Sciweavers

4263 search results - page 695 / 853
» Network Security
Sort
View
AGENTS
1997
Springer
15 years 8 months ago
Adaptation and Learning in Animated Creatures
This paper is concerned with synthetic agents interacting with virtual environments, called animated creatures. The animated creatures are articulated graphical gures that are eq...
Jiming Liu, Hong Qin, Yuan Yan Tang, Y. T. Wu
136
Voted
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
On Expected Constant-Round Protocols for Byzantine Agreement
In a seminal paper, Feldman and Micali (STOC '88) show an n-party Byzantine agreement protocol tolerating t < n/3 malicious parties that runs in expected constant rounds. H...
Jonathan Katz, Chiu-Yuen Koo
PUC
2000
94views more  PUC 2000»
15 years 3 months ago
Places to Stay on the Move: Software Architectures for Mobile User Interfaces
abstract Alan Dix Devina Ramduny Tom Rodden, Nigel Davies. aQtive limited and Staffordshire University Staffordshire University Lancaster University http://www.hiraeth.com/alan/top...
Alan J. Dix, Devina Ramduny, Tom Rodden, Nigel Dav...
SACRYPT
2009
Springer
130views Cryptology» more  SACRYPT 2009»
15 years 10 months ago
Format-Preserving Encryption
Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of identical format—for example, encrypting a valid credit-card number into a ...
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway,...
IPPS
2002
IEEE
15 years 8 months ago
Architecture of the Entropia Distributed Computing System
Distributed Computing, the exploitation of idle cycles on pervasive desktop PC systems offers the opportunity to increase the available computing power by orders of magnitude (10x...
Andrew A. Chien