Sciweavers

519 search results - page 97 / 104
» Requirements, Implementation and Applications of Hand-held V...
Sort
View
MOBISYS
2009
ACM
16 years 7 days ago
xShare: supporting impromptu sharing of mobile phones
Loaded with personal data, e.g. photos, contacts, and call history, mobile phones are truly personal devices. Yet it is often necessary or desirable to share our phones with other...
Yunxin Liu, Ahmad Rahmati, Yuanhe Huang, Hyukjae J...
ATAL
2009
Springer
15 years 6 months ago
Pragmatic-strategic reputation-based decisions in BDI agents
Computational trust and reputation models have been recognized as one of the key technologies required to design and implement agent systems. These models manage and aggregate the...
Isaac Pinyol, Jordi Sabater-Mir
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 6 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
NETGAMES
2006
ACM
15 years 5 months ago
A distributed architecture for MMORPG
We present an approach to support Massively Multiplayer Online Role-Playing Games. Our proposed solution begins by splitting the large virtual world into smaller regions, each reg...
Marios Assiotis, Velin Tzanov
SI3D
2010
ACM
15 years 5 months ago
Epipolar sampling for shadows and crepuscular rays in participating media with single scattering
Scattering in participating media, such as fog or haze, generates volumetric lighting effects known as crepuscular or god rays. Rendering such effects greatly enhances the realism...
Thomas Engelhardt, Carsten Dachsbacher