Sciweavers

12289 search results - page 2148 / 2458
» computing 2006
Sort
View
CPM
2006
Springer
107views Combinatorics» more  CPM 2006»
15 years 8 months ago
Tiling an Interval of the Discrete Line
We consider the problem of tiling a segment {0, . . . , n} of the discrete line. More precisely, we ought to characterize the structure of the patterns that tile a segment and thei...
Olivier Bodini, Eric Rivals
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 8 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
142
Voted
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
15 years 8 months ago
On Expected Constant-Round Protocols for Byzantine Agreement
In a seminal paper, Feldman and Micali (STOC '88) show an n-party Byzantine agreement protocol tolerating t < n/3 malicious parties that runs in expected constant rounds. H...
Jonathan Katz, Chiu-Yuen Koo
CSCW
2006
ACM
15 years 8 months ago
Strangers and friends: collaborative play in world of warcraft
We analyze collaborative play in an online video game, World of Warcraft, the most popular personal computer game in the United States, with significant markets in Asia and Europe...
Bonnie A. Nardi, Justin Harris
DAGM
2006
Springer
15 years 8 months ago
On-Line, Incremental Learning of a Robust Active Shape Model
Abstract. Active Shape Models are commonly used to recognize and locate different aspects of known rigid objects. However, they require an off-line learning stage, such that the ex...
Michael Fussenegger, Peter M. Roth, Horst Bischof,...
« Prev « First page 2148 / 2458 Last » Next »