Sciweavers

15782 search results - page 3087 / 3157
» Network Optimization and Control
Sort
View
IWSEC
2009
Springer
15 years 9 months ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto
PERSUASIVE
2009
Springer
15 years 9 months ago
A behavior model for persuasive design
This paper presents a new model for understanding human behavior. In this model (FBM), behavior is a product of three factors: motivation, ability, and triggers, each of which has...
B. J. Fogg
VRCAI
2009
ACM
15 years 9 months ago
Towards Virtual Reality games
Game engines of cinematic quality, broadband networking and advances in Virtual Reality (VR) technologies are setting the stage to allow players to have shared, “better-than-lif...
Andrei Sherstyuk, Dale Vincent, Anton Treskunov
HICSS
2008
IEEE
192views Biometrics» more  HICSS 2008»
15 years 9 months ago
Agent-Based Electricity Balancing with Distributed Energy Resources, A Multiperspective Case Study
Abstract— Distributed generation (DG) of electricity is providing an increasing part of the worldwide electricity supply. At the same time, there is a big potential of demand res...
Koen Kok, Zsófia Derzsi, Jaap Gordijn, Maar...
IPPS
2008
IEEE
15 years 9 months ago
Data throttling for data-intensive workflows
— Existing workflow systems attempt to achieve high performance by intelligently scheduling tasks on resources, sometimes even attempting to move the largest data files on the hi...
Sang-Min Park, Marty Humphrey
« Prev « First page 3087 / 3157 Last » Next »