Sciweavers

2648 search results - page 482 / 530
» Challenges for Network Computer Games
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
13 years 10 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
WIS
2004
13 years 10 months ago
A Wireless Data Stream Mining Model
The sensor networks, web click stream and astronomical applications generate a continuous flow of data streams. Most likely data streams are generated in a wireless environment. Th...
Mohamed Medhat Gaber, Shonali Krishnaswamy, Arkady...
WCE
2007
13 years 10 months ago
A Patch-by-Patch Shape Matching Procedure for Rigid Body Docking
Abstract—Docking simulates molecular interactions. Protein - protein docking, owing to the sizes of molecules, is a very challenging problem. As the number of degrees of freedom ...
Vipin K. Tripathi
DGO
2008
173views Education» more  DGO 2008»
13 years 10 months ago
The Deliberative E-Rulemaking project (DeER): improving federal agency rulemaking via natural language processing and citizen di
Many scholars believe that electronic rulemaking has great but largely untapped potential to expand the public's democratic input and improve federal agency regulatory rules....
Peter Muhlberger, Nick Webb, Jennifer Stromer-Gall...
GECON
2008
Springer
152views Business» more  GECON 2008»
13 years 10 months ago
The Power of Preemption in Economic Online Markets
Abstract. In distributed computer networks where resources are under decentralized control, selfish users will generally not work towards one common goal, such as maximizing the o...
Lior Amar, Ahuva Mu'alem, Jochen Stößer