Sciweavers

12493 search results - page 2298 / 2499
» Information Access in the Web
Sort
View
EVOW
2010
Springer
14 years 11 months ago
Evolution of Grim Trigger in Prisoner Dilemma Game with Partial Imitation
The emergence of Grim Trigger as the dominant strategy in the Iterated Prisoner Dilemma (IPD) on a square lattice is investigated for players with finite memory, using three differ...
Degang Wu, Mathis Antony, Kwok Yip Szeto
FOCS
2010
IEEE
14 years 11 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
ICIP
2010
IEEE
14 years 11 months ago
Reduced-reference SSIM estimation
The structural similarity (SSIM) index has been shown to be a good perceptual image quality predictor. In many real-world applications such as network visual communications, howev...
Abdul Rehman, Zhou Wang
PERCOM
2010
ACM
14 years 11 months ago
A visual, open-ended approach to prototyping ubiquitous computing applications
By nature, ubiquitous computing applications are intimately intertwined with users' everyday life. This situation is challenging because it requires to make the development of...
Zoé Drey, Charles Consel
PERCOM
2010
ACM
14 years 11 months ago
Integrating people-centric sensing with social networks: A privacy research agenda
During the last few years there has been an increasing number of people-centric sensing projects, which combine location information with other sensors available on mobile devices,...
Ioannis Krontiris, Felix C. Freiling
« Prev « First page 2298 / 2499 Last » Next »