE-ACM
13 years 10 months ago
The World and the Machine
As software developers we are engineers because we make useful machines. We are concerned both with the world, in which the machine serves a useful purpose, and with the machine i...
Michael Jackson