Sciweavers

507 search results - page 75 / 102
» The relation between protocols and games
Sort
View
108
Voted
AMW
2010
15 years 1 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
95
Voted
USITS
2001
15 years 1 months ago
Fine-Grained Failover Using Connection Migration
This paper presents a set of techniques for providing fine-grained failover of long-running connections across a distributed collection of replica servers, and is especially usefu...
Alex C. Snoeren, David G. Andersen, Hari Balakrish...
79
Voted
PSYCHNOLOGY
2007
75views more  PSYCHNOLOGY 2007»
14 years 12 months ago
Is It Fun to Go to Sydney? Common-Sense Knowledge of Social Structures and WAP
This paper investigated how people navigate through early Wireless Application Protocol (WAP) sites using their common-sense knowledge of social structures. The study is based on ...
Ilpo Koskinen
97
Voted
CSREASAM
2008
15 years 1 months ago
On Providing Automatic Parental Consent over Information Collection from Children
: Children's privacy has become critical with the increasing use of the Internet for commercial purposes and corresponding increase in requests for information. 65% of childre...
Karthik Channakeshava, Kaigui Bian, Michael S. Hsi...
EVOW
2009
Springer
15 years 7 months ago
Wireless Communications for Distributed Navigation in Robot Swarms
We consider a swarm of robots equipped with an infrared range and bearing device that is able both to make estimates of the relative distance and angle between two robots in line-o...
Gianni A. Di Caro, Frederick Ducatelle, Luca Maria...