Sciweavers

4190 search results - page 26 / 838
» Implementing commitment-based interactions
Sort
View
ETFA
2008
IEEE
15 years 4 months ago
Design and implementation of a wearable, context-aware MR framework for the Chloe@University application
In this paper, we present the technical details and the challenges we faced during the development and evaluation phases of our wearable indoor guiding system which consists of a ...
Xavier Righetti, Achille Peternier, Mathieu Hopman...
ASIAN
2005
Springer
103views Algorithms» more  ASIAN 2005»
15 years 3 months ago
Implementing a Tamper-Evident Database System
Abstract. Data integrity is an assurance that data has not been modified in an unknown or unauthorized manner. The goal of this paper is to allow a user to leverage a small amount...
Gerome Miklau, Dan Suciu
ETS
2000
IEEE
138views Hardware» more  ETS 2000»
14 years 9 months ago
e-Learning Innovation through the Implementation of an Internet Supported Learning Environment
The paper provides an insight into the changing nature of the learning process through the adoption of interactive new media solutions into a traditional University Campus. The us...
David Smith, Glenn Hardaker
CSE
2009
IEEE
15 years 4 months ago
Implementing Social Norms Using Policies
—Multi-agent systems are difficult to develop. One reason for this is that agents are embedded in a society where all agents must agree to obey certain social norms in order for...
Robert Kremer
STOC
1998
ACM
121views Algorithms» more  STOC 1998»
15 years 2 months ago
Non-Interactive and Non-Malleable Commitment
A commitment protocol is a fundamental cryptographic primitive used as a basic buildingblock throughoutmodern cryptography. In STOC 1991, Dolev Dwork and Naor showed that in many ...
Giovanni Di Crescenzo, Yuval Ishai, Rafail Ostrovs...