Sciweavers

1033 search results - page 139 / 207
» Stop the numbers game
Sort
View
OTM
2007
Springer
15 years 3 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
CCECE
2006
IEEE
15 years 3 months ago
Lazy Generation of Building Interiors in Realtime
Impenetrable doors are often quite common in virtual worlds. This is especially apparent in video games boasting large urban environments. Although there are often enterable build...
Evan Hahn, Prosenjit Bose, Anthony Whitehead
ICPPW
2006
IEEE
15 years 3 months ago
A Scalable Synchronization Technique for Distributed Virtual Environments Based on Networked-Server Architectures
In recent years, large scale distributed virtual environments have become a major trend in distributed applications, mainly due to the enormous popularity of multiplayer online ga...
Pedro Morillo, Juan M. Orduña, José ...
VL
2006
IEEE
220views Visual Languages» more  VL 2006»
15 years 3 months ago
AgentCubes: Raising the Ceiling of End-User Development in Education through Incremental 3D
Now that we have end-user programming environments capable of empowering kids with no programming background to build games in a matter of hours, a new quest for raising the ceili...
Alexander Repenning, Andri Ioannidou
INFOCOM
2005
IEEE
15 years 3 months ago
Economics of network pricing with multiple ISPs
Abstract—In this paper we examine how transit and customer prices are set in a network consisting of multiple ISPs. Some ISPs may be geographically co-located so that they compet...
Sanjay Shakkottai, R. Srikant