Sciweavers

2043 search results - page 366 / 409
» Some Basics on Tolerances
Sort
View
SIGSOFT
2005
ACM
15 years 5 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
WS
2005
ACM
15 years 5 months ago
A framework for MAC protocol misbehavior detection in wireless networks
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
CRYPTO
2005
Springer
163views Cryptology» more  CRYPTO 2005»
15 years 5 months ago
On the Generic Insecurity of the Full Domain Hash
The Full-Domain Hash (FDH) signature scheme [3] forms one the most basic usages of random oracles. It works with a family F of trapdoor permutations (TDP), where the signature of m...
Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrz...
DIGRA
2005
Springer
15 years 5 months ago
Designing Goals for Online Role-Players
The increasing popularity of persistent worlds and the predicted rise of pervasive gaming, both having a strong inherent potential for role-playing, stress a classical challenge o...
Markus Montola
E4MAS
2005
Springer
15 years 5 months ago
A Survey of Environments and Mechanisms for Human-Human Stigmergy
Stigmergy (the coordination of agents through signs they make and sense in a shared environment) was originally articulated in the study of social insects. Its basic processes are ...
H. Van Dyke Parunak