Sciweavers

1368 search results - page 253 / 274
» Personality-Based Practical Reasoning
Sort
View
SIGMETRICS
2003
ACM
119views Hardware» more  SIGMETRICS 2003»
15 years 7 months ago
Incrementally improving lookup latency in distributed hash table systems
Distributed hash table (DHT) systems are an important class of peer-to-peer routing infrastructures. They enable scalable wide-area storage and retrieval of information, and will ...
Hui Zhang 0002, Ashish Goel, Ramesh Govindan
DIGRA
2003
Springer
15 years 7 months ago
Space, Agency, Meaning and Drama in Navigable Real-Time Virtual Environments
Does our preoccupation with navigable space distract us from the expressive potential of interactive media? Can our understanding of spatial context in virtual environments (VEs) ...
Stanislav Roudavski, François Penz
120
Voted
EUROCRYPT
2003
Springer
15 years 7 months ago
Facts and Myths of Enigma: Breaking Stereotypes
In spite of a relatively large number of publications about breaking Enigma by the Allies before and during the World War II, this subject remains relatively unknown not only to th...
Kris Gaj, Arkadiusz Orlowski
FSTTCS
2003
Springer
15 years 7 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
SPAA
2010
ACM
15 years 6 months ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...