Sciweavers

22193 search results - page 4116 / 4439
» Multiple Restricted Multiplication
Sort
View
CCS
2006
ACM
15 years 8 months ago
Providing witness anonymity in peer-to-peer systems
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest p...
Bo Zhu, Sanjeev Setia, Sushil Jajodia
CCS
2006
ACM
15 years 8 months ago
Doppelganger: Better browser privacy without the bother
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy ...
Umesh Shankar, Chris Karlof
DSN
2004
IEEE
15 years 8 months ago
Automated Synthesis of Multitolerance
We concentrate on automated synthesis of multitolerant programs, i.e., programs that tolerate multiple classes of faults and provide a (possibly) different level of fault-toleranc...
Sandeep S. Kulkarni, Ali Ebnenasir
DSRT
2004
IEEE
15 years 8 months ago
Exploring the Spatial Density of Strategy Models in a Realistic Distributed Interactive Application
As Distributed Interactive Applications (DIAs) become increasingly more prominent in the video game industry they must scale to accommodate progressively more users and maintain a...
Damien Marshall, Declan Delaney, Séamus McL...
CGI
2006
IEEE
15 years 8 months ago
Highly Stylised Drawn Animation
Abstract. In this paper we argue for our NPAR system as an effective 2D alternative to most of NPR research which is focused on frame coherent stylised rendering of 3D models. Our ...
Fabian Di Fiore, Frank Van Reeth, John Patterson, ...
« Prev « First page 4116 / 4439 Last » Next »