Sciweavers

2345 search results - page 465 / 469
» Virtual Reality and Education
Sort
View
CORR
2010
Springer
110views Education» more  CORR 2010»
14 years 9 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
CORR
2010
Springer
169views Education» more  CORR 2010»
14 years 9 months ago
Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher
Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of blo...
Saleh Ali K. Al-Omari, Putra Sumari
CORR
2008
Springer
152views Education» more  CORR 2008»
14 years 9 months ago
Characterizing User Mobility in Second Life
In this work we present a measurement study of user mobility in Second Life. We first discuss different techniques to collect user traces and then focus on results obtained using ...
Chi-Anh La, Pietro Michiardi
CORR
2008
Springer
107views Education» more  CORR 2008»
14 years 9 months ago
The MIMO Iterative Waterfilling Algorithm
Abstract--This paper considers the noncooperative maximization of mutual information in the vector Gaussian interference channel in a fully distributed fashion via game theory. Thi...
Gesualdo Scutari, Daniel Pérez Palomar, Ser...
76
Voted
CORR
1998
Springer
110views Education» more  CORR 1998»
14 years 9 months ago
laboratories for Data Communications and Computer Networks
Abstract In this paper we describe a hands-on laboratory oriented instructional package that we have developed for data communications and networking. The package consists of a sof...
Rohit Goyal, Steve Lai, Raj Jain, Arjan Durresi