Sciweavers

2173 search results - page 392 / 435
» The History of the History of Software
Sort
View
FOCS
2002
IEEE
15 years 2 months ago
On the (non)Universality of the One-Time Pad
Randomization is vital in cryptography: secret keys should be randomly generated and most cryptographic primitives (e.g., encryption) must be probabilistic. As a bstraction, it is...
Yevgeniy Dodis, Joel Spencer
CHI
2010
ACM
15 years 2 months ago
MOSES: exploring new ground in media and post-conflict reconciliation
While the history of traditional media in post-conflict peace building efforts is rich and well studied, the potential for interactive new media technologies in this area has gone...
Thomas N. Smyth, John Etherton, Michael L. Best
SIGMETRICS
2010
ACM
208views Hardware» more  SIGMETRICS 2010»
15 years 2 months ago
Dynamics in congestion games
Game theoretic modeling and equilibrium analysis of congestion games have provided insights in the performance of Internet congestion control, road transportation networks, etc. D...
Devavrat Shah, Jinwoo Shin
SIGMOD
2010
ACM
236views Database» more  SIGMOD 2010»
15 years 2 months ago
Differentially private aggregation of distributed time-series with transformation and encryption
We propose PASTE, the first differentially private aggregation algorithms for distributed time-series data that offer good practical utility without any trusted server. PASTE add...
Vibhor Rastogi, Suman Nath
ACMACE
2009
ACM
15 years 2 months ago
Critical gameplay
How do games effect the way we problem solve, socialize, or even view the world? When we shoot do we learn to destroy obstacles instead of work around them? Does the binary world ...
Lindsay Grace