Sciweavers

1003 search results - page 158 / 201
» It's life Jim, but not as we know it!
Sort
View
COGNITIVE
2001
Springer
15 years 2 months ago
Virtual Reality and Cognitive Processes
The relationship between our actions and their perceivable results is ruled by what we call the laws of nature. It is general understanding that our actions act upon real objects ...
Olaf Diettrich
IACR
2011
207views more  IACR 2011»
13 years 9 months ago
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Tw
Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart ...
Swapnoneel Roy, Amlan K. Das, Yu Li
TCC
2009
Springer
132views Cryptology» more  TCC 2009»
15 years 10 months ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky
MOBICOM
2009
ACM
15 years 4 months ago
Neighbor discovery in wireless networks and the coupon collector's problem
—Neighbor discovery1 is one of the first steps in the initialization of a wireless ad hoc network. In this paper, we design and analyze practical algorithms for neighbor discove...
Sudarshan Vasudevan, Donald F. Towsley, Dennis Goe...
CSCW
1998
ACM
15 years 2 months ago
The Dynamics of Mass Interaction
Usenet may be regarded as the world’s largest conversational application, with over 17,000 newsgroups and 3 million users. Despite its ubiquity and popularity, however, we know ...
Steve Whittaker, Loren G. Terveen, William C. Hill...