Sciweavers

6047 search results - page 973 / 1210
» Modeling with Extend
Sort
View
103
Voted
ATAL
2007
Springer
15 years 9 months ago
Dynamic movement and positioning of embodied agents in multiparty conversations
For embodied agents to engage in realistic multiparty conversation, they must stand in appropriate places with respect to other agents and the environment. When these factors chan...
Dusan Jan, David R. Traum
ATAL
2007
Springer
15 years 9 months ago
Routing games with an unknown set of active players
In many settings there exists a set of potential participants, but the set of participants who are actually active in the system, and in particular their number, is unknown. This ...
Itai Ashlagi, Dov Monderer, Moshe Tennenholtz
118
Voted
CCS
2007
ACM
15 years 9 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros
CP
2007
Springer
15 years 9 months ago
Scheduling Conditional Task Graphs
The increasing levels of system integration in Multi-Processor System-on-Chips (MPSoCs) emphasize the need for new design flows for efficient mapping of multi-task applications o...
Michele Lombardi, Michela Milano
CTRSA
2007
Springer
184views Cryptology» more  CTRSA 2007»
15 years 9 months ago
Cryptanalysis of Reduced Variants of the FORK-256 Hash Function
FORK-256 is a hash function presented at FSE 2006. Whereas SHA-like designs process messages in one stream, FORK-256 uses four parallel streams for hashing. In this article, we pre...
Florian Mendel, Joseph Lano, Bart Preneel